x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x160, 0x101ea0}, {0x0}, {&(0x7f0000011800)="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", 0x15d, 0x500000}, {&(0x7f0000011a00)="0000000000000000000000000000000000000000040000000000000000010000000000000090500000000000000000000000000000100000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000400", 0x65, 0x500560}, {&(0x7f0000011b00)="00000000000000000000000400000000000000000000000000000000a05000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000004", 0x5b, 0x500720}, {&(0x7f0000011c00)="000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x38, 0x500840}, {&(0x7f0000011d00)="00000600000000000000000000000000000000605000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000006", 0x52, 0x5008e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000050000000000000084ffffffffffffffff0000000000000000000007000264656661756c74000000000000000002002e2e03000000000000000000000000000000000000000000000000100000000000000000000000000000010000000000000000000000ed41000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005bbc645f00000000000000005bbc645f00000000000000005bbc645f00000000000000005bbc645f000000000000000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed410000000000000000000000000080ffffffff", 0x132, 0x5009e0}, {&(0x7f0000012000)="000000000000000000000600000000000000000100000000000000d05000000000000000000000000000003000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000106000000000000000b4f7fb0d0124f978a408dac5052e4f6000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000005cbc645f00000000c7a335155bbc645f", 0xc1, 0x500b60}, {&(0x7f0000000480)="000000000000000000070064656661756c7401000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x48, 0x500c80}, {&(0x7f0000012200)="0000000000000000000000000000000000000600000000000000000000000000000000005100000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000006", 0x62, 0x500d20}, {&(0x7f0000012300)="00000000000000000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x3f, 0x500e40}, {&(0x7f0000012400)="0000000000000000000700000000000000000000000000000000105000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000007", 0x59, 0x500ee0}, {&(0x7f0000012500)="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", 0x1c0, 0x501000}, {&(0x7f0000012700)="0000010000000000000500000000000000010000000000000006000000000000000200000000000000b00400000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000004000000000000000200000000000000b00900000000000000010000000000000004000000000000000200000000000000b0f7ffffffffffffff010000000000000006000000000000000200000000000000b00700000000000000010000000000000006000000000000000100000000000000b205000000000000000501000000000000000000000000000001000000010000000000000007000000000000000200000000000000b0020000000000000000c000000000000000010000000000000500000000000000010000000000000007000000000000000200000000000000b00100000000000000010000000000000004000000000000000200000000000000b003000000000000000010000000000000000100000000000002", 0x1b9, 0x501e40}, {&(0x7f0000000280)="f37badf500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200605000000000000100000000000001e1ee0d5d64d84a64be712c7636496d14060000000000000007000000000000000100000000f6ffffffffffffff8000305000000000008f0f00000c", 0x7b, 0x506000}, {&(0x7f0000012e00)="00000000000000000000000000000000000000008941f9988941f9988941f998", 0x20, 0x506fe0}, {&(0x7f0000013000)="b95ad41c00000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200905000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140400000000000000f7ffffffffffffff02000000000001000000000000010000000000000000fb0e0000a000000000010000000000000c0001000000000000ef0e00000c", 0x94, 0x509000}, {&(0x7f0000013100)="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", 0x13b, 0x509f40}, {&(0x7f0000013300)="000000000000000000000000000000000000000000000000050000000000", 0x1e, 0x50afe0}, {&(0x7f0000013500)="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", 0x3e4, 0x50be40}, {&(0x7f0000013900)="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", 0x400, 0x50cca0}, {&(0x7f0000000700)="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", 0x20b, 0x50e000}, {&(0x7f0000014000)="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", 0x920, 0x50e6e0}, {&(0x7f0000015600)="af6d627700000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200005100000000000100000000000001e1ee0d5d64d84a64be712c7636496d140600000000000000040000000000000004000000000000000000000000f90100000000000000730f0000280000000100000000000000cc0000100000000000430f0000300000000100000000000000cc0000500000000000130f0000300000000100000000000000cc0000690000000000e30e000030", 0xc6, 0x510000}, {&(0x7f0000015700)="00000000000000000300000000000000000100000000000000006900000000000000190000000000e1ee0d5d64d84a64be712c7636496d140300000000000000000100000000000000005000000000000000190000000000e1ee0d5d64d84a64be712c7636496d140300000000000000000100000000000000001000000000000000400000000000e1ee0d5d64d84a64be712c7636496d14", 0x98, 0x510f40}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) (async) 08:15:21 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000100008000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2007.850568] nla_parse: 10 callbacks suppressed [ 2007.850610] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2007.896778] FAULT_INJECTION: forcing a failure. [ 2007.896778] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2007.908617] CPU: 1 PID: 13107 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2007.916587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2007.925937] Call Trace: [ 2007.928529] dump_stack+0x1fc/0x2ef [ 2007.932152] should_fail.cold+0xa/0xf [ 2007.935945] ? setup_fault_attr+0x200/0x200 [ 2007.940256] ? do_writepages+0x290/0x290 [ 2007.944303] ? unlock_page+0x13d/0x230 [ 2007.948183] __alloc_pages_nodemask+0x239/0x2890 [ 2007.952929] ? generic_perform_write+0x36c/0x4d0 [ 2007.957673] ? __lock_acquire+0x6de/0x3ff0 [ 2007.961920] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2007.966763] ? lock_downgrade+0x720/0x720 [ 2007.970899] ? lock_acquire+0x170/0x3c0 [ 2007.974878] ? up_write+0x18/0x150 [ 2007.978409] ? generic_file_write_iter+0x381/0x730 [ 2007.983344] cache_grow_begin+0xa4/0x8a0 [ 2007.987395] ? setup_fault_attr+0x200/0x200 [ 2007.991756] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 2007.996498] cache_alloc_refill+0x273/0x340 [ 2008.000811] kmem_cache_alloc+0x346/0x370 [ 2008.004955] getname_flags+0xce/0x590 [ 2008.008748] do_sys_open+0x26c/0x520 [ 2008.012447] ? filp_open+0x70/0x70 [ 2008.015979] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2008.021328] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2008.026331] ? do_syscall_64+0x21/0x620 [ 2008.030294] do_syscall_64+0xf9/0x620 [ 2008.034096] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2008.039268] RIP: 0033:0x7ff1645ae194 [ 2008.042990] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2008.061874] RSP: 002b:00007ff162f6feb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2008.069566] RAX: ffffffffffffffda RBX: 00007ff164644a20 RCX: 00007ff1645ae194 [ 2008.076820] RDX: 0000000000000002 RSI: 00007ff162f6ffe0 RDI: 00000000ffffff9c [ 2008.084074] RBP: 00007ff162f6ffe0 R08: 0000000000000000 R09: 00007ff162f701d0 08:15:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500004000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2008.091325] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2008.098579] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 08:15:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 10) 08:15:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x38000000}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001f6ffffff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:21 executing program 0: fallocate(0xffffffffffffffff, 0x62, 0x0, 0x3) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000240)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000064e80)={0x0, [{}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}], 0x8, "388ba501dc8d52"}) r5 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000064e80)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {r7}], 0x0, "388ba501dc8d52"}) ioctl$BTRFS_IOC_INO_LOOKUP(r5, 0xd0009412, &(0x7f0000000d40)={r7, 0x30000000}) ioctl$BTRFS_IOC_LOGICAL_INO_V2(0xffffffffffffffff, 0xc038943b, &(0x7f0000000d00)={0x9, 0x0, '\x00', 0x1, 0x0}) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2e, 0x1f, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0}, {&(0x7f0000011800)="b8e6bc4200000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200005000000000000100000000000001e1ee0d5d64d84a64be712c7636496d14070000000000000001000000000000000a000000000200000000000000840000000000000000e40d0000b701000004000000000000008400000000000000002d0c0000b701000005000000000000000c06000000000000001c0c0000110000000500000000000000840000000000000000650a0000b70100000600000000000000010000000000000000c5090000a000000006000000000000000c0600000000000000b90900000c000000060000000000000054d2c2bf8d0000000094090000250000000700000000000000840000000000000000dd070000b7010000090000000000000084000000000000000026060000b7010000f7ffffffffffffff8400000000000000006f040000b701", 0x15d, 0x500000}, {&(0x7f0000011a00)="0000000000000000000000000000000000000000040000000000000000010000000000000090500000000000000000000000000000100000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000400", 0x65, 0x500560}, {&(0x7f0000011b00)="00000000000000000000000400000000000000000000000000000000a05000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000004", 0x5b, 0x500720}, {&(0x7f0000011c00)="000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x38, 0x500840}, {&(0x7f0000011d00)="00000600000000000000000000000000000000605000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000006", 0x52, 0x5008e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000050000000000000084ffffffffffffffff0000000000000000000007000264656661756c74000000000000000002002e2e03000000000000000000000000000000000000000000000000100000000000000000000000000000010000000000000000000000ed41000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005bbc645f00000000000000005bbc645f00000000000000005bbc645f00000000000000005bbc645f000000000000000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed410000000000000000000000000080ffffffff", 0x132, 0x5009e0}, {&(0x7f0000012000)="000000000000000000000600000000000000000100000000000000d05000000000000000000000000000003000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000106000000000000000b4f7fb0d0124f978a408dac5052e4f6000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000005cbc645f00000000c7a335155bbc645f", 0xc1, 0x500b60}, {&(0x7f0000000480)="000000000000000000070064656661756c7401000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x48, 0x500c80}, {&(0x7f0000012200)="0000000000000000000000000000000000000600000000000000000000000000000000005100000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000006", 0x62, 0x500d20}, {&(0x7f0000012300)="00000000000000000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x3f, 0x500e40}, {&(0x7f0000012400)="0000000000000000000700000000000000000000000000000000105000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000007", 0x59, 0x500ee0}, {&(0x7f0000012500)="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", 0x1c0, 0x501000}, {&(0x7f0000012700)="0000010000000000000500000000000000010000000000000006000000000000000200000000000000b00400000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000004000000000000000200000000000000b00900000000000000010000000000000004000000000000000200000000000000b0f7ffffffffffffff010000000000000006000000000000000200000000000000b00700000000000000010000000000000006000000000000000100000000000000b205000000000000000501000000000000000000000000000001000000010000000000000007000000000000000200000000000000b0020000000000000000c000000000000000010000000000000500000000000000010000000000000007000000000000000200000000000000b00100000000000000010000000000000004000000000000000200000000000000b003000000000000000010000000000000000100000000000002", 0x1b9, 0x501e40}, {&(0x7f0000000280)="f37badf500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200605000000000000100000000000001e1ee0d5d64d84a64be712c7636496d14060000000000000007000000000000000100000000f6ffffffffffffff8000305000000000008f0f00000c", 0x7b, 0x506000}, {&(0x7f0000012e00)="00000000000000000000000000000000000000008941f9988941f9988941f998", 0x20, 0x506fe0}, {&(0x7f0000013000)="b95ad41c00000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200905000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140400000000000000f7ffffffffffffff02000000000001000000000000010000000000000000fb0e0000a000000000010000000000000c0001000000000000ef0e00000c", 0x94, 0x509000}, {&(0x7f0000013100)="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", 0x13b, 0x509f40}, {&(0x7f0000013300)="000000000000000000000000000000000000000000000000050000000000", 0x1e, 0x50afe0}, {&(0x7f0000013500)="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", 0x3e4, 0x50be40}, {&(0x7f0000013900)="0000000000000000000000000000000000000003010000000000000100000000000000000600000000000000000005000766696c653102010000000000000100000000000000000600000000000000000005000166696c653003010000000000000100000000000000000600000000000000000005000766696c653102010000000000000100000000000000000600000000000000000005000166696c65300200000000000000050066696c653006000000000000000600000000000000140000000000000000000000000000000000000000000000010000000000000000000000ed41000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000005cbc645f00000000ae7d1e135cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000ae7d1e1306010000000000000100000000000000000600000000000000000009000166696c652e636f6c6405010000000000000100000000000000000600000000000000000005000166696c653305010000000000000100000000000000000600000000000000000005000166696c653204010000000000000100000000000000000600000000000000000005000166696c653101010000000000000100000000000000000600000000000000000005000266696c653004010000000000000100000000000000000600000000000000000005000166696c653105010000000000000100000000000000000600000000000000000005000166696c653205010000000000000100000000000000000600000000000000000005000166696c653306010000000000000100000000000000000600000000000000000009000166696c652e636f6c6401010000000000000100000000000000000600000000000000000005000266696c6530000000000000000002002e2e030000000000000006000000000000003a0000000000000000100000000000000000000000000000010000000000000000000000ed41000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000005bbc645f00000000000000005cbc645f00000000cb865b135cbc645f00000000cb865b135bbc645f00000000000000009375120100000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200d05000000000000100000000000001e1ee0d5d64d84a64be712c7636496d14060000000000000005000000000000000200000001000100000000000001000000000000000000c05000000000000600000000000000020100000000000001000000000000000000e050000000000006", 0x400, 0x50cca0}, {&(0x7f0000000700)="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", 0x20b, 0x50e000}, {&(0x7f0000014000)="0000000000000000000000000006000000000000006400000000000000000000000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c6572730600000000000000090066696c652e636f6c6406000000000000000600000000000000640000000000000064000000000000000000000000000000010000000000000000000000ed81000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000005cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b1306000000000000000030000000000000000000000100305000000000000030000000000000000000000000000000300000000000000400000000000000050066696c65320500000000000000050066696c653306000000000000000600000000000000282300000000000000300000000000000000000000000000020000000000000000000000ed81000000000000000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000005cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b1306000000000000000a00000000000000000000000073797a6b616c6c6572730000000000000000000000000000000000060000000000000006000b0008757365722e7861747472317861747472310000000000000000000000000000000000060000000000000006000b0008757365722e7861747472327861747472320300000000000000050066696c6531060000000000000006000000000000000a000000000000000a000000000000000000000000000000010000000000000000000000ed81000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000005cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b130600000000000000260000000000000000000000002f746d702f73797a2d696d61676567656e3038323231363939382f66696c65302f66696c65300300000000000000050066696c653106000000000000000600000000000000260000000000000026000000000000000000000000000000010000000000000000000000ffa1000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000005cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b1306000000000000001a04000000000000000000000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c0200000000000000050066696c6530060000000000000006000000000000001a040000000000001a040000000000000000000000000000010000000000000000000000ed81000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000005cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b13", 0x920, 0x50e6e0}, {&(0x7f0000015600)="af6d627700000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200005100000000000100000000000001e1ee0d5d64d84a64be712c7636496d140600000000000000040000000000000004000000000000000000000000f90100000000000000730f0000280000000100000000000000cc0000100000000000430f0000300000000100000000000000cc0000500000000000130f0000300000000100000000000000cc0000690000000000e30e000030", 0xc6, 0x510000}, {&(0x7f0000015700)="00000000000000000300000000000000000100000000000000006900000000000000190000000000e1ee0d5d64d84a64be712c7636496d140300000000000000000100000000000000005000000000000000190000000000e1ee0d5d64d84a64be712c7636496d140300000000000000000100000000000000001000000000000000400000000000e1ee0d5d64d84a64be712c7636496d14", 0x98, 0x510f40}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) fallocate(0xffffffffffffffff, 0x62, 0x0, 0x3) (async) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) (async) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000240)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) (async) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, 0x0) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000064e80)={0x0, [{}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}], 0x8, "388ba501dc8d52"}) (async) socket$isdn_base(0x22, 0x3, 0x0) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000064e80)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {r7}], 0x0, "388ba501dc8d52"}) (async) ioctl$BTRFS_IOC_INO_LOOKUP(r5, 0xd0009412, &(0x7f0000000d40)={r7, 0x30000000}) (async) ioctl$BTRFS_IOC_LOGICAL_INO_V2(0xffffffffffffffff, 0xc038943b, &(0x7f0000000d00)={0x9, 0x0, '\x00', 0x1, 0x0}) (async) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2e, 0x1f, &(0x7f00000009c0)=[{&(0x7f0000010000)="90e42e85000000000500010000ffff0007ffffffff0000000800000000000802f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0}, {&(0x7f0000011800)="b8e6bc4200000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200005000000000000100000000000001e1ee0d5d64d84a64be712c7636496d14070000000000000001000000000000000a000000000200000000000000840000000000000000e40d0000b701000004000000000000008400000000000000002d0c0000b701000005000000000000000c06000000000000001c0c0000110000000500000000000000840000000000000000650a0000b70100000600000000000000010000000000000000c5090000a000000006000000000000000c0600000000000000b90900000c000000060000000000000054d2c2bf8d0000000094090000250000000700000000000000840000000000000000dd070000b7010000090000000000000084000000000000000026060000b7010000f7ffffffffffffff8400000000000000006f040000b701", 0x15d, 0x500000}, {&(0x7f0000011a00)="0000000000000000000000000000000000000000040000000000000000010000000000000090500000000000000000000000000000100000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000400", 0x65, 0x500560}, {&(0x7f0000011b00)="00000000000000000000000400000000000000000000000000000000a05000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000004", 0x5b, 0x500720}, {&(0x7f0000011c00)="000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x38, 0x500840}, {&(0x7f0000011d00)="00000600000000000000000000000000000000605000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000006", 0x52, 0x5008e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000050000000000000084ffffffffffffffff0000000000000000000007000264656661756c74000000000000000002002e2e03000000000000000000000000000000000000000000000000100000000000000000000000000000010000000000000000000000ed41000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005bbc645f00000000000000005bbc645f00000000000000005bbc645f00000000000000005bbc645f000000000000000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed410000000000000000000000000080ffffffff", 0x132, 0x5009e0}, {&(0x7f0000012000)="000000000000000000000600000000000000000100000000000000d05000000000000000000000000000003000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000106000000000000000b4f7fb0d0124f978a408dac5052e4f6000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000005cbc645f00000000c7a335155bbc645f", 0xc1, 0x500b60}, {&(0x7f0000000480)="000000000000000000070064656661756c7401000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x48, 0x500c80}, {&(0x7f0000012200)="0000000000000000000000000000000000000600000000000000000000000000000000005100000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000006", 0x62, 0x500d20}, {&(0x7f0000012300)="00000000000000000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x3f, 0x500e40}, {&(0x7f0000012400)="0000000000000000000700000000000000000000000000000000105000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000007", 0x59, 0x500ee0}, {&(0x7f0000012500)="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", 0x1c0, 0x501000}, {&(0x7f0000012700)="0000010000000000000500000000000000010000000000000006000000000000000200000000000000b00400000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000004000000000000000200000000000000b00900000000000000010000000000000004000000000000000200000000000000b0f7ffffffffffffff010000000000000006000000000000000200000000000000b00700000000000000010000000000000006000000000000000100000000000000b205000000000000000501000000000000000000000000000001000000010000000000000007000000000000000200000000000000b0020000000000000000c000000000000000010000000000000500000000000000010000000000000007000000000000000200000000000000b00100000000000000010000000000000004000000000000000200000000000000b003000000000000000010000000000000000100000000000002", 0x1b9, 0x501e40}, {&(0x7f0000000280)="f37badf500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200605000000000000100000000000001e1ee0d5d64d84a64be712c7636496d14060000000000000007000000000000000100000000f6ffffffffffffff8000305000000000008f0f00000c", 0x7b, 0x506000}, {&(0x7f0000012e00)="00000000000000000000000000000000000000008941f9988941f9988941f998", 0x20, 0x506fe0}, {&(0x7f0000013000)="b95ad41c00000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200905000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140400000000000000f7ffffffffffffff02000000000001000000000000010000000000000000fb0e0000a000000000010000000000000c0001000000000000ef0e00000c", 0x94, 0x509000}, {&(0x7f0000013100)="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", 0x13b, 0x509f40}, {&(0x7f0000013300)="000000000000000000000000000000000000000000000000050000000000", 0x1e, 0x50afe0}, {&(0x7f0000013500)="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", 0x3e4, 0x50be40}, {&(0x7f0000013900)="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", 0x400, 0x50cca0}, {&(0x7f0000000700)="f816d9c600000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200e05000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140600000000000000050000000000000011000000000201000000000000010000000000000000fb0e0000a000000002010000000000000c0101000000000000ec0e00000f00000002010000000000006c0000000000000000bd0a00002f04000003010000000000000100000000000000001d0a0000a000000003010000000000000c01010000000000000e0a00000f00000003010000000000006c0000000000000000d30900003b000000040100000000000001000000000000000033090000a000000004010000000000000c0001000000000000240900000f00000004010000000000001822a8f12600000000f50800002f000000040100000000000018d65ba13500000000c60800002f00000004010000000000006c0000000000000000a70800001f000000050100000000000001000000000000000007080000a000000005010000000000000c0001000000000000e90700001e00000005010000000000006c0000000000000000b407000035000000060100000000000001000000000000000014070000a000000006010000000000000c0001000000000000010700001300000006010000000000006c00000000000000008806000079", 0x20b, 0x50e000}, {&(0x7f0000014000)="0000000000000000000000000006000000000000006400000000000000000000000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c6572730600000000000000090066696c652e636f6c6406000000000000000600000000000000640000000000000064000000000000000000000000000000010000000000000000000000ed81000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000005cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b1306000000000000000030000000000000000000000100305000000000000030000000000000000000000000000000300000000000000400000000000000050066696c65320500000000000000050066696c653306000000000000000600000000000000282300000000000000300000000000000000000000000000020000000000000000000000ed81000000000000000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000005cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b1306000000000000000a00000000000000000000000073797a6b616c6c6572730000000000000000000000000000000000060000000000000006000b0008757365722e7861747472317861747472310000000000000000000000000000000000060000000000000006000b0008757365722e7861747472327861747472320300000000000000050066696c6531060000000000000006000000000000000a000000000000000a000000000000000000000000000000010000000000000000000000ed81000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000005cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b130600000000000000260000000000000000000000002f746d702f73797a2d696d61676567656e3038323231363939382f66696c65302f66696c65300300000000000000050066696c653106000000000000000600000000000000260000000000000026000000000000000000000000000000010000000000000000000000ffa1000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000005cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b1306000000000000001a04000000000000000000000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c0200000000000000050066696c6530060000000000000006000000000000001a040000000000001a040000000000000000000000000000010000000000000000000000ed81000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000005cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b13", 0x920, 0x50e6e0}, {&(0x7f0000015600)="af6d627700000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200005100000000000100000000000001e1ee0d5d64d84a64be712c7636496d140600000000000000040000000000000004000000000000000000000000f90100000000000000730f0000280000000100000000000000cc0000100000000000430f0000300000000100000000000000cc0000500000000000130f0000300000000100000000000000cc0000690000000000e30e000030", 0xc6, 0x510000}, {&(0x7f0000015700)="00000000000000000300000000000000000100000000000000006900000000000000190000000000e1ee0d5d64d84a64be712c7636496d140300000000000000000100000000000000005000000000000000190000000000e1ee0d5d64d84a64be712c7636496d140300000000000000000100000000000000001000000000000000400000000000e1ee0d5d64d84a64be712c7636496d14", 0x98, 0x510f40}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) (async) 08:15:21 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000480008000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2008.247870] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2008.298955] FAULT_INJECTION: forcing a failure. [ 2008.298955] name failslab, interval 1, probability 0, space 0, times 0 [ 2008.335120] CPU: 0 PID: 13144 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2008.343017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2008.352371] Call Trace: [ 2008.354967] dump_stack+0x1fc/0x2ef [ 2008.358607] should_fail.cold+0xa/0xf [ 2008.362417] ? setup_fault_attr+0x200/0x200 [ 2008.366743] ? lock_acquire+0x170/0x3c0 [ 2008.370730] __should_failslab+0x115/0x180 [ 2008.374971] should_failslab+0x5/0x10 [ 2008.378775] kmem_cache_alloc_trace+0x284/0x380 [ 2008.383442] apparmor_file_alloc_security+0x394/0xad0 [ 2008.388615] ? apparmor_file_receive+0x160/0x160 [ 2008.393412] ? __alloc_file+0x21/0x340 [ 2008.397303] security_file_alloc+0x40/0x90 [ 2008.401520] __alloc_file+0xd8/0x340 [ 2008.405217] alloc_empty_file+0x6d/0x170 [ 2008.409292] path_openat+0xe9/0x2df0 [ 2008.412997] ? __lock_acquire+0x6de/0x3ff0 [ 2008.417217] ? path_lookupat+0x8d0/0x8d0 [ 2008.421258] ? mark_held_locks+0xf0/0xf0 [ 2008.425313] ? mark_held_locks+0xf0/0xf0 [ 2008.429359] do_filp_open+0x18c/0x3f0 [ 2008.433136] ? may_open_dev+0xf0/0xf0 [ 2008.436916] ? __alloc_fd+0x28d/0x570 [ 2008.440705] ? lock_downgrade+0x720/0x720 [ 2008.444833] ? lock_acquire+0x170/0x3c0 [ 2008.448808] ? __alloc_fd+0x34/0x570 [ 2008.452503] ? do_raw_spin_unlock+0x171/0x230 [ 2008.456979] ? _raw_spin_unlock+0x29/0x40 [ 2008.461104] ? __alloc_fd+0x28d/0x570 [ 2008.464898] do_sys_open+0x3b3/0x520 [ 2008.468599] ? filp_open+0x70/0x70 [ 2008.472120] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2008.477463] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2008.482458] ? do_syscall_64+0x21/0x620 [ 2008.486411] do_syscall_64+0xf9/0x620 [ 2008.490192] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2008.495365] RIP: 0033:0x7ff1645ae194 [ 2008.499057] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2008.517936] RSP: 002b:00007ff162f6feb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2008.525621] RAX: ffffffffffffffda RBX: 00007ff164644a20 RCX: 00007ff1645ae194 08:15:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000001ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2008.532876] RDX: 0000000000000002 RSI: 00007ff162f6ffe0 RDI: 00000000ffffff9c [ 2008.540142] RBP: 00007ff162f6ffe0 R08: 0000000000000000 R09: 00007ff162f701d0 [ 2008.547390] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2008.554637] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 08:15:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 11) 08:15:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001fbffffff0000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:22 executing program 0: fallocate(0xffffffffffffffff, 0x62, 0x0, 0x3) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000240)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000064e80)={0x0, [{}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}], 0x8, "388ba501dc8d52"}) r5 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000064e80)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {r7}], 0x0, "388ba501dc8d52"}) ioctl$BTRFS_IOC_INO_LOOKUP(r5, 0xd0009412, &(0x7f0000000d40)={r7, 0x30000000}) ioctl$BTRFS_IOC_LOGICAL_INO_V2(0xffffffffffffffff, 0xc038943b, &(0x7f0000000d00)={0x9, 0x0, '\x00', 0x1, 0x0}) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2e, 0x1f, &(0x7f00000009c0)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {0x0}, {&(0x7f0000011800)="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", 0x15d, 0x500000}, {&(0x7f0000011a00)="0000000000000000000000000000000000000000040000000000000000010000000000000090500000000000000000000000000000100000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000400", 0x65, 0x500560}, {&(0x7f0000011b00)="00000000000000000000000400000000000000000000000000000000a05000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000004", 0x5b, 0x500720}, {&(0x7f0000011c00)="000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x38, 0x500840}, {&(0x7f0000011d00)="00000600000000000000000000000000000000605000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000006", 0x52, 0x5008e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000050000000000000084ffffffffffffffff0000000000000000000007000264656661756c74000000000000000002002e2e03000000000000000000000000000000000000000000000000100000000000000000000000000000010000000000000000000000ed41000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005bbc645f00000000000000005bbc645f00000000000000005bbc645f00000000000000005bbc645f000000000000000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed410000000000000000000000000080ffffffff", 0x132, 0x5009e0}, {&(0x7f0000012000)="000000000000000000000600000000000000000100000000000000d05000000000000000000000000000003000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000106000000000000000b4f7fb0d0124f978a408dac5052e4f6000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000005cbc645f00000000c7a335155bbc645f", 0xc1, 0x500b60}, {&(0x7f0000000480)="000000000000000000070064656661756c7401000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x48, 0x500c80}, {&(0x7f0000012200)="0000000000000000000000000000000000000600000000000000000000000000000000005100000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000006", 0x62, 0x500d20}, {&(0x7f0000012300)="00000000000000000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x3f, 0x500e40}, {&(0x7f0000012400)="0000000000000000000700000000000000000000000000000000105000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000007", 0x59, 0x500ee0}, {&(0x7f0000012500)="46ea879d00000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200105000000000000100000000000001e1ee0d5d64d84a64be712c7636496d14070000000000000002000000000000000e000000000000100000000000c00000400000000000830f0000180000000010100000000000a90000000000000000620f0000210000000000500000000000a90000000000000000410f0000210000000000500000000000c00000190000000000290f0000180000000010500000000000a90000000000000000080f0000210000000030500000000000a80030000000000000d30e0000350000000060500000000000a90000000000000000b20e0000210000000090500000000000a90000000000000000910e00002100000000a0500000000000a90000000000000000700e00002100000000c0500000000000a900000000000000004f0e00002100000000d0500000000000a901000000000000002e0e00002100000000e0500000000000a900000000000000000d0e0000210000000000510000000000a90000000000000000ec0d0000210000000000690000000000c00000190000000000d40d000018", 0x1c0, 0x501000}, {&(0x7f0000012700)="0000010000000000000500000000000000010000000000000006000000000000000200000000000000b00400000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000004000000000000000200000000000000b00900000000000000010000000000000004000000000000000200000000000000b0f7ffffffffffffff010000000000000006000000000000000200000000000000b00700000000000000010000000000000006000000000000000100000000000000b205000000000000000501000000000000000000000000000001000000010000000000000007000000000000000200000000000000b0020000000000000000c000000000000000010000000000000500000000000000010000000000000007000000000000000200000000000000b00100000000000000010000000000000004000000000000000200000000000000b003000000000000000010000000000000000100000000000002", 0x1b9, 0x501e40}, {&(0x7f0000000280)="f37badf500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200605000000000000100000000000001e1ee0d5d64d84a64be712c7636496d14060000000000000007000000000000000100000000f6ffffffffffffff8000305000000000008f0f00000c", 0x7b, 0x506000}, {&(0x7f0000012e00)="00000000000000000000000000000000000000008941f9988941f9988941f998", 0x20, 0x506fe0}, {&(0x7f0000013000)="b95ad41c00000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200905000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140400000000000000f7ffffffffffffff02000000000001000000000000010000000000000000fb0e0000a000000000010000000000000c0001000000000000ef0e00000c", 0x94, 0x509000}, {&(0x7f0000013100)="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", 0x13b, 0x509f40}, {&(0x7f0000013300)="000000000000000000000000000000000000000000000000050000000000", 0x1e, 0x50afe0}, {&(0x7f0000013500)="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", 0x3e4, 0x50be40}, {&(0x7f0000013900)="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", 0x400, 0x50cca0}, {&(0x7f0000000700)="f816d9c600000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200e05000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140600000000000000050000000000000011000000000201000000000000010000000000000000fb0e0000a000000002010000000000000c0101000000000000ec0e00000f00000002010000000000006c0000000000000000bd0a00002f04000003010000000000000100000000000000001d0a0000a000000003010000000000000c01010000000000000e0a00000f00000003010000000000006c0000000000000000d30900003b000000040100000000000001000000000000000033090000a000000004010000000000000c0001000000000000240900000f00000004010000000000001822a8f12600000000f50800002f000000040100000000000018d65ba13500000000c60800002f00000004010000000000006c0000000000000000a70800001f000000050100000000000001000000000000000007080000a000000005010000000000000c0001000000000000e90700001e00000005010000000000006c0000000000000000b407000035000000060100000000000001000000000000000014070000a000000006010000000000000c0001000000000000010700001300000006010000000000006c00000000000000008806000079", 0x20b, 0x50e000}, {&(0x7f0000014000)="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", 0x920, 0x50e6e0}, {&(0x7f0000015600)="af6d627700000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200005100000000000100000000000001e1ee0d5d64d84a64be712c7636496d140600000000000000040000000000000004000000000000000000000000f90100000000000000730f0000280000000100000000000000cc0000100000000000430f0000300000000100000000000000cc0000500000000000130f0000300000000100000000000000cc0000690000000000e30e000030", 0xc6, 0x510000}, {&(0x7f0000015700)="00000000000000000300000000000000000100000000000000006900000000000000190000000000e1ee0d5d64d84a64be712c7636496d140300000000000000000100000000000000005000000000000000190000000000e1ee0d5d64d84a64be712c7636496d140300000000000000000100000000000000001000000000000000400000000000e1ee0d5d64d84a64be712c7636496d14", 0x98, 0x510f40}], 0x0, &(0x7f00000005c0)={[{@nospace_cache}]}) 08:15:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x3c000000}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:22 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c0001000800000000004c0008000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2008.710413] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2008.740067] FAULT_INJECTION: forcing a failure. [ 2008.740067] name failslab, interval 1, probability 0, space 0, times 0 [ 2008.808959] CPU: 0 PID: 13178 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2008.816863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2008.826213] Call Trace: [ 2008.828803] dump_stack+0x1fc/0x2ef [ 2008.828822] should_fail.cold+0xa/0xf [ 2008.828840] ? setup_fault_attr+0x200/0x200 [ 2008.828852] ? lock_acquire+0x170/0x3c0 [ 2008.828868] __should_failslab+0x115/0x180 [ 2008.828884] should_failslab+0x5/0x10 [ 2008.852804] kmem_cache_alloc_trace+0x284/0x380 [ 2008.857526] apparmor_file_alloc_security+0x394/0xad0 [ 2008.862723] ? apparmor_file_receive+0x160/0x160 [ 2008.867483] ? __alloc_file+0x21/0x340 [ 2008.871471] security_file_alloc+0x40/0x90 [ 2008.875716] __alloc_file+0xd8/0x340 [ 2008.879440] alloc_empty_file+0x6d/0x170 [ 2008.883512] path_openat+0xe9/0x2df0 [ 2008.887231] ? __lock_acquire+0x6de/0x3ff0 [ 2008.891481] ? path_lookupat+0x8d0/0x8d0 [ 2008.895550] ? mark_held_locks+0xf0/0xf0 [ 2008.899629] do_filp_open+0x18c/0x3f0 [ 2008.903434] ? may_open_dev+0xf0/0xf0 08:15:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000002ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2008.907240] ? __alloc_fd+0x28d/0x570 [ 2008.911054] ? lock_downgrade+0x720/0x720 [ 2008.915202] ? lock_acquire+0x170/0x3c0 [ 2008.919177] ? __alloc_fd+0x34/0x570 [ 2008.922894] ? do_raw_spin_unlock+0x171/0x230 [ 2008.927385] ? _raw_spin_unlock+0x29/0x40 [ 2008.931526] ? __alloc_fd+0x28d/0x570 [ 2008.935328] do_sys_open+0x3b3/0x520 [ 2008.939026] ? filp_open+0x70/0x70 [ 2008.942564] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2008.948022] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2008.953020] ? do_syscall_64+0x21/0x620 [ 2008.956978] do_syscall_64+0xf9/0x620 [ 2008.960760] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2008.965939] RIP: 0033:0x7ff1645ae194 [ 2008.969638] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 2008.988636] RSP: 002b:00007ff162f6feb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 2008.996327] RAX: ffffffffffffffda RBX: 00007ff164644a20 RCX: 00007ff1645ae194 08:15:22 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x6}, 0x1c) recvmmsg(r0, &(0x7f0000002900)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/25, 0x19}, {0x0, 0x4}, {&(0x7f0000000100)=""/233, 0xe9}], 0x3}}], 0x1, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaf9aaaa0086dd601b8b97004d88c19edace0000000000000000000000000000000000011a004e20004d1300"/61], 0x0) [ 2009.003589] RDX: 0000000000000002 RSI: 00007ff162f6ffe0 RDI: 00000000ffffff9c [ 2009.010840] RBP: 00007ff162f6ffe0 R08: 0000000000000000 R09: 00007ff162f701d0 [ 2009.018088] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2009.025347] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 08:15:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 12) 08:15:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000200000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000003ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x3c020000}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:22 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000600008000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2009.157342] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2009.210355] FAULT_INJECTION: forcing a failure. [ 2009.210355] name failslab, interval 1, probability 0, space 0, times 0 [ 2009.227052] CPU: 1 PID: 13213 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2009.234949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2009.244302] Call Trace: [ 2009.246907] dump_stack+0x1fc/0x2ef [ 2009.250562] should_fail.cold+0xa/0xf [ 2009.254382] ? setup_fault_attr+0x200/0x200 [ 2009.258710] ? lock_acquire+0x170/0x3c0 [ 2009.262690] __should_failslab+0x115/0x180 [ 2009.266938] should_failslab+0x5/0x10 [ 2009.270741] kmem_cache_alloc_trace+0x284/0x380 [ 2009.275415] ? loop_info64_to_compat+0x5e0/0x5e0 [ 2009.280171] __kthread_create_on_node+0xd2/0x410 [ 2009.284931] ? kthread_parkme+0xa0/0xa0 [ 2009.288908] ? lock_acquire+0x170/0x3c0 [ 2009.292007] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2009.292882] ? lo_ioctl+0x1bb/0x20e0 [ 2009.292907] ? __mutex_lock+0x368/0x1190 08:15:22 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x3f000000}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:22 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000680008000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2009.292924] ? lock_downgrade+0x720/0x720 [ 2009.292939] ? check_preemption_disabled+0x41/0x280 [ 2009.292957] ? loop_info64_to_compat+0x5e0/0x5e0 [ 2009.323163] kthread_create_on_node+0xbb/0xf0 [ 2009.327665] ? __kthread_create_on_node+0x410/0x410 [ 2009.332679] ? __fget+0x356/0x510 [ 2009.336145] ? do_dup2+0x450/0x450 [ 2009.339693] ? __lockdep_init_map+0x100/0x5a0 [ 2009.344198] ? __lockdep_init_map+0x100/0x5a0 [ 2009.348709] lo_ioctl+0xae5/0x20e0 [ 2009.352259] ? loop_set_status64+0x110/0x110 [ 2009.356672] blkdev_ioctl+0x5cb/0x1a80 08:15:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x40000000}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2009.360560] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2009.365924] ? blkpg_ioctl+0x9d0/0x9d0 [ 2009.369814] ? mark_held_locks+0xf0/0xf0 [ 2009.373886] ? mark_held_locks+0xf0/0xf0 [ 2009.377954] ? debug_check_no_obj_freed+0x201/0x490 [ 2009.382979] ? lock_downgrade+0x720/0x720 [ 2009.387137] block_ioctl+0xe9/0x130 [ 2009.390769] ? blkdev_fallocate+0x3f0/0x3f0 [ 2009.395099] do_vfs_ioctl+0xcdb/0x12e0 [ 2009.399000] ? lock_downgrade+0x720/0x720 [ 2009.403151] ? check_preemption_disabled+0x41/0x280 08:15:23 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c0001000800000000006c0008000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2009.408172] ? ioctl_preallocate+0x200/0x200 [ 2009.412590] ? __fget+0x356/0x510 [ 2009.416050] ? do_dup2+0x450/0x450 [ 2009.419594] ? do_sys_open+0x2bf/0x520 [ 2009.419896] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2009.423486] ksys_ioctl+0x9b/0xc0 [ 2009.423504] __x64_sys_ioctl+0x6f/0xb0 [ 2009.423519] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2009.423533] do_syscall_64+0xf9/0x620 [ 2009.423552] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2009.423564] RIP: 0033:0x7ff1645fb037 08:15:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x44020000}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2009.423578] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2009.423585] RSP: 002b:00007ff162f6ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2009.423598] RAX: ffffffffffffffda RBX: 00007ff164644a20 RCX: 00007ff1645fb037 [ 2009.423610] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2009.497904] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff162f701d0 08:15:23 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000740008000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2009.505207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2009.512563] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 2009.517535] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2009.644428] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:23 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x6}, 0x1c) (async) recvmmsg(r0, &(0x7f0000002900)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/25, 0x19}, {0x0, 0x4}, {&(0x7f0000000100)=""/233, 0xe9}], 0x3}}], 0x1, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaf9aaaa0086dd601b8b97004d88c19edace0000000000000000000000000000000000011a004e20004d1300"/61], 0x0) 08:15:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 13) 08:15:23 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x48000000}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000004ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000300000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:23 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c0001000800000000007a0008000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2010.047936] FAULT_INJECTION: forcing a failure. [ 2010.047936] name failslab, interval 1, probability 0, space 0, times 0 [ 2010.059779] CPU: 0 PID: 13261 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2010.067671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2010.068011] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2010.077017] Call Trace: [ 2010.077039] dump_stack+0x1fc/0x2ef [ 2010.077059] should_fail.cold+0xa/0xf [ 2010.077077] ? setup_fault_attr+0x200/0x200 [ 2010.077093] ? lock_acquire+0x170/0x3c0 [ 2010.077114] __should_failslab+0x115/0x180 [ 2010.077131] should_failslab+0x5/0x10 [ 2010.077144] kmem_cache_alloc+0x277/0x370 [ 2010.077162] __kernfs_new_node+0xd2/0x680 [ 2010.077180] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2010.077194] ? _raw_spin_unlock_irq+0x5a/0x80 [ 2010.077210] ? __cpu_to_node+0x7b/0xa0 [ 2010.077229] ? mark_held_locks+0xf0/0xf0 [ 2010.077245] ? io_schedule_timeout+0x140/0x140 [ 2010.141951] ? enqueue_entity+0xf86/0x3850 [ 2010.146201] ? set_user_nice.part.0+0x3b9/0xab0 [ 2010.150853] kernfs_create_dir_ns+0x9e/0x230 [ 2010.155245] internal_create_group+0x1c1/0xb20 [ 2010.159811] ? sysfs_remove_link_from_group+0x70/0x70 [ 2010.164994] ? lock_downgrade+0x720/0x720 [ 2010.169139] lo_ioctl+0xf7c/0x20e0 [ 2010.172674] ? loop_set_status64+0x110/0x110 [ 2010.177074] blkdev_ioctl+0x5cb/0x1a80 [ 2010.180944] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2010.186300] ? blkpg_ioctl+0x9d0/0x9d0 [ 2010.190167] ? mark_held_locks+0xf0/0xf0 [ 2010.194208] ? mark_held_locks+0xf0/0xf0 [ 2010.198264] ? debug_check_no_obj_freed+0x201/0x490 [ 2010.203285] ? lock_downgrade+0x720/0x720 [ 2010.207424] block_ioctl+0xe9/0x130 [ 2010.211031] ? blkdev_fallocate+0x3f0/0x3f0 [ 2010.215337] do_vfs_ioctl+0xcdb/0x12e0 [ 2010.219210] ? lock_downgrade+0x720/0x720 [ 2010.223351] ? check_preemption_disabled+0x41/0x280 [ 2010.228359] ? ioctl_preallocate+0x200/0x200 [ 2010.232763] ? __fget+0x356/0x510 [ 2010.236206] ? do_dup2+0x450/0x450 [ 2010.239727] ? do_sys_open+0x2bf/0x520 [ 2010.243618] ksys_ioctl+0x9b/0xc0 [ 2010.247065] __x64_sys_ioctl+0x6f/0xb0 [ 2010.250934] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2010.255498] do_syscall_64+0xf9/0x620 [ 2010.259282] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2010.264462] RIP: 0033:0x7ff1645fb037 [ 2010.268167] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2010.287047] RSP: 002b:00007ff162f6ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 08:15:23 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000f00008000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000400000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000005ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2010.294740] RAX: ffffffffffffffda RBX: 00007ff164644a20 RCX: 00007ff1645fb037 [ 2010.301995] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2010.309251] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff162f701d0 [ 2010.316501] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2010.323756] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 08:15:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x48020000}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 14) 08:15:24 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000308000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2010.445144] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2010.535216] FAULT_INJECTION: forcing a failure. [ 2010.535216] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2010.547040] CPU: 1 PID: 13286 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2010.555042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2010.564393] Call Trace: [ 2010.566988] dump_stack+0x1fc/0x2ef [ 2010.570634] should_fail.cold+0xa/0xf [ 2010.574449] ? setup_fault_attr+0x200/0x200 [ 2010.578780] ? lock_downgrade+0x720/0x720 [ 2010.582933] ? lock_acquire+0x170/0x3c0 [ 2010.586912] ? __bpf_address_lookup+0x330/0x330 [ 2010.591594] ? check_preemption_disabled+0x41/0x280 [ 2010.596610] __alloc_pages_nodemask+0x239/0x2890 [ 2010.601348] ? is_bpf_text_address+0xfc/0x1b0 [ 2010.605824] ? kernel_text_address+0xbd/0xf0 [ 2010.610217] ? __lock_acquire+0x6de/0x3ff0 [ 2010.614437] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2010.619261] ? __lock_acquire+0x6de/0x3ff0 [ 2010.623478] ? __lock_acquire+0x6de/0x3ff0 [ 2010.627698] ? mark_held_locks+0xf0/0xf0 [ 2010.631741] ? mark_held_locks+0xf0/0xf0 [ 2010.635785] ? debug_check_no_obj_freed+0x201/0x490 [ 2010.640786] cache_grow_begin+0xa4/0x8a0 [ 2010.644836] ? setup_fault_attr+0x200/0x200 [ 2010.649153] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 2010.653907] cache_alloc_refill+0x273/0x340 [ 2010.658229] kmem_cache_alloc+0x346/0x370 [ 2010.662384] __kernfs_new_node+0xd2/0x680 [ 2010.666522] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2010.671262] ? __cpu_to_node+0x7b/0xa0 [ 2010.675130] ? account_entity_enqueue+0x2e5/0x440 [ 2010.679965] ? mark_held_locks+0xf0/0xf0 [ 2010.684011] ? enqueue_entity+0xf86/0x3850 [ 2010.688238] ? set_user_nice.part.0+0x3b9/0xab0 [ 2010.692893] kernfs_create_dir_ns+0x9e/0x230 [ 2010.697286] internal_create_group+0x1c1/0xb20 [ 2010.701959] ? sysfs_remove_link_from_group+0x70/0x70 [ 2010.707136] ? lock_downgrade+0x720/0x720 [ 2010.711273] lo_ioctl+0xf7c/0x20e0 [ 2010.714810] ? loop_set_status64+0x110/0x110 [ 2010.719223] blkdev_ioctl+0x5cb/0x1a80 [ 2010.723100] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2010.728445] ? blkpg_ioctl+0x9d0/0x9d0 [ 2010.732317] ? mark_held_locks+0xf0/0xf0 [ 2010.736362] ? mark_held_locks+0xf0/0xf0 [ 2010.740420] ? debug_check_no_obj_freed+0x201/0x490 [ 2010.745428] ? lock_downgrade+0x720/0x720 [ 2010.749558] block_ioctl+0xe9/0x130 [ 2010.753163] ? blkdev_fallocate+0x3f0/0x3f0 [ 2010.757468] do_vfs_ioctl+0xcdb/0x12e0 [ 2010.761351] ? lock_downgrade+0x720/0x720 [ 2010.765489] ? check_preemption_disabled+0x41/0x280 [ 2010.770492] ? ioctl_preallocate+0x200/0x200 [ 2010.774883] ? __fget+0x356/0x510 [ 2010.778316] ? do_dup2+0x450/0x450 [ 2010.781840] ? do_sys_open+0x2bf/0x520 [ 2010.785713] ksys_ioctl+0x9b/0xc0 [ 2010.789161] __x64_sys_ioctl+0x6f/0xb0 [ 2010.793056] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2010.797620] do_syscall_64+0xf9/0x620 [ 2010.801407] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2010.806584] RIP: 0033:0x7ff1645fb037 [ 2010.810309] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2010.829187] RSP: 002b:00007ff162f6ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 08:15:24 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x6}, 0x1c) (async) recvmmsg(r0, &(0x7f0000002900)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/25, 0x19}, {0x0, 0x4}, {&(0x7f0000000100)=""/233, 0xe9}], 0x3}}], 0x1, 0x0, 0x0) (async) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaf9aaaa0086dd601b8b97004d88c19edace0000000000000000000000000000000000011a004e20004d1300"/61], 0x0) 08:15:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x48030000}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:24 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000508000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2010.836875] RAX: ffffffffffffffda RBX: 00007ff164644a20 RCX: 00007ff1645fb037 [ 2010.844136] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2010.851393] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff162f701d0 [ 2010.858645] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2010.865893] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 08:15:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 15) 08:15:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000006ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:24 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000608000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:24 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x4a000000}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000500000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2011.101978] FAULT_INJECTION: forcing a failure. [ 2011.101978] name failslab, interval 1, probability 0, space 0, times 0 [ 2011.114522] CPU: 0 PID: 13317 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2011.122414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2011.131757] Call Trace: [ 2011.134330] dump_stack+0x1fc/0x2ef [ 2011.137940] should_fail.cold+0xa/0xf [ 2011.141737] ? setup_fault_attr+0x200/0x200 [ 2011.146049] ? lock_acquire+0x170/0x3c0 [ 2011.150013] __should_failslab+0x115/0x180 [ 2011.154234] should_failslab+0x5/0x10 [ 2011.158029] kmem_cache_alloc+0x277/0x370 [ 2011.162183] __kernfs_new_node+0xd2/0x680 [ 2011.166327] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2011.171065] ? __mutex_unlock_slowpath+0xea/0x610 [ 2011.175887] ? wait_for_completion_io+0x10/0x10 [ 2011.180537] ? kernfs_next_descendant_post+0x19c/0x290 [ 2011.185809] kernfs_new_node+0x92/0x120 [ 2011.189775] __kernfs_create_file+0x51/0x340 [ 2011.194168] sysfs_add_file_mode_ns+0x226/0x540 [ 2011.198834] internal_create_group+0x355/0xb20 [ 2011.203413] ? sysfs_remove_link_from_group+0x70/0x70 [ 2011.208598] ? lock_downgrade+0x720/0x720 [ 2011.212736] lo_ioctl+0xf7c/0x20e0 [ 2011.216264] ? loop_set_status64+0x110/0x110 [ 2011.220654] blkdev_ioctl+0x5cb/0x1a80 [ 2011.224534] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2011.229887] ? blkpg_ioctl+0x9d0/0x9d0 [ 2011.233757] ? mark_held_locks+0xf0/0xf0 [ 2011.237798] ? mark_held_locks+0xf0/0xf0 [ 2011.241852] ? debug_check_no_obj_freed+0x201/0x490 [ 2011.246861] ? lock_downgrade+0x720/0x720 [ 2011.250988] block_ioctl+0xe9/0x130 [ 2011.254606] ? blkdev_fallocate+0x3f0/0x3f0 [ 2011.258915] do_vfs_ioctl+0xcdb/0x12e0 [ 2011.262796] ? lock_downgrade+0x720/0x720 [ 2011.266931] ? check_preemption_disabled+0x41/0x280 [ 2011.271929] ? ioctl_preallocate+0x200/0x200 [ 2011.276318] ? __fget+0x356/0x510 [ 2011.279753] ? do_dup2+0x450/0x450 [ 2011.283291] ? do_sys_open+0x2bf/0x520 [ 2011.287172] ksys_ioctl+0x9b/0xc0 [ 2011.290607] __x64_sys_ioctl+0x6f/0xb0 [ 2011.294481] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2011.299043] do_syscall_64+0xf9/0x620 [ 2011.302839] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2011.308021] RIP: 0033:0x7ff1645fb037 [ 2011.311717] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2011.330596] RSP: 002b:00007ff162f6ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2011.338289] RAX: ffffffffffffffda RBX: 00007ff164644a20 RCX: 00007ff1645fb037 [ 2011.345545] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 08:15:25 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000708000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2011.352803] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff162f701d0 [ 2011.360052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2011.367301] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 08:15:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 16) 08:15:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000007ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:25 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000908000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2011.524376] FAULT_INJECTION: forcing a failure. [ 2011.524376] name failslab, interval 1, probability 0, space 0, times 0 [ 2011.535833] CPU: 0 PID: 13333 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2011.543722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2011.553074] Call Trace: [ 2011.555670] dump_stack+0x1fc/0x2ef [ 2011.559294] should_fail.cold+0xa/0xf [ 2011.563089] ? setup_fault_attr+0x200/0x200 [ 2011.567403] ? lock_acquire+0x170/0x3c0 [ 2011.571363] __should_failslab+0x115/0x180 [ 2011.575593] should_failslab+0x5/0x10 [ 2011.579381] kmem_cache_alloc+0x277/0x370 [ 2011.583528] __kernfs_new_node+0xd2/0x680 [ 2011.587688] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2011.592450] ? __mutex_unlock_slowpath+0xea/0x610 [ 2011.597284] ? wait_for_completion_io+0x10/0x10 [ 2011.601948] ? kernfs_next_descendant_post+0x19c/0x290 [ 2011.607229] kernfs_new_node+0x92/0x120 [ 2011.611193] __kernfs_create_file+0x51/0x340 [ 2011.615590] sysfs_add_file_mode_ns+0x226/0x540 [ 2011.620247] internal_create_group+0x355/0xb20 [ 2011.624817] ? sysfs_remove_link_from_group+0x70/0x70 [ 2011.629993] ? lock_downgrade+0x720/0x720 [ 2011.634162] lo_ioctl+0xf7c/0x20e0 [ 2011.637712] ? loop_set_status64+0x110/0x110 [ 2011.642120] blkdev_ioctl+0x5cb/0x1a80 [ 2011.646003] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2011.651349] ? blkpg_ioctl+0x9d0/0x9d0 [ 2011.655227] ? mark_held_locks+0xf0/0xf0 [ 2011.659276] ? mark_held_locks+0xf0/0xf0 [ 2011.663333] ? debug_check_no_obj_freed+0x201/0x490 [ 2011.668343] ? lock_downgrade+0x720/0x720 [ 2011.672494] block_ioctl+0xe9/0x130 [ 2011.676118] ? blkdev_fallocate+0x3f0/0x3f0 [ 2011.680439] do_vfs_ioctl+0xcdb/0x12e0 [ 2011.684316] ? lock_downgrade+0x720/0x720 [ 2011.688472] ? check_preemption_disabled+0x41/0x280 [ 2011.693487] ? ioctl_preallocate+0x200/0x200 [ 2011.697899] ? __fget+0x356/0x510 [ 2011.701348] ? do_dup2+0x450/0x450 [ 2011.704887] ? do_sys_open+0x2bf/0x520 [ 2011.708764] ksys_ioctl+0x9b/0xc0 [ 2011.712216] __x64_sys_ioctl+0x6f/0xb0 [ 2011.716102] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2011.720692] do_syscall_64+0xf9/0x620 [ 2011.724484] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2011.729657] RIP: 0033:0x7ff1645fb037 [ 2011.733366] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2011.752290] RSP: 002b:00007ff162f6ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2011.760079] RAX: ffffffffffffffda RBX: 00007ff164644a20 RCX: 00007ff1645fb037 [ 2011.767338] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 08:15:25 executing program 0: perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x800000000000002, 0x0) r0 = mq_open(&(0x7f000084dff0)='!re\x00\x00\x00\x00\x00\x00\x00\x00@c\x00\x00\x00', 0x6e93ebbbcc0884f2, 0x1db, &(0x7f0000000040)={0x9a, 0x0, 0x8, 0x800000000000000}) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = mq_open(0x0, 0x40, 0x0, &(0x7f0000001b00)={0x0, 0x8, 0x5, 0x7ff}) close(r2) mq_timedreceive(r0, 0x0, 0x0, 0x8, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_GET(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20004010}, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000400)=ANY=[], 0x44) mq_timedsend(r3, &(0x7f0000000140)="afbb00b6260706f7cf421259af9ba1481102deb7e950a6634fe8c900d7a3d584efd306d655fcf85d937903927309c85b55a2ec891ce420f6d188f91b0f40cc022b9d6d94df3944299d31fe1c84f638ce30c75fbe78e1a9b63e486ac6cb554922d58b2c4e36a7851306e4a2cb89f83012b4354fc9b560ad3f5e13dd3a8ccab9bb4197f01cf3211c9e60574754b9b701ec6d26eed10f1a6cac00f422bfe0a3f1", 0x9f, 0x3ff, &(0x7f0000000000)) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000d40)=ANY=[@ANYBLOB="5000000010001507faff00000000000002000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012800c0001006d6163766c616e000c00028008000100100000000a000500040000000000000008000a00", @ANYBLOB="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"], 0x50}}, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x22c00, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) statx(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x100, 0x8, &(0x7f00000036c0)) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r1, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000600)={0x124, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x1, 0x35}}}}, [@NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="9ad875c07047a4c67f66e5bb8479fcde"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="f2231d3b3820d89853603506976b7f4049adc3bfafc86db2"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="33bb30d8763885ab3f2fad6b05287b54"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="80817fc6d6eb7309e5ac6f3c399b84d37c46a8020ebf4dcd"}]}, @NL80211_ATTR_REKEY_DATA={0x34, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="e2b41055ff781682c19249a7d65664c0"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x3}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="65874771e832577a189e521f66779a58"}]}, @NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "eadbcf99987c8079"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xc6}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x6}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="1fbe83fed8314f9e6bad8a436fed61aa57bd43b0b7a954ad"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="997dbda5e3fe4065de89ae75388d9f0f"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="b491f3f39ac89beb1a5589a37f5eeea7"}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) ppoll(0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100)={[0x6]}, 0x8) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/255, 0xff, 0x2001, &(0x7f0000000080)={0xa, 0x4e23, 0x401, @mcast1, 0x9}, 0x1c) 08:15:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x4c000000}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2011.774601] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff162f701d0 [ 2011.781864] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2011.789298] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 08:15:25 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000a08000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 17) 08:15:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000600000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000008ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:25 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x56010000}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:25 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000b08000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2012.034071] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 2012.090970] FAULT_INJECTION: forcing a failure. [ 2012.090970] name failslab, interval 1, probability 0, space 0, times 0 [ 2012.171500] CPU: 1 PID: 13368 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2012.179401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2012.188746] Call Trace: [ 2012.191333] dump_stack+0x1fc/0x2ef [ 2012.194975] should_fail.cold+0xa/0xf [ 2012.198767] ? setup_fault_attr+0x200/0x200 [ 2012.203078] ? lock_acquire+0x170/0x3c0 [ 2012.207052] __should_failslab+0x115/0x180 [ 2012.211279] should_failslab+0x5/0x10 [ 2012.215068] kmem_cache_alloc+0x277/0x370 [ 2012.219211] __kernfs_new_node+0xd2/0x680 [ 2012.223352] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2012.228100] ? __mutex_unlock_slowpath+0xea/0x610 [ 2012.232934] ? wait_for_completion_io+0x10/0x10 [ 2012.237593] ? kernfs_next_descendant_post+0x19c/0x290 [ 2012.242863] kernfs_new_node+0x92/0x120 [ 2012.246846] __kernfs_create_file+0x51/0x340 [ 2012.251246] sysfs_add_file_mode_ns+0x226/0x540 [ 2012.255910] internal_create_group+0x355/0xb20 [ 2012.260573] ? sysfs_remove_link_from_group+0x70/0x70 [ 2012.265754] ? lock_downgrade+0x720/0x720 [ 2012.269899] lo_ioctl+0xf7c/0x20e0 [ 2012.273434] ? loop_set_status64+0x110/0x110 [ 2012.277832] blkdev_ioctl+0x5cb/0x1a80 [ 2012.281711] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2012.287063] ? blkpg_ioctl+0x9d0/0x9d0 [ 2012.290959] ? mark_held_locks+0xf0/0xf0 [ 2012.295009] ? mark_held_locks+0xf0/0xf0 [ 2012.299062] ? debug_check_no_obj_freed+0x201/0x490 [ 2012.304074] ? lock_downgrade+0x720/0x720 [ 2012.308221] block_ioctl+0xe9/0x130 [ 2012.311845] ? blkdev_fallocate+0x3f0/0x3f0 [ 2012.316159] do_vfs_ioctl+0xcdb/0x12e0 [ 2012.320035] ? lock_downgrade+0x720/0x720 [ 2012.324172] ? check_preemption_disabled+0x41/0x280 [ 2012.329177] ? ioctl_preallocate+0x200/0x200 [ 2012.333581] ? __fget+0x356/0x510 [ 2012.337027] ? do_dup2+0x450/0x450 [ 2012.340572] ? do_sys_open+0x2bf/0x520 [ 2012.344456] ksys_ioctl+0x9b/0xc0 [ 2012.347898] __x64_sys_ioctl+0x6f/0xb0 [ 2012.351774] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2012.356344] do_syscall_64+0xf9/0x620 [ 2012.360139] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2012.365318] RIP: 0033:0x7ff1645fb037 [ 2012.369019] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2012.387915] RSP: 002b:00007ff162f6ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2012.395612] RAX: ffffffffffffffda RBX: 00007ff164644a20 RCX: 00007ff1645fb037 [ 2012.402867] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2012.410123] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff162f701d0 08:15:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x5cad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2012.417467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2012.424720] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 08:15:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 18) 08:15:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000700000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:26 executing program 0: perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x800000000000002, 0x0) r0 = mq_open(&(0x7f000084dff0)='!re\x00\x00\x00\x00\x00\x00\x00\x00@c\x00\x00\x00', 0x6e93ebbbcc0884f2, 0x1db, &(0x7f0000000040)={0x9a, 0x0, 0x8, 0x800000000000000}) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = mq_open(0x0, 0x40, 0x0, &(0x7f0000001b00)={0x0, 0x8, 0x5, 0x7ff}) close(r2) mq_timedreceive(r0, 0x0, 0x0, 0x8, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_GET(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20004010}, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000400)=ANY=[], 0x44) mq_timedsend(r3, &(0x7f0000000140)="afbb00b6260706f7cf421259af9ba1481102deb7e950a6634fe8c900d7a3d584efd306d655fcf85d937903927309c85b55a2ec891ce420f6d188f91b0f40cc022b9d6d94df3944299d31fe1c84f638ce30c75fbe78e1a9b63e486ac6cb554922d58b2c4e36a7851306e4a2cb89f83012b4354fc9b560ad3f5e13dd3a8ccab9bb4197f01cf3211c9e60574754b9b701ec6d26eed10f1a6cac00f422bfe0a3f1", 0x9f, 0x3ff, &(0x7f0000000000)) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000d40)=ANY=[@ANYBLOB="5000000010001507faff00000000000002000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012800c0001006d6163766c616e000c00028008000100100000000a000500040000000000000008000a00", @ANYBLOB="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"], 0x50}}, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x22c00, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) statx(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x100, 0x8, &(0x7f00000036c0)) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r1, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000600)={0x124, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x1, 0x35}}}}, [@NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="9ad875c07047a4c67f66e5bb8479fcde"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="f2231d3b3820d89853603506976b7f4049adc3bfafc86db2"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="33bb30d8763885ab3f2fad6b05287b54"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="80817fc6d6eb7309e5ac6f3c399b84d37c46a8020ebf4dcd"}]}, @NL80211_ATTR_REKEY_DATA={0x34, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="e2b41055ff781682c19249a7d65664c0"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x3}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="65874771e832577a189e521f66779a58"}]}, @NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "eadbcf99987c8079"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xc6}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x6}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="1fbe83fed8314f9e6bad8a436fed61aa57bd43b0b7a954ad"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="997dbda5e3fe4065de89ae75388d9f0f"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="b491f3f39ac89beb1a5589a37f5eeea7"}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) ppoll(0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100)={[0x6]}, 0x8) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/255, 0xff, 0x2001, &(0x7f0000000080)={0xa, 0x4e23, 0x401, @mcast1, 0x9}, 0x1c) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket$inet6(0xa, 0x800000000000002, 0x0) (async) mq_open(&(0x7f000084dff0)='!re\x00\x00\x00\x00\x00\x00\x00\x00@c\x00\x00\x00', 0x6e93ebbbcc0884f2, 0x1db, &(0x7f0000000040)={0x9a, 0x0, 0x8, 0x800000000000000}) (async) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) (async) socket$netlink(0x10, 0x3, 0x0) (async) mq_open(0x0, 0x40, 0x0, &(0x7f0000001b00)={0x0, 0x8, 0x5, 0x7ff}) (async) close(r2) (async) mq_timedreceive(r0, 0x0, 0x0, 0x8, 0x0) (async) sendmsg$RDMA_NLDEV_CMD_SYS_GET(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20004010}, 0x0) (async) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) (async) write$P9_RREADLINK(r3, &(0x7f0000000400)=ANY=[], 0x44) (async) mq_timedsend(r3, &(0x7f0000000140)="afbb00b6260706f7cf421259af9ba1481102deb7e950a6634fe8c900d7a3d584efd306d655fcf85d937903927309c85b55a2ec891ce420f6d188f91b0f40cc022b9d6d94df3944299d31fe1c84f638ce30c75fbe78e1a9b63e486ac6cb554922d58b2c4e36a7851306e4a2cb89f83012b4354fc9b560ad3f5e13dd3a8ccab9bb4197f01cf3211c9e60574754b9b701ec6d26eed10f1a6cac00f422bfe0a3f1", 0x9f, 0x3ff, &(0x7f0000000000)) (async) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000d40)=ANY=[@ANYBLOB="5000000010001507faff00000000000002000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012800c0001006d6163766c616e000c00028008000100100000000a000500040000000000000008000a00", @ANYBLOB="81ef1e11f4f46bfc27c90920a5dffba55fae41dd01a09d8eabc8d9f0c2e49148cd9ba073823b51c54727ff8d8b9efb8823fc726a12750f01039ca024404bca9e423e7cff8e7b994624de9f0727939c3d8b0fad17ce234a9cb905020000002f3ca7d517c5b68a57c2be2ca2104915ceaea926d2ee9d54f48f5c7091b9f9c401c200009fb78e6f89aed56f1e0adc139e735069234eeb82ab4805759aba8658653f87b5776b2fe94d8cf70194a280c7e963d41c0564be6470d7e777323e12bfb0550c197c5ec5c8b0ce96aea7acb08ee17adb270b8d20731e710e9f9751ebf15245137387b575bda52b1fb0acf873e88530236ad495a69c7630b86d39d1bce1f5619e1b91a3ef5401eea50808f8de4a02377728729c104241457314606c87f9b039a70982f3efad781edb60964362d446865513c4b92014af01f6d6fc44a543df9fa6582c68fc11025d2d70709439a2674aa185ab340d5eb5b741288dcde7033d41ed60a26bf406d00a1e656c8be08abf1069604ed123762bfc778607d3711f24c0cb62d6de56a45f7a90717fb6bc5869df0260e16f8a4e23c92f9163e8d878262ed5fab0a892a8c5a232695ca247d94a296f2a480b96d05f710b2ddbcd7c47d39f5b20d58cd71580db95ff6a01ffa26b87314d88c2f07922a7788b762557903d5889bafdd88ce8c0065902bc0798aa83a8ea2679770dd59add14f1346577a47279a8f8ff202fea0ac1d169bf003c405dbf48910de32efed3fbd512af984f9132a3777dee8749c7ece8c7f2c8b079442009f015ebe83f265476a749d5a1387cb1c55b55ca2b08a5f5014c2ebd1ef7e5c507006e8f6938bf754a626ec0c266cb30f1e19aa0162d47d2a0833469f8447a3d847fb1d762b16960adb3"], 0x50}}, 0x0) (async) openat$full(0xffffffffffffff9c, 0x0, 0x22c00, 0x0) (async) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) (async) statx(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x100, 0x8, &(0x7f00000036c0)) (async) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r1, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000600)={0x124, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x1, 0x35}}}}, [@NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="9ad875c07047a4c67f66e5bb8479fcde"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="f2231d3b3820d89853603506976b7f4049adc3bfafc86db2"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="33bb30d8763885ab3f2fad6b05287b54"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="80817fc6d6eb7309e5ac6f3c399b84d37c46a8020ebf4dcd"}]}, @NL80211_ATTR_REKEY_DATA={0x34, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="e2b41055ff781682c19249a7d65664c0"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x3}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="65874771e832577a189e521f66779a58"}]}, @NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "eadbcf99987c8079"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xc6}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x6}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="1fbe83fed8314f9e6bad8a436fed61aa57bd43b0b7a954ad"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="997dbda5e3fe4065de89ae75388d9f0f"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="b491f3f39ac89beb1a5589a37f5eeea7"}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) (async) ppoll(0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100)={[0x6]}, 0x8) (async) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/255, 0xff, 0x2001, &(0x7f0000000080)={0xa, 0x4e23, 0x401, @mcast1, 0x9}, 0x1c) (async) 08:15:26 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000c08000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000009ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:26 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000e08000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x5dad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2012.736150] FAULT_INJECTION: forcing a failure. [ 2012.736150] name failslab, interval 1, probability 0, space 0, times 0 [ 2012.749484] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 2012.776749] CPU: 0 PID: 13404 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2012.784649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2012.793999] Call Trace: [ 2012.796592] dump_stack+0x1fc/0x2ef [ 2012.800260] should_fail.cold+0xa/0xf [ 2012.804069] ? setup_fault_attr+0x200/0x200 [ 2012.808403] ? lock_acquire+0x170/0x3c0 [ 2012.812376] __should_failslab+0x115/0x180 [ 2012.816621] should_failslab+0x5/0x10 [ 2012.820417] kmem_cache_alloc+0x277/0x370 [ 2012.824552] __kernfs_new_node+0xd2/0x680 [ 2012.828696] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2012.833447] ? __mutex_unlock_slowpath+0xea/0x610 [ 2012.838275] ? wait_for_completion_io+0x10/0x10 [ 2012.842930] ? kernfs_next_descendant_post+0x19c/0x290 [ 2012.848193] kernfs_new_node+0x92/0x120 [ 2012.852165] __kernfs_create_file+0x51/0x340 [ 2012.856579] sysfs_add_file_mode_ns+0x226/0x540 [ 2012.861241] internal_create_group+0x355/0xb20 [ 2012.865828] ? sysfs_remove_link_from_group+0x70/0x70 [ 2012.871004] ? lock_downgrade+0x720/0x720 [ 2012.875141] lo_ioctl+0xf7c/0x20e0 [ 2012.878665] ? loop_set_status64+0x110/0x110 [ 2012.883068] blkdev_ioctl+0x5cb/0x1a80 [ 2012.886996] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2012.892356] ? blkpg_ioctl+0x9d0/0x9d0 [ 2012.896244] ? mark_held_locks+0xf0/0xf0 [ 2012.900285] ? mark_held_locks+0xf0/0xf0 [ 2012.904336] ? debug_check_no_obj_freed+0x201/0x490 [ 2012.909340] ? lock_downgrade+0x720/0x720 [ 2012.913472] block_ioctl+0xe9/0x130 [ 2012.917104] ? blkdev_fallocate+0x3f0/0x3f0 [ 2012.921408] do_vfs_ioctl+0xcdb/0x12e0 [ 2012.925287] ? lock_downgrade+0x720/0x720 [ 2012.929429] ? check_preemption_disabled+0x41/0x280 [ 2012.934427] ? ioctl_preallocate+0x200/0x200 [ 2012.938823] ? __fget+0x356/0x510 [ 2012.942260] ? do_dup2+0x450/0x450 [ 2012.945783] ? do_sys_open+0x2bf/0x520 [ 2012.949672] ksys_ioctl+0x9b/0xc0 [ 2012.953129] __x64_sys_ioctl+0x6f/0xb0 [ 2012.956997] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2012.961571] do_syscall_64+0xf9/0x620 [ 2012.965365] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2012.970540] RIP: 0033:0x7ff1645fb037 [ 2012.974355] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2012.993345] RSP: 002b:00007ff162f6ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2013.001045] RAX: ffffffffffffffda RBX: 00007ff164644a20 RCX: 00007ff1645fb037 [ 2013.008300] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2013.015553] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff162f701d0 [ 2013.022803] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2013.030054] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 08:15:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000800000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2013.080840] nla_parse: 8 callbacks suppressed [ 2013.080866] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2013.115106] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (13410) 08:15:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000010ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:26 executing program 0: perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x800000000000002, 0x0) r0 = mq_open(&(0x7f000084dff0)='!re\x00\x00\x00\x00\x00\x00\x00\x00@c\x00\x00\x00', 0x6e93ebbbcc0884f2, 0x1db, &(0x7f0000000040)={0x9a, 0x0, 0x8, 0x800000000000000}) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = mq_open(0x0, 0x40, 0x0, &(0x7f0000001b00)={0x0, 0x8, 0x5, 0x7ff}) close(r2) mq_timedreceive(r0, 0x0, 0x0, 0x8, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_GET(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20004010}, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000400)=ANY=[], 0x44) mq_timedsend(r3, &(0x7f0000000140)="afbb00b6260706f7cf421259af9ba1481102deb7e950a6634fe8c900d7a3d584efd306d655fcf85d937903927309c85b55a2ec891ce420f6d188f91b0f40cc022b9d6d94df3944299d31fe1c84f638ce30c75fbe78e1a9b63e486ac6cb554922d58b2c4e36a7851306e4a2cb89f83012b4354fc9b560ad3f5e13dd3a8ccab9bb4197f01cf3211c9e60574754b9b701ec6d26eed10f1a6cac00f422bfe0a3f1", 0x9f, 0x3ff, &(0x7f0000000000)) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000d40)=ANY=[@ANYBLOB="5000000010001507faff00000000000002000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012800c0001006d6163766c616e000c00028008000100100000000a000500040000000000000008000a00", @ANYBLOB="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"], 0x50}}, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x22c00, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) statx(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x100, 0x8, &(0x7f00000036c0)) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r1, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000600)={0x124, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x1, 0x35}}}}, [@NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="9ad875c07047a4c67f66e5bb8479fcde"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="f2231d3b3820d89853603506976b7f4049adc3bfafc86db2"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="33bb30d8763885ab3f2fad6b05287b54"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="80817fc6d6eb7309e5ac6f3c399b84d37c46a8020ebf4dcd"}]}, @NL80211_ATTR_REKEY_DATA={0x34, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="e2b41055ff781682c19249a7d65664c0"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x3}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="65874771e832577a189e521f66779a58"}]}, @NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "eadbcf99987c8079"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xc6}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x6}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="1fbe83fed8314f9e6bad8a436fed61aa57bd43b0b7a954ad"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="997dbda5e3fe4065de89ae75388d9f0f"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="b491f3f39ac89beb1a5589a37f5eeea7"}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) ppoll(0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100)={[0x6]}, 0x8) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/255, 0xff, 0x2001, &(0x7f0000000080)={0xa, 0x4e23, 0x401, @mcast1, 0x9}, 0x1c) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket$inet6(0xa, 0x800000000000002, 0x0) (async) mq_open(&(0x7f000084dff0)='!re\x00\x00\x00\x00\x00\x00\x00\x00@c\x00\x00\x00', 0x6e93ebbbcc0884f2, 0x1db, &(0x7f0000000040)={0x9a, 0x0, 0x8, 0x800000000000000}) (async) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) (async) socket$netlink(0x10, 0x3, 0x0) (async) mq_open(0x0, 0x40, 0x0, &(0x7f0000001b00)={0x0, 0x8, 0x5, 0x7ff}) (async) close(r2) (async) mq_timedreceive(r0, 0x0, 0x0, 0x8, 0x0) (async) sendmsg$RDMA_NLDEV_CMD_SYS_GET(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20004010}, 0x0) (async) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) (async) write$P9_RREADLINK(r3, &(0x7f0000000400)=ANY=[], 0x44) (async) mq_timedsend(r3, &(0x7f0000000140)="afbb00b6260706f7cf421259af9ba1481102deb7e950a6634fe8c900d7a3d584efd306d655fcf85d937903927309c85b55a2ec891ce420f6d188f91b0f40cc022b9d6d94df3944299d31fe1c84f638ce30c75fbe78e1a9b63e486ac6cb554922d58b2c4e36a7851306e4a2cb89f83012b4354fc9b560ad3f5e13dd3a8ccab9bb4197f01cf3211c9e60574754b9b701ec6d26eed10f1a6cac00f422bfe0a3f1", 0x9f, 0x3ff, &(0x7f0000000000)) (async) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000d40)=ANY=[@ANYBLOB="5000000010001507faff00000000000002000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012800c0001006d6163766c616e000c00028008000100100000000a000500040000000000000008000a00", @ANYBLOB="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"], 0x50}}, 0x0) (async) openat$full(0xffffffffffffff9c, 0x0, 0x22c00, 0x0) (async) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) (async) statx(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x100, 0x8, &(0x7f00000036c0)) (async) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r1, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000600)={0x124, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x1, 0x35}}}}, [@NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="9ad875c07047a4c67f66e5bb8479fcde"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="f2231d3b3820d89853603506976b7f4049adc3bfafc86db2"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="33bb30d8763885ab3f2fad6b05287b54"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="80817fc6d6eb7309e5ac6f3c399b84d37c46a8020ebf4dcd"}]}, @NL80211_ATTR_REKEY_DATA={0x34, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="e2b41055ff781682c19249a7d65664c0"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x3}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="65874771e832577a189e521f66779a58"}]}, @NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "eadbcf99987c8079"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xc6}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x6}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="1fbe83fed8314f9e6bad8a436fed61aa57bd43b0b7a954ad"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="997dbda5e3fe4065de89ae75388d9f0f"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="b491f3f39ac89beb1a5589a37f5eeea7"}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) (async) ppoll(0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100)={[0x6]}, 0x8) (async) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/255, 0xff, 0x2001, &(0x7f0000000080)={0xa, 0x4e23, 0x401, @mcast1, 0x9}, 0x1c) (async) 08:15:26 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000f08000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:26 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x5e000000}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 19) 08:15:26 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000900000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2013.285539] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:26 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000fe0f08000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2013.374058] FAULT_INJECTION: forcing a failure. [ 2013.374058] name failslab, interval 1, probability 0, space 0, times 0 08:15:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x5ead0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2013.415861] CPU: 1 PID: 13459 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2013.423766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2013.433125] Call Trace: [ 2013.435715] dump_stack+0x1fc/0x2ef [ 2013.439349] should_fail.cold+0xa/0xf [ 2013.443155] ? setup_fault_attr+0x200/0x200 [ 2013.447474] ? lock_acquire+0x170/0x3c0 [ 2013.451460] ? dev_uevent_filter+0xd0/0xd0 [ 2013.455697] __should_failslab+0x115/0x180 [ 2013.459936] should_failslab+0x5/0x10 [ 2013.463740] kmem_cache_alloc_trace+0x284/0x380 [ 2013.468418] ? dev_uevent_filter+0xd0/0xd0 [ 2013.472660] kobject_uevent_env+0x236/0x1480 [ 2013.477082] lo_ioctl+0xff9/0x20e0 [ 2013.480641] ? loop_set_status64+0x110/0x110 [ 2013.485058] blkdev_ioctl+0x5cb/0x1a80 [ 2013.488944] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2013.494304] ? blkpg_ioctl+0x9d0/0x9d0 [ 2013.498196] ? mark_held_locks+0xf0/0xf0 [ 2013.502257] ? mark_held_locks+0xf0/0xf0 [ 2013.506325] ? debug_check_no_obj_freed+0x201/0x490 [ 2013.511356] ? lock_downgrade+0x720/0x720 08:15:27 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x5fad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2013.515514] block_ioctl+0xe9/0x130 [ 2013.519142] ? blkdev_fallocate+0x3f0/0x3f0 [ 2013.523474] do_vfs_ioctl+0xcdb/0x12e0 [ 2013.527371] ? lock_downgrade+0x720/0x720 [ 2013.531525] ? check_preemption_disabled+0x41/0x280 [ 2013.536546] ? ioctl_preallocate+0x200/0x200 [ 2013.540838] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 2013.540958] ? __fget+0x356/0x510 [ 2013.540975] ? do_dup2+0x450/0x450 [ 2013.555287] ? do_sys_open+0x2bf/0x520 [ 2013.559188] ksys_ioctl+0x9b/0xc0 [ 2013.562649] __x64_sys_ioctl+0x6f/0xb0 [ 2013.566543] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2013.571131] do_syscall_64+0xf9/0x620 [ 2013.574941] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2013.580130] RIP: 0033:0x7ff1645fb037 [ 2013.583846] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2013.602747] RSP: 002b:00007ff162f6ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2013.610456] RAX: ffffffffffffffda RBX: 00007ff164644a20 RCX: 00007ff1645fb037 [ 2013.617725] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2013.624993] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff162f701d0 [ 2013.632263] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2013.639528] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 08:15:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000001fffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:27 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001001000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 20) [ 2013.906106] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2013.913377] FAULT_INJECTION: forcing a failure. [ 2013.913377] name failslab, interval 1, probability 0, space 0, times 0 [ 2013.934208] CPU: 0 PID: 13514 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2013.942098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2013.951453] Call Trace: 08:15:27 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000521d08000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2013.954049] dump_stack+0x1fc/0x2ef [ 2013.957688] should_fail.cold+0xa/0xf [ 2013.961489] ? setup_fault_attr+0x200/0x200 [ 2013.965791] ? lock_acquire+0x170/0x3c0 [ 2013.969749] __should_failslab+0x115/0x180 [ 2013.973983] should_failslab+0x5/0x10 [ 2013.977788] kmem_cache_alloc+0x277/0x370 [ 2013.981940] __kernfs_new_node+0xd2/0x680 [ 2013.986069] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 2013.990808] ? __mutex_unlock_slowpath+0xea/0x610 [ 2013.995636] ? wait_for_completion_io+0x10/0x10 [ 2014.000286] ? kernfs_next_descendant_post+0x19c/0x290 [ 2014.005550] kernfs_new_node+0x92/0x120 [ 2014.009506] __kernfs_create_file+0x51/0x340 [ 2014.013903] sysfs_add_file_mode_ns+0x226/0x540 [ 2014.018562] internal_create_group+0x355/0xb20 [ 2014.023190] ? sysfs_remove_link_from_group+0x70/0x70 [ 2014.028380] ? lock_downgrade+0x720/0x720 [ 2014.032517] lo_ioctl+0xf7c/0x20e0 [ 2014.036097] ? loop_set_status64+0x110/0x110 [ 2014.040490] blkdev_ioctl+0x5cb/0x1a80 [ 2014.044366] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2014.049732] ? blkpg_ioctl+0x9d0/0x9d0 [ 2014.053603] ? mark_held_locks+0xf0/0xf0 [ 2014.057643] ? mark_held_locks+0xf0/0xf0 [ 2014.061693] ? debug_check_no_obj_freed+0x201/0x490 [ 2014.066695] ? lock_downgrade+0x720/0x720 [ 2014.070834] block_ioctl+0xe9/0x130 [ 2014.074451] ? blkdev_fallocate+0x3f0/0x3f0 [ 2014.078752] do_vfs_ioctl+0xcdb/0x12e0 [ 2014.082636] ? lock_downgrade+0x720/0x720 [ 2014.086777] ? check_preemption_disabled+0x41/0x280 [ 2014.091775] ? ioctl_preallocate+0x200/0x200 [ 2014.096177] ? __fget+0x356/0x510 [ 2014.099627] ? do_dup2+0x450/0x450 [ 2014.103149] ? do_sys_open+0x2bf/0x520 [ 2014.107039] ksys_ioctl+0x9b/0xc0 [ 2014.110476] __x64_sys_ioctl+0x6f/0xb0 [ 2014.114347] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2014.118916] do_syscall_64+0xf9/0x620 [ 2014.122717] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2014.127979] RIP: 0033:0x7ff1645fb037 [ 2014.131672] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2014.150551] RSP: 002b:00007ff162f6ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2014.158241] RAX: ffffffffffffffda RBX: 00007ff164644a20 RCX: 00007ff1645fb037 [ 2014.165498] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2014.172761] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff162f701d0 [ 2014.180010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2014.187259] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 08:15:28 executing program 0: perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x800000000000002, 0x0) r0 = mq_open(&(0x7f000084dff0)='!re\x00\x00\x00\x00\x00\x00\x00\x00@c\x00\x00\x00', 0x6e93ebbbcc0884f2, 0x1db, &(0x7f0000000040)={0x9a, 0x0, 0x8, 0x800000000000000}) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = mq_open(0x0, 0x40, 0x0, &(0x7f0000001b00)={0x0, 0x8, 0x5, 0x7ff}) close(r2) mq_timedreceive(r0, 0x0, 0x0, 0x8, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_GET(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20004010}, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000000400)=ANY=[], 0x44) mq_timedsend(r3, &(0x7f0000000140)="afbb00b6260706f7cf421259af9ba1481102deb7e950a6634fe8c900d7a3d584efd306d655fcf85d937903927309c85b55a2ec891ce420f6d188f91b0f40cc022b9d6d94df3944299d31fe1c84f638ce30c75fbe78e1a9b63e486ac6cb554922d58b2c4e36a7851306e4a2cb89f83012b4354fc9b560ad3f5e13dd3a8ccab9bb4197f01cf3211c9e60574754b9b701ec6d26eed10f1a6cac00f422bfe0a3f1", 0x9f, 0x3ff, &(0x7f0000000000)) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000d40)=ANY=[@ANYBLOB="5000000010001507faff00000000000002000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012800c0001006d6163766c616e000c00028008000100100000000a000500040000000000000008000a00", @ANYBLOB="81ef1e11f4f46bfc27c90920a5dffba55fae41dd01a09d8eabc8d9f0c2e49148cd9ba073823b51c54727ff8d8b9efb8823fc726a12750f01039ca024404bca9e423e7cff8e7b994624de9f0727939c3d8b0fad17ce234a9cb905020000002f3ca7d517c5b68a57c2be2ca2104915ceaea926d2ee9d54f48f5c7091b9f9c401c200009fb78e6f89aed56f1e0adc139e735069234eeb82ab4805759aba8658653f87b5776b2fe94d8cf70194a280c7e963d41c0564be6470d7e777323e12bfb0550c197c5ec5c8b0ce96aea7acb08ee17adb270b8d20731e710e9f9751ebf15245137387b575bda52b1fb0acf873e88530236ad495a69c7630b86d39d1bce1f5619e1b91a3ef5401eea50808f8de4a02377728729c104241457314606c87f9b039a70982f3efad781edb60964362d446865513c4b92014af01f6d6fc44a543df9fa6582c68fc11025d2d70709439a2674aa185ab340d5eb5b741288dcde7033d41ed60a26bf406d00a1e656c8be08abf1069604ed123762bfc778607d3711f24c0cb62d6de56a45f7a90717fb6bc5869df0260e16f8a4e23c92f9163e8d878262ed5fab0a892a8c5a232695ca247d94a296f2a480b96d05f710b2ddbcd7c47d39f5b20d58cd71580db95ff6a01ffa26b87314d88c2f07922a7788b762557903d5889bafdd88ce8c0065902bc0798aa83a8ea2679770dd59add14f1346577a47279a8f8ff202fea0ac1d169bf003c405dbf48910de32efed3fbd512af984f9132a3777dee8749c7ece8c7f2c8b079442009f015ebe83f265476a749d5a1387cb1c55b55ca2b08a5f5014c2ebd1ef7e5c507006e8f6938bf754a626ec0c266cb30f1e19aa0162d47d2a0833469f8447a3d847fb1d762b16960adb3"], 0x50}}, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x22c00, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) statx(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x100, 0x8, &(0x7f00000036c0)) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r1, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000600)={0x124, 0x0, 0x20, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x1, 0x35}}}}, [@NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="9ad875c07047a4c67f66e5bb8479fcde"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="f2231d3b3820d89853603506976b7f4049adc3bfafc86db2"}, @NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="33bb30d8763885ab3f2fad6b05287b54"}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="80817fc6d6eb7309e5ac6f3c399b84d37c46a8020ebf4dcd"}]}, @NL80211_ATTR_REKEY_DATA={0x34, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x14, 0x1, @kek="e2b41055ff781682c19249a7d65664c0"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x3}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="65874771e832577a189e521f66779a58"}]}, @NL80211_ATTR_REKEY_DATA={0x64, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_REPLAY_CTR={0xc, 0x3, "eadbcf99987c8079"}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0xc6}, @NL80211_REKEY_DATA_AKM={0x8, 0x4, 0x6}, @NL80211_REKEY_DATA_KCK={0x1c, 0x2, @kck_ext="1fbe83fed8314f9e6bad8a436fed61aa57bd43b0b7a954ad"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="997dbda5e3fe4065de89ae75388d9f0f"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="b491f3f39ac89beb1a5589a37f5eeea7"}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) ppoll(0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100)={[0x6]}, 0x8) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/255, 0xff, 0x2001, &(0x7f0000000080)={0xa, 0x4e23, 0x401, @mcast1, 0x9}, 0x1c) 08:15:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x60000000}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 21) [ 2014.337014] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:28 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000002008000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001002300000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000020ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x60ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2014.549617] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2014.563627] FAULT_INJECTION: forcing a failure. [ 2014.563627] name failslab, interval 1, probability 0, space 0, times 0 [ 2014.585251] CPU: 1 PID: 13550 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2014.593145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2014.602505] Call Trace: [ 2014.605109] dump_stack+0x1fc/0x2ef [ 2014.608747] should_fail.cold+0xa/0xf [ 2014.612559] ? setup_fault_attr+0x200/0x200 [ 2014.616893] ? lock_acquire+0x170/0x3c0 [ 2014.620882] ? dev_uevent_filter+0xd0/0xd0 [ 2014.625296] __should_failslab+0x115/0x180 [ 2014.629535] should_failslab+0x5/0x10 [ 2014.633336] kmem_cache_alloc_trace+0x284/0x380 [ 2014.638013] ? dev_uevent_filter+0xd0/0xd0 [ 2014.642252] kobject_uevent_env+0x236/0x1480 [ 2014.646676] lo_ioctl+0xff9/0x20e0 [ 2014.650229] ? loop_set_status64+0x110/0x110 [ 2014.653944] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 2014.654647] blkdev_ioctl+0x5cb/0x1a80 [ 2014.654665] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2014.654681] ? blkpg_ioctl+0x9d0/0x9d0 [ 2014.675128] ? mark_held_locks+0xf0/0xf0 [ 2014.679195] ? mark_held_locks+0xf0/0xf0 [ 2014.683267] ? debug_check_no_obj_freed+0x201/0x490 [ 2014.688287] ? lock_downgrade+0x720/0x720 [ 2014.692447] block_ioctl+0xe9/0x130 [ 2014.696071] ? blkdev_fallocate+0x3f0/0x3f0 [ 2014.700397] do_vfs_ioctl+0xcdb/0x12e0 [ 2014.704292] ? lock_downgrade+0x720/0x720 [ 2014.708448] ? check_preemption_disabled+0x41/0x280 [ 2014.713472] ? ioctl_preallocate+0x200/0x200 [ 2014.717891] ? __fget+0x356/0x510 [ 2014.721355] ? do_dup2+0x450/0x450 [ 2014.724900] ? do_sys_open+0x2bf/0x520 [ 2014.728798] ksys_ioctl+0x9b/0xc0 [ 2014.732258] __x64_sys_ioctl+0x6f/0xb0 [ 2014.736153] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2014.740735] do_syscall_64+0xf9/0x620 [ 2014.744544] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2014.749753] RIP: 0033:0x7ff1645fb037 [ 2014.753461] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2014.772360] RSP: 002b:00007ff162f6ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2014.780078] RAX: ffffffffffffffda RBX: 00007ff164644a20 RCX: 00007ff1645fb037 [ 2014.787350] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 08:15:28 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000004808000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x61ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2014.794623] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff162f701d0 [ 2014.801980] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2014.809248] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 08:15:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001005e00000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2014.843842] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:28 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000004c08000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000023ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = socket$inet(0x2, 0x80003, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) syz_open_dev$sndctrl(&(0x7f0000001440), 0x0, 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000100)=0x0) write$FUSE_ATTR(r1, &(0x7f0000000340)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}}}, 0x78) fcntl$setstatus(r1, 0x4, 0x6800) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x8, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x200a00}]) getsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000040)={@empty, @multicast2}, &(0x7f0000000080)=0x8) openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(0xffffffffffffffff, 0x4147, 0x0) 08:15:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 22) 08:15:28 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x62ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:28 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c0001000800000000001d5208000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:28 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001006800000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2015.056696] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2015.121525] FAULT_INJECTION: forcing a failure. [ 2015.121525] name failslab, interval 1, probability 0, space 0, times 0 [ 2015.156608] CPU: 1 PID: 13594 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2015.164505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2015.173853] Call Trace: [ 2015.176463] dump_stack+0x1fc/0x2ef [ 2015.180102] should_fail.cold+0xa/0xf [ 2015.183911] ? setup_fault_attr+0x200/0x200 [ 2015.188233] ? lock_acquire+0x170/0x3c0 [ 2015.192215] __should_failslab+0x115/0x180 [ 2015.196463] should_failslab+0x5/0x10 [ 2015.200359] kmem_cache_alloc_node+0x245/0x3b0 [ 2015.204949] __alloc_skb+0x71/0x560 [ 2015.208587] alloc_uevent_skb+0x7b/0x210 [ 2015.212660] kobject_uevent_env+0xa90/0x1480 [ 2015.217084] lo_ioctl+0xff9/0x20e0 [ 2015.220629] ? loop_set_status64+0x110/0x110 [ 2015.225022] blkdev_ioctl+0x5cb/0x1a80 [ 2015.228892] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2015.234235] ? blkpg_ioctl+0x9d0/0x9d0 [ 2015.238114] ? mark_held_locks+0xf0/0xf0 [ 2015.242169] ? mark_held_locks+0xf0/0xf0 [ 2015.246240] ? debug_check_no_obj_freed+0x201/0x490 [ 2015.251256] ? lock_downgrade+0x720/0x720 [ 2015.255405] block_ioctl+0xe9/0x130 [ 2015.259038] ? blkdev_fallocate+0x3f0/0x3f0 [ 2015.263362] do_vfs_ioctl+0xcdb/0x12e0 [ 2015.267261] ? lock_downgrade+0x720/0x720 [ 2015.271395] ? check_preemption_disabled+0x41/0x280 [ 2015.276394] ? ioctl_preallocate+0x200/0x200 [ 2015.280787] ? __fget+0x356/0x510 [ 2015.284220] ? do_dup2+0x450/0x450 [ 2015.287743] ? do_sys_open+0x2bf/0x520 [ 2015.291626] ksys_ioctl+0x9b/0xc0 [ 2015.295065] __x64_sys_ioctl+0x6f/0xb0 [ 2015.298937] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2015.303520] do_syscall_64+0xf9/0x620 [ 2015.307324] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2015.312496] RIP: 0033:0x7ff1645fb037 [ 2015.316191] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2015.335078] RSP: 002b:00007ff162f6ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2015.342765] RAX: ffffffffffffffda RBX: 00007ff164644a20 RCX: 00007ff1645fb037 [ 2015.350015] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2015.357269] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff162f701d0 [ 2015.364527] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2015.371786] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 2015.389595] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x63ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) (async) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) r0 = socket$inet(0x2, 0x80003, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) (async) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) (async) syz_open_dev$sndctrl(&(0x7f0000001440), 0x0, 0x0) (async) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000100)=0x0) (async) write$FUSE_ATTR(r1, &(0x7f0000000340)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}}}, 0x78) fcntl$setstatus(r1, 0x4, 0x6800) (async) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x8, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x200a00}]) (async) getsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000040)={@empty, @multicast2}, &(0x7f0000000080)=0x8) openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(0xffffffffffffffff, 0x4147, 0x0) 08:15:29 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000655808000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 23) 08:15:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001009000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000003fffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x64ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2015.558477] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2015.622056] FAULT_INJECTION: forcing a failure. [ 2015.622056] name failslab, interval 1, probability 0, space 0, times 0 [ 2015.640126] CPU: 1 PID: 13635 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2015.648028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2015.657382] Call Trace: [ 2015.659979] dump_stack+0x1fc/0x2ef [ 2015.663615] should_fail.cold+0xa/0xf [ 2015.667424] ? setup_fault_attr+0x200/0x200 [ 2015.671750] ? lock_acquire+0x170/0x3c0 [ 2015.675736] __should_failslab+0x115/0x180 [ 2015.679977] should_failslab+0x5/0x10 [ 2015.683785] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2015.688902] __kmalloc_node_track_caller+0x38/0x70 [ 2015.692111] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2015.693857] __alloc_skb+0xae/0x560 [ 2015.706098] alloc_uevent_skb+0x7b/0x210 [ 2015.710169] kobject_uevent_env+0xa90/0x1480 [ 2015.714593] lo_ioctl+0xff9/0x20e0 [ 2015.718143] ? loop_set_status64+0x110/0x110 [ 2015.722542] blkdev_ioctl+0x5cb/0x1a80 [ 2015.726422] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2015.731780] ? blkpg_ioctl+0x9d0/0x9d0 [ 2015.735674] ? mark_held_locks+0xf0/0xf0 [ 2015.739742] ? mark_held_locks+0xf0/0xf0 [ 2015.743809] ? debug_check_no_obj_freed+0x201/0x490 [ 2015.748836] ? lock_downgrade+0x720/0x720 [ 2015.752986] block_ioctl+0xe9/0x130 [ 2015.756613] ? blkdev_fallocate+0x3f0/0x3f0 [ 2015.760938] do_vfs_ioctl+0xcdb/0x12e0 [ 2015.764825] ? lock_downgrade+0x720/0x720 [ 2015.768985] ? check_preemption_disabled+0x41/0x280 [ 2015.774015] ? ioctl_preallocate+0x200/0x200 [ 2015.778431] ? __fget+0x356/0x510 [ 2015.781894] ? do_dup2+0x450/0x450 [ 2015.785440] ? do_sys_open+0x2bf/0x520 [ 2015.789345] ksys_ioctl+0x9b/0xc0 [ 2015.792803] __x64_sys_ioctl+0x6f/0xb0 [ 2015.797038] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2015.801620] do_syscall_64+0xf9/0x620 [ 2015.805431] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2015.810622] RIP: 0033:0x7ff1645fb037 [ 2015.814336] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2015.833242] RSP: 002b:00007ff162f6ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2015.840950] RAX: ffffffffffffffda RBX: 00007ff164644a20 RCX: 00007ff1645fb037 [ 2015.848216] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2015.855491] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff162f701d0 [ 2015.862754] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 08:15:29 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000006008000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) (async) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) (async) r0 = socket$inet(0x2, 0x80003, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@broute={'broute\x00', 0x20, 0x2, 0x330, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]}, 0x3a8) (async) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) (async) syz_open_dev$sndctrl(&(0x7f0000001440), 0x0, 0x0) (async, rerun: 32) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) (rerun: 32) io_setup(0x81, &(0x7f0000000100)=0x0) (async, rerun: 64) write$FUSE_ATTR(r1, &(0x7f0000000340)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff}}}, 0x78) (async, rerun: 64) fcntl$setstatus(r1, 0x4, 0x6800) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x8, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x200a00}]) (async) getsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000040)={@empty, @multicast2}, &(0x7f0000000080)=0x8) (async) openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) (async) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(0xffffffffffffffff, 0x4147, 0x0) 08:15:29 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000586508000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:29 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000006808000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:29 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000006c08000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2015.870022] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 08:15:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x65580000}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000000100a500000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:29 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000007408000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 24) 08:15:29 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000000}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0x800, 0x4) perf_event_open(0x0, 0xffffffffffffffff, 0x7, r0, 0x8) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000240)={{0x18, 0x1}, {0x7, 0x1f}, 0x1ff, 0x2, 0x3f}) ioctl$TUNSETTXFILTER(r1, 0x400454d1, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @initdev}, &(0x7f0000000140)=0x10) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) kexec_load(0xd00, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x1128b9000, 0x3e0000}], 0x0) 08:15:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000048ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:29 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000007a08000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x65ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:29 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000000100a600000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2016.162327] FAULT_INJECTION: forcing a failure. [ 2016.162327] name failslab, interval 1, probability 0, space 0, times 0 [ 2016.240005] CPU: 1 PID: 13687 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2016.247917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2016.257267] Call Trace: [ 2016.259863] dump_stack+0x1fc/0x2ef [ 2016.263501] should_fail.cold+0xa/0xf [ 2016.267319] ? setup_fault_attr+0x200/0x200 [ 2016.271649] ? lock_acquire+0x170/0x3c0 [ 2016.275633] __should_failslab+0x115/0x180 [ 2016.279877] should_failslab+0x5/0x10 [ 2016.283685] kmem_cache_alloc_trace+0x284/0x380 [ 2016.288354] ? wait_for_completion_io+0x10/0x10 [ 2016.293026] ? kobj_ns_initial+0x90/0x90 [ 2016.297094] call_usermodehelper_setup+0x84/0x300 [ 2016.301949] kobject_uevent_env+0xe83/0x1480 [ 2016.306377] lo_ioctl+0xff9/0x20e0 [ 2016.309929] ? loop_set_status64+0x110/0x110 [ 2016.314341] blkdev_ioctl+0x5cb/0x1a80 [ 2016.318231] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2016.323598] ? blkpg_ioctl+0x9d0/0x9d0 [ 2016.327491] ? mark_held_locks+0xf0/0xf0 [ 2016.331550] ? mark_held_locks+0xf0/0xf0 [ 2016.335612] ? debug_check_no_obj_freed+0x201/0x490 [ 2016.340640] ? lock_downgrade+0x720/0x720 [ 2016.344788] block_ioctl+0xe9/0x130 [ 2016.348415] ? blkdev_fallocate+0x3f0/0x3f0 [ 2016.352741] do_vfs_ioctl+0xcdb/0x12e0 [ 2016.356632] ? lock_downgrade+0x720/0x720 [ 2016.360960] ? check_preemption_disabled+0x41/0x280 [ 2016.365981] ? ioctl_preallocate+0x200/0x200 [ 2016.370403] ? __fget+0x356/0x510 [ 2016.373860] ? do_dup2+0x450/0x450 [ 2016.377408] ? do_sys_open+0x2bf/0x520 [ 2016.381307] ksys_ioctl+0x9b/0xc0 [ 2016.384784] __x64_sys_ioctl+0x6f/0xb0 [ 2016.388677] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2016.393261] do_syscall_64+0xf9/0x620 [ 2016.397075] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2016.402265] RIP: 0033:0x7ff1645fb037 [ 2016.405981] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2016.424881] RSP: 002b:00007ff162f6ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2016.432594] RAX: ffffffffffffffda RBX: 00007ff164644a20 RCX: 00007ff1645fb037 08:15:29 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000008108000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:29 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x66020000}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:29 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c00010008000000000000f008000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x66ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:30 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c0001000800000000000ffe08000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:30 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000000}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0x800, 0x4) perf_event_open(0x0, 0xffffffffffffffff, 0x7, r0, 0x8) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000240)={{0x18, 0x1}, {0x7, 0x1f}, 0x1ff, 0x2, 0x3f}) ioctl$TUNSETTXFILTER(r1, 0x400454d1, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @initdev}, &(0x7f0000000140)=0x10) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) kexec_load(0xd00, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x1128b9000, 0x3e0000}], 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000000}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) (async) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0x800, 0x4) (async) perf_event_open(0x0, 0xffffffffffffffff, 0x7, r0, 0x8) (async) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000240)={{0x18, 0x1}, {0x7, 0x1f}, 0x1ff, 0x2, 0x3f}) (async) ioctl$TUNSETTXFILTER(r1, 0x400454d1, 0x0) (async) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) (async) getsockname$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @initdev}, &(0x7f0000000140)=0x10) (async) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) (async) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async) kexec_load(0xd00, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x1128b9000, 0x3e0000}], 0x0) (async) [ 2016.439863] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2016.447164] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff162f701d0 [ 2016.454434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2016.461704] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 08:15:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 25) 08:15:30 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000fffe08000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000004cffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x67ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000000100dc00000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:30 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000000}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) (async, rerun: 64) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) (rerun: 64) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0x800, 0x4) (async) perf_event_open(0x0, 0xffffffffffffffff, 0x7, r0, 0x8) (async) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000240)={{0x18, 0x1}, {0x7, 0x1f}, 0x1ff, 0x2, 0x3f}) (async) ioctl$TUNSETTXFILTER(r1, 0x400454d1, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) (async, rerun: 64) getsockname$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @initdev}, &(0x7f0000000140)=0x10) (async, rerun: 64) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) (async, rerun: 64) kexec_load(0xd00, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x1128b9000, 0x3e0000}], 0x0) (rerun: 64) 08:15:30 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c0001000800000000000fff08000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2016.735060] FAULT_INJECTION: forcing a failure. [ 2016.735060] name failslab, interval 1, probability 0, space 0, times 0 [ 2016.754803] CPU: 1 PID: 13731 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2016.762701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2016.772054] Call Trace: [ 2016.774649] dump_stack+0x1fc/0x2ef [ 2016.778285] should_fail.cold+0xa/0xf [ 2016.782095] ? setup_fault_attr+0x200/0x200 [ 2016.786420] ? lock_acquire+0x170/0x3c0 [ 2016.790416] __should_failslab+0x115/0x180 [ 2016.794670] should_failslab+0x5/0x10 [ 2016.798478] kmem_cache_alloc+0x277/0x370 [ 2016.802634] skb_clone+0x151/0x3d0 [ 2016.806178] netlink_broadcast_filtered+0x8e5/0xbc0 [ 2016.811205] netlink_broadcast+0x35/0x40 [ 2016.815275] kobject_uevent_env+0xa56/0x1480 [ 2016.819699] lo_ioctl+0xff9/0x20e0 [ 2016.823236] ? loop_set_status64+0x110/0x110 [ 2016.827626] blkdev_ioctl+0x5cb/0x1a80 [ 2016.831508] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2016.836876] ? blkpg_ioctl+0x9d0/0x9d0 [ 2016.840768] ? mark_held_locks+0xf0/0xf0 [ 2016.844836] ? mark_held_locks+0xf0/0xf0 [ 2016.848905] ? debug_check_no_obj_freed+0x201/0x490 [ 2016.853933] ? lock_downgrade+0x720/0x720 [ 2016.858086] block_ioctl+0xe9/0x130 [ 2016.861711] ? blkdev_fallocate+0x3f0/0x3f0 [ 2016.866125] do_vfs_ioctl+0xcdb/0x12e0 [ 2016.870031] ? lock_downgrade+0x720/0x720 [ 2016.874181] ? check_preemption_disabled+0x41/0x280 [ 2016.879261] ? ioctl_preallocate+0x200/0x200 [ 2016.883760] ? __fget+0x356/0x510 [ 2016.887215] ? do_dup2+0x450/0x450 [ 2016.890759] ? do_sys_open+0x2bf/0x520 [ 2016.894652] ksys_ioctl+0x9b/0xc0 [ 2016.898106] __x64_sys_ioctl+0x6f/0xb0 [ 2016.901996] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2016.906585] do_syscall_64+0xf9/0x620 [ 2016.910394] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2016.915577] RIP: 0033:0x7ff1645fb037 [ 2016.919292] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 34 54 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2016.938194] RSP: 002b:00007ff162f6ff28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2016.945901] RAX: ffffffffffffffda RBX: 00007ff164644a20 RCX: 00007ff1645fb037 [ 2016.953167] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2016.960434] RBP: 0000000000000005 R08: 0000000000000000 R09: 00007ff162f701d0 [ 2016.967700] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 2016.974965] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 08:15:30 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000feff08000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x68000000}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000068ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 26) 08:15:30 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001007701000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:30 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000003000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x68ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2017.221679] FAULT_INJECTION: forcing a failure. [ 2017.221679] name failslab, interval 1, probability 0, space 0, times 0 [ 2017.254509] CPU: 1 PID: 13770 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2017.262409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2017.271762] Call Trace: [ 2017.274356] dump_stack+0x1fc/0x2ef [ 2017.278000] should_fail.cold+0xa/0xf [ 2017.281810] ? setup_fault_attr+0x200/0x200 [ 2017.286134] ? lock_acquire+0x170/0x3c0 [ 2017.290116] __should_failslab+0x115/0x180 [ 2017.294359] should_failslab+0x5/0x10 [ 2017.298164] kmem_cache_alloc+0x277/0x370 [ 2017.302319] getname_flags+0xce/0x590 [ 2017.306126] do_mkdirat+0x8d/0x2d0 [ 2017.309677] ? __ia32_sys_mknod+0x120/0x120 [ 2017.314004] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 08:15:30 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x69ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2017.319465] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2017.324484] ? do_syscall_64+0x21/0x620 [ 2017.328470] do_syscall_64+0xf9/0x620 [ 2017.332280] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2017.337466] RIP: 0033:0x7ff1645fa387 [ 2017.341183] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2017.360083] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 08:15:31 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000005000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 27) [ 2017.367792] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fa387 [ 2017.375063] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 2017.382330] RBP: 00007ff162f701d0 R08: 0000000000000000 R09: 00007ff162f701d0 [ 2017.389599] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2017.396870] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 [ 2017.517897] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 2017.564880] FAULT_INJECTION: forcing a failure. [ 2017.564880] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2017.576705] CPU: 1 PID: 13797 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2017.584592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2017.593941] Call Trace: [ 2017.596539] dump_stack+0x1fc/0x2ef [ 2017.600175] should_fail.cold+0xa/0xf [ 2017.603989] ? setup_fault_attr+0x200/0x200 [ 2017.608315] ? wake_up_q+0x93/0xe0 [ 2017.611862] ? __mutex_unlock_slowpath+0x2be/0x610 [ 2017.616800] __alloc_pages_nodemask+0x239/0x2890 [ 2017.621569] ? __lock_acquire+0x6de/0x3ff0 [ 2017.625823] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2017.630671] ? blkdev_ioctl+0x11a/0x1a80 [ 2017.634743] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2017.640112] ? blkpg_ioctl+0x9d0/0x9d0 [ 2017.644015] ? debug_check_no_obj_freed+0x201/0x490 [ 2017.649044] ? lock_downgrade+0x720/0x720 [ 2017.653202] cache_grow_begin+0xa4/0x8a0 [ 2017.657270] ? setup_fault_attr+0x200/0x200 [ 2017.661590] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 2017.666350] cache_alloc_refill+0x273/0x340 [ 2017.670682] kmem_cache_alloc+0x346/0x370 [ 2017.674838] getname_flags+0xce/0x590 [ 2017.678644] do_mkdirat+0x8d/0x2d0 [ 2017.682187] ? __ia32_sys_mknod+0x120/0x120 [ 2017.686517] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2017.691887] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2017.696907] ? do_syscall_64+0x21/0x620 [ 2017.700890] do_syscall_64+0xf9/0x620 [ 2017.704698] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2017.709887] RIP: 0033:0x7ff1645fa387 [ 2017.713601] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2017.732499] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 2017.740216] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fa387 [ 2017.747482] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 2017.754751] RBP: 00007ff162f701d0 R08: 0000000000000000 R09: 00007ff162f701d0 08:15:31 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000fffe08000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000006cffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001007801000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x6aad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:31 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000006000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2017.762016] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2017.769374] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 08:15:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 28) 08:15:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x6bad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85a548ff6cffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2017.915059] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 08:15:31 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000000}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=0x800, 0x4) perf_event_open(0x0, 0xffffffffffffffff, 0x7, r0, 0x8) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, &(0x7f0000000240)={{0x18, 0x1}, {0x7, 0x1f}, 0x1ff, 0x2, 0x3f}) ioctl$TUNSETTXFILTER(r1, 0x400454d1, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @initdev}, &(0x7f0000000140)=0x10) ioctl$KDFONTOP_GET(0xffffffffffffffff, 0x4b72, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) kexec_load(0xd00, 0x10, &(0x7f00000005c0)=[{0x0, 0x0, 0x1128b9000, 0x3e0000}], 0x0) [ 2017.961609] FAULT_INJECTION: forcing a failure. [ 2017.961609] name failslab, interval 1, probability 0, space 0, times 0 [ 2018.005638] CPU: 0 PID: 13819 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2018.013537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2018.022887] Call Trace: [ 2018.025478] dump_stack+0x1fc/0x2ef [ 2018.029113] should_fail.cold+0xa/0xf [ 2018.032921] ? setup_fault_attr+0x200/0x200 [ 2018.037247] __should_failslab+0x115/0x180 [ 2018.041573] should_failslab+0x5/0x10 [ 2018.045356] kmem_cache_alloc+0x277/0x370 [ 2018.049484] ? ext4_sync_fs+0x8d0/0x8d0 [ 2018.053438] ext4_alloc_inode+0x1a/0x630 [ 2018.057478] ? ext4_sync_fs+0x8d0/0x8d0 [ 2018.061435] alloc_inode+0x5d/0x180 [ 2018.065043] new_inode+0x1d/0xf0 [ 2018.068390] __ext4_new_inode+0x400/0x5a20 [ 2018.072611] ? putname+0xe1/0x120 [ 2018.076043] ? do_mkdirat+0xa0/0x2d0 [ 2018.079744] ? ext4_free_inode+0x1780/0x1780 [ 2018.084136] ? debug_check_no_obj_freed+0x201/0x490 [ 2018.089133] ? __dquot_initialize+0x298/0xb70 [ 2018.093616] ? lock_acquire+0x170/0x3c0 [ 2018.097584] ? dquot_initialize_needed+0x290/0x290 [ 2018.102497] ? trace_hardirqs_off+0x64/0x200 [ 2018.106886] ? common_perm+0x4be/0x800 [ 2018.110756] ext4_mkdir+0x396/0xe10 [ 2018.114366] ? putname+0xe1/0x120 [ 2018.117817] ? ext4_init_dot_dotdot+0x600/0x600 [ 2018.122486] ? generic_permission+0x116/0x4d0 [ 2018.126968] ? security_inode_permission+0xc5/0xf0 [ 2018.131886] ? inode_permission.part.0+0x10c/0x450 [ 2018.136800] vfs_mkdir+0x508/0x7a0 [ 2018.140321] do_mkdirat+0x262/0x2d0 [ 2018.143936] ? __ia32_sys_mknod+0x120/0x120 [ 2018.148243] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2018.153241] ? do_syscall_64+0x21/0x620 [ 2018.157202] do_syscall_64+0xf9/0x620 [ 2018.160997] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2018.166230] RIP: 0033:0x7ff1645fa387 [ 2018.169933] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2018.188815] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 2018.196506] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fa387 08:15:31 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000007000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x6c000000}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2018.203771] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 2018.211021] RBP: 00007ff162f701d0 R08: 0000000000000000 R09: 00007ff162f701d0 [ 2018.218272] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2018.225520] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 08:15:31 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001008801000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000074ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 29) 08:15:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x6cad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2018.462793] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 08:15:32 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000208000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001008b01000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:32 executing program 0: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="30642125f254357350dd77644d58faca8a2797a9ffe412cafd7fd66d00006e62d901"], &(0x7f0000000340)='./file1\x00', 0x0, 0x0, &(0x7f00000004c0)='\x00') mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(0xffffffffffffffff, 0x8010671f, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) getgid() syz_mount_image$tmpfs(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="c453c3bf2b7a802684ace3a34322283144b0099dd1"]) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='workdir=./file1,lowerdir=./file0,upperdir=./bus,nfs_export=on']) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)=@FILEID_UDF_WITHOUT_PARENT={0xc, 0x51, {0x0, 0x0, 0x0, 0x9}}, &(0x7f0000000480), 0x0) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140), 0x502c, &(0x7f00000001c0)={[{@xino_on}, {@nfs_export_on}, {@xino_off}], [{@euid_lt={'euid<', 0xee00}}, {@hash}]}) symlink(&(0x7f0000000380)='./bus\x00', &(0x7f00000003c0)='./file0/file0\x00') unlink(&(0x7f0000001d80)='./bus/file0\x00') newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x4000) fstat(0xffffffffffffffff, &(0x7f0000000880)) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./bus/file0/file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x2210010, 0x0) [ 2018.672583] FAULT_INJECTION: forcing a failure. [ 2018.672583] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2018.684423] CPU: 0 PID: 13860 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2018.692299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2018.701652] Call Trace: [ 2018.704247] dump_stack+0x1fc/0x2ef [ 2018.707884] should_fail.cold+0xa/0xf [ 2018.711779] ? setup_fault_attr+0x200/0x200 [ 2018.715407] nla_parse: 13 callbacks suppressed 08:15:32 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000308000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x6cff48a5}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2018.715434] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2018.716106] ? wake_up_q+0x93/0xe0 [ 2018.716125] ? __mutex_unlock_slowpath+0x2be/0x610 [ 2018.716144] __alloc_pages_nodemask+0x239/0x2890 [ 2018.742472] ? __lock_acquire+0x6de/0x3ff0 [ 2018.746727] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2018.751577] ? blkdev_ioctl+0x11a/0x1a80 [ 2018.755631] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2018.760992] ? blkpg_ioctl+0x9d0/0x9d0 [ 2018.764951] ? debug_check_no_obj_freed+0x201/0x490 [ 2018.769976] ? lock_downgrade+0x720/0x720 [ 2018.774132] cache_grow_begin+0xa4/0x8a0 [ 2018.778189] ? setup_fault_attr+0x200/0x200 [ 2018.782509] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 2018.787267] cache_alloc_refill+0x273/0x340 [ 2018.791598] kmem_cache_alloc+0x346/0x370 [ 2018.795744] getname_flags+0xce/0x590 [ 2018.799527] do_mkdirat+0x8d/0x2d0 [ 2018.803052] ? __ia32_sys_mknod+0x120/0x120 [ 2018.807360] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2018.812718] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2018.817735] ? do_syscall_64+0x21/0x620 [ 2018.821713] do_syscall_64+0xf9/0x620 [ 2018.825519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2018.830706] RIP: 0033:0x7ff1645fa387 [ 2018.834409] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2018.853309] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 2018.861038] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fa387 08:15:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000007affffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2018.868297] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 2018.875648] RBP: 00007ff162f701d0 R08: 0000000000000000 R09: 00007ff162f701d0 [ 2018.882920] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2018.890182] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 08:15:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 30) 08:15:32 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000000100be01000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:32 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x6dad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2019.063570] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:32 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000408000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2019.140547] FAULT_INJECTION: forcing a failure. [ 2019.140547] name failslab, interval 1, probability 0, space 0, times 0 [ 2019.179259] CPU: 1 PID: 13894 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2019.187155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2019.196505] Call Trace: [ 2019.199097] dump_stack+0x1fc/0x2ef [ 2019.202736] should_fail.cold+0xa/0xf [ 2019.206539] ? setup_fault_attr+0x200/0x200 [ 2019.210857] ? __lock_acquire+0x6de/0x3ff0 [ 2019.215127] __should_failslab+0x115/0x180 [ 2019.219371] should_failslab+0x5/0x10 [ 2019.223200] __kmalloc+0x2ab/0x3c0 [ 2019.226738] ? ext4_find_extent+0x9bb/0xc70 [ 2019.231063] ext4_find_extent+0x9bb/0xc70 [ 2019.235222] ext4_ext_map_blocks+0x1c0/0x7390 [ 2019.239729] ? __lock_acquire+0x6de/0x3ff0 [ 2019.243975] ? __lock_acquire+0x6de/0x3ff0 [ 2019.248221] ? mark_held_locks+0xf0/0xf0 [ 2019.252285] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 2019.257659] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 2019.262854] ? mark_held_locks+0xf0/0xf0 [ 2019.266924] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 2019.271776] ? ext4_es_lookup_extent+0x375/0xb60 [ 2019.276544] ? lock_downgrade+0x720/0x720 [ 2019.280695] ? lock_acquire+0x170/0x3c0 [ 2019.284673] ? check_preemption_disabled+0x41/0x280 [ 2019.289694] ? lock_acquire+0x170/0x3c0 [ 2019.293672] ? ext4_map_blocks+0x33e/0x1a50 [ 2019.298004] ext4_map_blocks+0xd88/0x1a50 [ 2019.302167] ? check_preemption_disabled+0x41/0x280 [ 2019.307186] ? ext4_issue_zeroout+0x160/0x160 [ 2019.311683] ? __brelse+0x84/0xa0 [ 2019.315138] ? __ext4_new_inode+0x2eb/0x5a20 [ 2019.319560] ext4_getblk+0xad/0x4f0 [ 2019.323193] ? ext4_iomap_begin+0xe00/0xe00 [ 2019.327519] ? ext4_free_inode+0x1780/0x1780 [ 2019.331925] ? debug_check_no_obj_freed+0x201/0x490 [ 2019.336939] ? __dquot_initialize+0x298/0xb70 08:15:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85ffffff8cffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2019.341441] ext4_bread+0x7c/0x210 [ 2019.344992] ? ext4_getblk+0x4f0/0x4f0 [ 2019.348884] ? dquot_initialize_needed+0x290/0x290 [ 2019.353823] ? trace_hardirqs_off+0x64/0x200 [ 2019.358238] ext4_append+0x155/0x370 [ 2019.361963] ext4_mkdir+0x5bd/0xe10 [ 2019.365616] ? ext4_init_dot_dotdot+0x600/0x600 [ 2019.370282] ? generic_permission+0x116/0x4d0 [ 2019.374764] ? inode_permission.part.0+0x10c/0x450 [ 2019.379779] vfs_mkdir+0x508/0x7a0 [ 2019.383314] do_mkdirat+0x262/0x2d0 [ 2019.386927] ? __ia32_sys_mknod+0x120/0x120 [ 2019.391240] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2019.396241] ? do_syscall_64+0x21/0x620 [ 2019.400216] do_syscall_64+0xf9/0x620 [ 2019.404001] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2019.409169] RIP: 0033:0x7ff1645fa387 [ 2019.412871] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2019.431759] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 08:15:33 executing program 0: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="30642125f254357350dd77644d58faca8a2797a9ffe412cafd7fd66d00006e62d901"], &(0x7f0000000340)='./file1\x00', 0x0, 0x0, &(0x7f00000004c0)='\x00') mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(0xffffffffffffffff, 0x8010671f, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) getgid() syz_mount_image$tmpfs(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="c453c3bf2b7a802684ace3a34322283144b0099dd1"]) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='workdir=./file1,lowerdir=./file0,upperdir=./bus,nfs_export=on']) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)=@FILEID_UDF_WITHOUT_PARENT={0xc, 0x51, {0x0, 0x0, 0x0, 0x9}}, &(0x7f0000000480), 0x0) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140), 0x502c, &(0x7f00000001c0)={[{@xino_on}, {@nfs_export_on}, {@xino_off}], [{@euid_lt={'euid<', 0xee00}}, {@hash}]}) symlink(&(0x7f0000000380)='./bus\x00', &(0x7f00000003c0)='./file0/file0\x00') unlink(&(0x7f0000001d80)='./bus/file0\x00') newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x4000) fstat(0xffffffffffffffff, &(0x7f0000000880)) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./bus/file0/file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x2210010, 0x0) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="30642125f254357350dd77644d58faca8a2797a9ffe412cafd7fd66d00006e62d901"], &(0x7f0000000340)='./file1\x00', 0x0, 0x0, &(0x7f00000004c0)='\x00') (async) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(0xffffffffffffffff, 0x8010671f, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) (async) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) (async) getgid() (async) syz_mount_image$tmpfs(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="c453c3bf2b7a802684ace3a34322283144b0099dd1"]) (async) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='workdir=./file1,lowerdir=./file0,upperdir=./bus,nfs_export=on']) (async) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) (async) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)=@FILEID_UDF_WITHOUT_PARENT={0xc, 0x51, {0x0, 0x0, 0x0, 0x9}}, &(0x7f0000000480), 0x0) (async) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140), 0x502c, &(0x7f00000001c0)={[{@xino_on}, {@nfs_export_on}, {@xino_off}], [{@euid_lt={'euid<', 0xee00}}, {@hash}]}) (async) symlink(&(0x7f0000000380)='./bus\x00', &(0x7f00000003c0)='./file0/file0\x00') (async) unlink(&(0x7f0000001d80)='./bus/file0\x00') (async) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x4000) (async) fstat(0xffffffffffffffff, &(0x7f0000000880)) (async) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./bus/file0/file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x2210010, 0x0) (async) [ 2019.439466] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fa387 [ 2019.446805] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 2019.454059] RBP: 00007ff162f701d0 R08: 0000000000000000 R09: 00007ff162f701d0 [ 2019.461325] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2019.468586] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 08:15:33 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000508000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2019.512136] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x6ead0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001001c02000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85ffffff97ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:33 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000608000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2019.653021] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 31) 08:15:33 executing program 0: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="30642125f254357350dd77644d58faca8a2797a9ffe412cafd7fd66d00006e62d901"], &(0x7f0000000340)='./file1\x00', 0x0, 0x0, &(0x7f00000004c0)='\x00') (async) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(0xffffffffffffffff, 0x8010671f, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) (async) getgid() syz_mount_image$tmpfs(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="c453c3bf2b7a802684ace3a34322283144b0099dd1"]) (async) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='workdir=./file1,lowerdir=./file0,upperdir=./bus,nfs_export=on']) (async) mount$overlay(0x0, 0x0, 0x0, 0x0, 0x0) (async) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000100)='./bus/file0\x00', &(0x7f0000000440)=@FILEID_UDF_WITHOUT_PARENT={0xc, 0x51, {0x0, 0x0, 0x0, 0x9}}, &(0x7f0000000480), 0x0) (async) mount$overlay(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140), 0x502c, &(0x7f00000001c0)={[{@xino_on}, {@nfs_export_on}, {@xino_off}], [{@euid_lt={'euid<', 0xee00}}, {@hash}]}) (async) symlink(&(0x7f0000000380)='./bus\x00', &(0x7f00000003c0)='./file0/file0\x00') (async) unlink(&(0x7f0000001d80)='./bus/file0\x00') (async) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x4000) (async) fstat(0xffffffffffffffff, &(0x7f0000000880)) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./bus/file0/file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x2210010, 0x0) 08:15:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001002a02000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x6fad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e856cff48a5ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:33 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000340)={'hsr0\x00', 0x10}) perf_event_open(&(0x7f0000001440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x552d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x7, @perf_bp={&(0x7f0000000240), 0x5}, 0x4000, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00', 0x800}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001400)='memory.numa_stat\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000140)={0x0, r2}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000480)='r\xefs)\xd3\xc6\x12G\xfac\xa89\xb9\xee\x04\x00F\xa1\r2\x9c+h\xc9M\x06\x00\x00\x00\x00\x00\x00\x00C\xd3\xb3\x16\xef\x95-x\xc8\xba\xe6\x0e\xc4\x06N\xed\bj\xe9\x98\xa7E\x92\xd1\xb9\x9c\xd1D\xb8\xd0wn\xb3%w\xa53\x9d\xa0Xzr\x1f\xd3\xed\x86xqS\x06*\f>\xfa\xdd\x1cA\x016\xafO\xfe0f\t\x0e(\x98!Qf&\xd2\x815}\xe9Wk\xfc*\xb6\xe6\x83|B\x9dL\x93\xb1hb!Z\xb1.\xf8\xf3s]\xed\x1e\xba\x0ej\xfe\xa5}\\{\x82.k\a\f`\xcaI^\xc4\x06\xdd\x80l\xa4U/\xa6\x1fE\xea\x04@\x06\x00'/177) openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x327d81, 0x0) perf_event_open(&(0x7f00000014c0)={0x4, 0x80, 0x20, 0xb0, 0x1, 0x5, 0x0, 0x7, 0x13090, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000300), 0x1}, 0x900f, 0x1, 0x40, 0x5, 0x2, 0xd740, 0x7, 0x0, 0x9, 0x0, 0x5}, 0x0, 0x1, 0xffffffffffffffff, 0xb) close(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x103) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)=0x4, 0x12) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x7, 0xf9, 0x81, 0x2, 0x0, 0x14, 0x18204, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_config_ext={0x6, 0xffea}, 0x101a0, 0x0, 0x6, 0x1, 0x1ff, 0x1, 0x81, 0x0, 0x9, 0x0, 0x4}, 0x0, 0xe, 0xffffffffffffffff, 0x1) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000001c0)={0x2, &(0x7f00000000c0)=[{0x831, 0x5, 0x28, 0x9}, {0x2, 0x7f, 0xff, 0x5}]}) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x80004, &(0x7f00000005c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@cache_loose}, {@cache_none}, {@version_L}, {@noextend}, {@cache_mmap}, {@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}], [{@subj_type={'subj_type', 0x3d, '/dev/net/tun\x00'}}, {@subj_role={'subj_role', 0x3d, '({,-/!'}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@euid_gt={'euid>', 0xee01}}, {@euid_eq}, {@hash}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@obj_role={'obj_role', 0x3d, 'memory.numa_stat\x00'}}, {@dont_measure}]}}) 08:15:33 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000708000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2019.817974] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2019.863663] FAULT_INJECTION: forcing a failure. [ 2019.863663] name failslab, interval 1, probability 0, space 0, times 0 [ 2019.875611] CPU: 0 PID: 13959 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2019.883494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2019.892847] Call Trace: [ 2019.895441] dump_stack+0x1fc/0x2ef [ 2019.899079] should_fail.cold+0xa/0xf [ 2019.902889] ? setup_fault_attr+0x200/0x200 [ 2019.907218] ? __es_tree_search.isra.0+0x1af/0x210 [ 2019.912161] __should_failslab+0x115/0x180 [ 2019.916396] should_failslab+0x5/0x10 [ 2019.920193] kmem_cache_alloc+0x3f/0x370 [ 2019.924248] __es_insert_extent+0x39b/0x13b0 [ 2019.928650] ? lock_acquire+0x170/0x3c0 [ 2019.932611] ? ext4_es_insert_extent+0x17e/0x5e0 [ 2019.937361] ext4_es_insert_extent+0x22e/0x5e0 [ 2019.941933] ? lock_downgrade+0x720/0x720 [ 2019.946073] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 2019.951863] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2019.956871] ? ext4_es_find_delayed_extent_range+0x7d9/0x9f0 [ 2019.962660] ext4_ext_map_blocks+0x2129/0x7390 [ 2019.967232] ? __lock_acquire+0x6de/0x3ff0 [ 2019.971457] ? __lock_acquire+0x6de/0x3ff0 [ 2019.975689] ? mark_held_locks+0xf0/0xf0 [ 2019.979760] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 2019.985114] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 2019.990291] ? mark_held_locks+0xf0/0xf0 [ 2019.994341] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 2019.999173] ? ext4_es_lookup_extent+0x375/0xb60 [ 2020.003928] ? check_preemption_disabled+0x41/0x280 [ 2020.009023] ? lock_acquire+0x170/0x3c0 [ 2020.012986] ? ext4_map_blocks+0x33e/0x1a50 [ 2020.017302] ext4_map_blocks+0xd88/0x1a50 [ 2020.021443] ? check_preemption_disabled+0x41/0x280 [ 2020.026450] ? ext4_issue_zeroout+0x160/0x160 [ 2020.030934] ? __brelse+0x84/0xa0 [ 2020.034376] ? __ext4_new_inode+0x2eb/0x5a20 [ 2020.038799] ext4_getblk+0xad/0x4f0 [ 2020.042417] ? ext4_iomap_begin+0xe00/0xe00 [ 2020.046729] ? ext4_free_inode+0x1780/0x1780 [ 2020.051147] ? debug_check_no_obj_freed+0x201/0x490 [ 2020.056159] ? __dquot_initialize+0x298/0xb70 [ 2020.060669] ext4_bread+0x7c/0x210 [ 2020.064198] ? ext4_getblk+0x4f0/0x4f0 [ 2020.068076] ? dquot_initialize_needed+0x290/0x290 [ 2020.072999] ? trace_hardirqs_off+0x64/0x200 [ 2020.077400] ext4_append+0x155/0x370 [ 2020.081103] ext4_mkdir+0x5bd/0xe10 [ 2020.084723] ? ext4_init_dot_dotdot+0x600/0x600 [ 2020.089382] ? generic_permission+0x116/0x4d0 [ 2020.093867] ? inode_permission.part.0+0x10c/0x450 [ 2020.098792] vfs_mkdir+0x508/0x7a0 [ 2020.102322] do_mkdirat+0x262/0x2d0 [ 2020.105939] ? __ia32_sys_mknod+0x120/0x120 [ 2020.110253] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2020.115256] ? do_syscall_64+0x21/0x620 [ 2020.119218] do_syscall_64+0xf9/0x620 [ 2020.123010] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2020.128185] RIP: 0033:0x7ff1645fa387 [ 2020.131883] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2020.150765] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 2020.158461] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fa387 08:15:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x70ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2020.165718] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 2020.172972] RBP: 00007ff162f701d0 R08: 0000000000000000 R09: 00007ff162f701d0 [ 2020.180222] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2020.187496] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 08:15:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000edc0ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 32) [ 2020.272317] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:33 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001006802000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:33 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x71ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:33 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000340)={'hsr0\x00', 0x10}) perf_event_open(&(0x7f0000001440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x552d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x7, @perf_bp={&(0x7f0000000240), 0x5}, 0x4000, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00', 0x800}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) (async) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001400)='memory.numa_stat\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000140)={0x0, r2}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000480)='r\xefs)\xd3\xc6\x12G\xfac\xa89\xb9\xee\x04\x00F\xa1\r2\x9c+h\xc9M\x06\x00\x00\x00\x00\x00\x00\x00C\xd3\xb3\x16\xef\x95-x\xc8\xba\xe6\x0e\xc4\x06N\xed\bj\xe9\x98\xa7E\x92\xd1\xb9\x9c\xd1D\xb8\xd0wn\xb3%w\xa53\x9d\xa0Xzr\x1f\xd3\xed\x86xqS\x06*\f>\xfa\xdd\x1cA\x016\xafO\xfe0f\t\x0e(\x98!Qf&\xd2\x815}\xe9Wk\xfc*\xb6\xe6\x83|B\x9dL\x93\xb1hb!Z\xb1.\xf8\xf3s]\xed\x1e\xba\x0ej\xfe\xa5}\\{\x82.k\a\f`\xcaI^\xc4\x06\xdd\x80l\xa4U/\xa6\x1fE\xea\x04@\x06\x00'/177) (async) openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x327d81, 0x0) (async) perf_event_open(&(0x7f00000014c0)={0x4, 0x80, 0x20, 0xb0, 0x1, 0x5, 0x0, 0x7, 0x13090, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000300), 0x1}, 0x900f, 0x1, 0x40, 0x5, 0x2, 0xd740, 0x7, 0x0, 0x9, 0x0, 0x5}, 0x0, 0x1, 0xffffffffffffffff, 0xb) (async) close(r0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x103) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)=0x4, 0x12) (async) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x7, 0xf9, 0x81, 0x2, 0x0, 0x14, 0x18204, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_config_ext={0x6, 0xffea}, 0x101a0, 0x0, 0x6, 0x1, 0x1ff, 0x1, 0x81, 0x0, 0x9, 0x0, 0x4}, 0x0, 0xe, 0xffffffffffffffff, 0x1) (async) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000001c0)={0x2, &(0x7f00000000c0)=[{0x831, 0x5, 0x28, 0x9}, {0x2, 0x7f, 0xff, 0x5}]}) (async) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x80004, &(0x7f00000005c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@cache_loose}, {@cache_none}, {@version_L}, {@noextend}, {@cache_mmap}, {@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}], [{@subj_type={'subj_type', 0x3d, '/dev/net/tun\x00'}}, {@subj_role={'subj_role', 0x3d, '({,-/!'}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@euid_gt={'euid>', 0xee01}}, {@euid_eq}, {@hash}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@obj_role={'obj_role', 0x3d, 'memory.numa_stat\x00'}}, {@dont_measure}]}}) 08:15:33 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000808000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x72010000}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:34 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000908000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85fffffff5ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:34 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000340)={'hsr0\x00', 0x10}) perf_event_open(&(0x7f0000001440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x552d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x7, @perf_bp={&(0x7f0000000240), 0x5}, 0x4000, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00', 0x800}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001400)='memory.numa_stat\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000140)={0x0, r2}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000480)='r\xefs)\xd3\xc6\x12G\xfac\xa89\xb9\xee\x04\x00F\xa1\r2\x9c+h\xc9M\x06\x00\x00\x00\x00\x00\x00\x00C\xd3\xb3\x16\xef\x95-x\xc8\xba\xe6\x0e\xc4\x06N\xed\bj\xe9\x98\xa7E\x92\xd1\xb9\x9c\xd1D\xb8\xd0wn\xb3%w\xa53\x9d\xa0Xzr\x1f\xd3\xed\x86xqS\x06*\f>\xfa\xdd\x1cA\x016\xafO\xfe0f\t\x0e(\x98!Qf&\xd2\x815}\xe9Wk\xfc*\xb6\xe6\x83|B\x9dL\x93\xb1hb!Z\xb1.\xf8\xf3s]\xed\x1e\xba\x0ej\xfe\xa5}\\{\x82.k\a\f`\xcaI^\xc4\x06\xdd\x80l\xa4U/\xa6\x1fE\xea\x04@\x06\x00'/177) openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x327d81, 0x0) perf_event_open(&(0x7f00000014c0)={0x4, 0x80, 0x20, 0xb0, 0x1, 0x5, 0x0, 0x7, 0x13090, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000300), 0x1}, 0x900f, 0x1, 0x40, 0x5, 0x2, 0xd740, 0x7, 0x0, 0x9, 0x0, 0x5}, 0x0, 0x1, 0xffffffffffffffff, 0xb) close(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x103) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)=0x4, 0x12) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x7, 0xf9, 0x81, 0x2, 0x0, 0x14, 0x18204, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_config_ext={0x6, 0xffea}, 0x101a0, 0x0, 0x6, 0x1, 0x1ff, 0x1, 0x81, 0x0, 0x9, 0x0, 0x4}, 0x0, 0xe, 0xffffffffffffffff, 0x1) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000001c0)={0x2, &(0x7f00000000c0)=[{0x831, 0x5, 0x28, 0x9}, {0x2, 0x7f, 0xff, 0x5}]}) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x80004, &(0x7f00000005c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@cache_loose}, {@cache_none}, {@version_L}, {@noextend}, {@cache_mmap}, {@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}], [{@subj_type={'subj_type', 0x3d, '/dev/net/tun\x00'}}, {@subj_role={'subj_role', 0x3d, '({,-/!'}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@euid_gt={'euid>', 0xee01}}, {@euid_eq}, {@hash}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@obj_role={'obj_role', 0x3d, 'memory.numa_stat\x00'}}, {@dont_measure}]}}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000340)={'hsr0\x00', 0x10}) (async) perf_event_open(&(0x7f0000001440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x552d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x7, @perf_bp={&(0x7f0000000240), 0x5}, 0x4000, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wlan0\x00', 0x800}) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001400)='memory.numa_stat\x00', 0x26e1, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000140)={0x0, r2}, 0x10) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000480)='r\xefs)\xd3\xc6\x12G\xfac\xa89\xb9\xee\x04\x00F\xa1\r2\x9c+h\xc9M\x06\x00\x00\x00\x00\x00\x00\x00C\xd3\xb3\x16\xef\x95-x\xc8\xba\xe6\x0e\xc4\x06N\xed\bj\xe9\x98\xa7E\x92\xd1\xb9\x9c\xd1D\xb8\xd0wn\xb3%w\xa53\x9d\xa0Xzr\x1f\xd3\xed\x86xqS\x06*\f>\xfa\xdd\x1cA\x016\xafO\xfe0f\t\x0e(\x98!Qf&\xd2\x815}\xe9Wk\xfc*\xb6\xe6\x83|B\x9dL\x93\xb1hb!Z\xb1.\xf8\xf3s]\xed\x1e\xba\x0ej\xfe\xa5}\\{\x82.k\a\f`\xcaI^\xc4\x06\xdd\x80l\xa4U/\xa6\x1fE\xea\x04@\x06\x00'/177) (async) openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x327d81, 0x0) (async) perf_event_open(&(0x7f00000014c0)={0x4, 0x80, 0x20, 0xb0, 0x1, 0x5, 0x0, 0x7, 0x13090, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000300), 0x1}, 0x900f, 0x1, 0x40, 0x5, 0x2, 0xd740, 0x7, 0x0, 0x9, 0x0, 0x5}, 0x0, 0x1, 0xffffffffffffffff, 0xb) (async) close(r0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) (async) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x103) (async) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100)=0x4, 0x12) (async) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x7, 0xf9, 0x81, 0x2, 0x0, 0x14, 0x18204, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_config_ext={0x6, 0xffea}, 0x101a0, 0x0, 0x6, 0x1, 0x1ff, 0x1, 0x81, 0x0, 0x9, 0x0, 0x4}, 0x0, 0xe, 0xffffffffffffffff, 0x1) (async) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000001c0)={0x2, &(0x7f00000000c0)=[{0x831, 0x5, 0x28, 0x9}, {0x2, 0x7f, 0xff, 0x5}]}) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) (async) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x80004, &(0x7f00000005c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@cache_loose}, {@cache_none}, {@version_L}, {@noextend}, {@cache_mmap}, {@privport}, {@access_uid={'access', 0x3d, 0xffffffffffffffff}}], [{@subj_type={'subj_type', 0x3d, '/dev/net/tun\x00'}}, {@subj_role={'subj_role', 0x3d, '({,-/!'}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@euid_gt={'euid>', 0xee01}}, {@euid_eq}, {@hash}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@obj_role={'obj_role', 0x3d, 'memory.numa_stat\x00'}}, {@dont_measure}]}}) (async) [ 2020.413408] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2020.433819] FAULT_INJECTION: forcing a failure. [ 2020.433819] name failslab, interval 1, probability 0, space 0, times 0 08:15:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x72ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2020.487392] CPU: 0 PID: 14000 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2020.495292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2020.504643] Call Trace: [ 2020.507227] dump_stack+0x1fc/0x2ef [ 2020.510853] should_fail.cold+0xa/0xf [ 2020.514646] ? setup_fault_attr+0x200/0x200 [ 2020.518971] ? lock_downgrade+0x720/0x720 [ 2020.523116] __should_failslab+0x115/0x180 [ 2020.527410] should_failslab+0x5/0x10 [ 2020.531203] __kmalloc+0x2ab/0x3c0 [ 2020.534733] ? ext4_find_extent+0x9bb/0xc70 [ 2020.539034] ext4_find_extent+0x9bb/0xc70 [ 2020.543181] ext4_ext_map_blocks+0x1c0/0x7390 [ 2020.547697] ? __lock_acquire+0x6de/0x3ff0 [ 2020.551921] ? mark_held_locks+0xf0/0xf0 [ 2020.555962] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 2020.561319] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 2020.566514] ? mark_held_locks+0xf0/0xf0 [ 2020.570572] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 2020.575411] ? ext4_es_lookup_extent+0x375/0xb60 [ 2020.580151] ? ext4_map_blocks+0x59f/0x1a50 [ 2020.584484] ? lock_acquire+0x170/0x3c0 [ 2020.588452] ? ext4_map_blocks+0x740/0x1a50 [ 2020.592762] ext4_map_blocks+0x7a2/0x1a50 [ 2020.596983] ? check_preemption_disabled+0x41/0x280 [ 2020.601997] ? ext4_issue_zeroout+0x160/0x160 [ 2020.606484] ? __brelse+0x84/0xa0 [ 2020.609934] ? __ext4_new_inode+0x2eb/0x5a20 [ 2020.614326] ext4_getblk+0xad/0x4f0 [ 2020.617936] ? ext4_iomap_begin+0xe00/0xe00 [ 2020.622252] ? ext4_free_inode+0x1780/0x1780 [ 2020.626670] ? __dquot_initialize+0x298/0xb70 [ 2020.631159] ext4_bread+0x7c/0x210 [ 2020.634690] ? ext4_getblk+0x4f0/0x4f0 [ 2020.638566] ? dquot_initialize_needed+0x290/0x290 [ 2020.643502] ? rcu_nmi_exit+0xb3/0x180 [ 2020.647391] ext4_append+0x155/0x370 [ 2020.651103] ext4_mkdir+0x5bd/0xe10 [ 2020.654726] ? ext4_init_dot_dotdot+0x600/0x600 [ 2020.659380] ? generic_permission+0x116/0x4d0 [ 2020.663871] ? inode_permission.part.0+0x10c/0x450 [ 2020.668792] vfs_mkdir+0x508/0x7a0 [ 2020.672392] do_mkdirat+0x262/0x2d0 [ 2020.676012] ? __ia32_sys_mknod+0x120/0x120 [ 2020.680321] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2020.685332] ? do_syscall_64+0x21/0x620 [ 2020.689295] do_syscall_64+0xf9/0x620 [ 2020.693085] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2020.698259] RIP: 0033:0x7ff1645fa387 [ 2020.701963] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2020.720863] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 2020.728570] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fa387 08:15:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001007202000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2020.735833] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 2020.743089] RBP: 00007ff162f701d0 R08: 0000000000000000 R09: 00007ff162f701d0 [ 2020.750348] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2020.757599] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 08:15:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 33) [ 2020.809585] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:34 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000a08000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2020.889627] FAULT_INJECTION: forcing a failure. [ 2020.889627] name failslab, interval 1, probability 0, space 0, times 0 [ 2020.901567] CPU: 1 PID: 14055 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2020.909458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2020.918809] Call Trace: [ 2020.921402] dump_stack+0x1fc/0x2ef [ 2020.925039] should_fail.cold+0xa/0xf [ 2020.928834] ? setup_fault_attr+0x200/0x200 [ 2020.933141] ? lock_downgrade+0x720/0x720 [ 2020.937283] ? check_preemption_disabled+0x41/0x280 [ 2020.942464] __should_failslab+0x115/0x180 [ 2020.946690] should_failslab+0x5/0x10 [ 2020.950479] kmem_cache_alloc+0x277/0x370 [ 2020.954621] ext4_mb_new_blocks+0x60a/0x4370 [ 2020.959020] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2020.964022] ? ext4_cache_extents+0x68/0x2d0 [ 2020.968412] ? ext4_find_extent+0x9bb/0xc70 [ 2020.972735] ? ext4_discard_preallocations+0xfb0/0xfb0 [ 2020.977995] ? ext4_ext_search_right+0x2c7/0xb60 [ 2020.982744] ? ext4_inode_to_goal_block+0x2d2/0x3e0 [ 2020.987760] ext4_ext_map_blocks+0x2aa2/0x7390 [ 2020.992339] ? __lock_acquire+0x6de/0x3ff0 [ 2020.996566] ? mark_held_locks+0xf0/0xf0 [ 2021.000615] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 2021.005965] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 2021.011142] ? mark_held_locks+0xf0/0xf0 [ 2021.015189] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 2021.020036] ? ext4_es_lookup_extent+0x375/0xb60 [ 2021.024782] ? ext4_map_blocks+0x59f/0x1a50 [ 2021.029106] ext4_map_blocks+0x7a2/0x1a50 [ 2021.033245] ? check_preemption_disabled+0x41/0x280 [ 2021.038247] ? ext4_issue_zeroout+0x160/0x160 [ 2021.042731] ? __brelse+0x84/0xa0 [ 2021.046171] ? __ext4_new_inode+0x2eb/0x5a20 [ 2021.050572] ext4_getblk+0xad/0x4f0 [ 2021.054188] ? ext4_iomap_begin+0xe00/0xe00 [ 2021.058495] ? ext4_free_inode+0x1780/0x1780 [ 2021.062886] ? debug_check_no_obj_freed+0x201/0x490 [ 2021.067886] ? __dquot_initialize+0x298/0xb70 [ 2021.072368] ext4_bread+0x7c/0x210 [ 2021.075895] ? ext4_getblk+0x4f0/0x4f0 [ 2021.079772] ? dquot_initialize_needed+0x290/0x290 [ 2021.084694] ? trace_hardirqs_off+0x64/0x200 [ 2021.089095] ext4_append+0x155/0x370 [ 2021.092798] ext4_mkdir+0x5bd/0xe10 [ 2021.096422] ? ext4_init_dot_dotdot+0x600/0x600 [ 2021.101097] ? generic_permission+0x116/0x4d0 [ 2021.105584] ? inode_permission.part.0+0x10c/0x450 [ 2021.110505] vfs_mkdir+0x508/0x7a0 [ 2021.114033] do_mkdirat+0x262/0x2d0 [ 2021.117646] ? __ia32_sys_mknod+0x120/0x120 [ 2021.121955] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2021.126969] ? do_syscall_64+0x21/0x620 [ 2021.130932] do_syscall_64+0xf9/0x620 [ 2021.134732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2021.139908] RIP: 0033:0x7ff1645fa387 [ 2021.143620] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2021.162510] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 2021.170209] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fa387 [ 2021.177474] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 2021.184731] RBP: 00007ff162f701d0 R08: 0000000000000000 R09: 00007ff162f701d0 [ 2021.191992] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2021.199248] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 08:15:34 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001007402000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 34) 08:15:34 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x73ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:34 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000b08000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:34 executing program 0: open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f00000011c0)=0x0) clock_gettime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4000}, r1, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000000)) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mount(&(0x7f0000000640)=ANY=[@ANYBLOB='[d::],0::6:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) futex(0x0, 0x4, 0x1, &(0x7f0000000400), 0x0, 0x0) pselect6(0x40, &(0x7f0000000140)={0x0, 0x101, 0x0, 0x3f, 0x80000000, 0x1f, 0x81, 0x791b}, &(0x7f00000001c0)={0x1, 0x0, 0x9, 0xff, 0xff, 0x3, 0x3, 0x3}, 0x0, &(0x7f0000000280), &(0x7f0000000300)={0x0}) 08:15:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85fffffff6ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2021.267344] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001008302000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2021.362216] FAULT_INJECTION: forcing a failure. [ 2021.362216] name failslab, interval 1, probability 0, space 0, times 0 [ 2021.365878] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2021.373613] CPU: 0 PID: 14075 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2021.373757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2021.373762] Call Trace: [ 2021.373782] dump_stack+0x1fc/0x2ef [ 2021.373802] should_fail.cold+0xa/0xf 08:15:35 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000c08000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2021.373821] ? setup_fault_attr+0x200/0x200 [ 2021.373836] ? __es_tree_search.isra.0+0x1af/0x210 [ 2021.373855] __should_failslab+0x115/0x180 [ 2021.373872] should_failslab+0x5/0x10 [ 2021.373885] kmem_cache_alloc+0x3f/0x370 [ 2021.373907] __es_insert_extent+0x39b/0x13b0 [ 2021.373933] ext4_es_insert_extent+0x22e/0x5e0 [ 2021.373949] ? ext4_map_blocks+0x59f/0x1a50 [ 2021.373964] ? ext4_es_find_delayed_extent_range+0x9f0/0x9f0 [ 2021.373992] ext4_map_blocks+0xa2a/0x1a50 [ 2021.374014] ? ext4_issue_zeroout+0x160/0x160 [ 2021.374029] ? __brelse+0x84/0xa0 [ 2021.374043] ? __ext4_new_inode+0x2eb/0x5a20 [ 2021.374064] ext4_getblk+0xad/0x4f0 [ 2021.470367] ? ext4_iomap_begin+0xe00/0xe00 [ 2021.474696] ? ext4_free_inode+0x1780/0x1780 [ 2021.479106] ? debug_check_no_obj_freed+0x201/0x490 [ 2021.484141] ? __dquot_initialize+0x298/0xb70 [ 2021.488649] ext4_bread+0x7c/0x210 [ 2021.492201] ? ext4_getblk+0x4f0/0x4f0 [ 2021.496091] ? dquot_initialize_needed+0x290/0x290 [ 2021.501031] ? trace_hardirqs_off+0x64/0x200 [ 2021.505450] ext4_append+0x155/0x370 [ 2021.509173] ext4_mkdir+0x5bd/0xe10 [ 2021.512810] ? ext4_init_dot_dotdot+0x600/0x600 [ 2021.517486] ? generic_permission+0x116/0x4d0 [ 2021.521989] ? inode_permission.part.0+0x10c/0x450 [ 2021.526927] vfs_mkdir+0x508/0x7a0 [ 2021.530479] do_mkdirat+0x262/0x2d0 [ 2021.534109] ? __ia32_sys_mknod+0x120/0x120 [ 2021.538439] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2021.543457] ? do_syscall_64+0x21/0x620 [ 2021.547436] do_syscall_64+0xf9/0x620 [ 2021.551251] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2021.556445] RIP: 0033:0x7ff1645fa387 [ 2021.560162] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2021.579059] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 2021.586866] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fa387 [ 2021.594171] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 2021.601437] RBP: 00007ff162f701d0 R08: 0000000000000000 R09: 00007ff162f701d0 [ 2021.608206] libceph: connect [d::]:6789 error -101 [ 2021.608720] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2021.608730] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 [ 2021.649213] libceph: mon0 [d::]:6789 connect error 08:15:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x74000000}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85fffffffbffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:35 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000e08000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2021.660931] libceph: connect [d::]:6789 error -101 [ 2021.667345] libceph: mon0 [d::]:6789 connect error 08:15:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 35) 08:15:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x74ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:35 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000f08000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:35 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000001008000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x75ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2021.898522] FAULT_INJECTION: forcing a failure. [ 2021.898522] name failslab, interval 1, probability 0, space 0, times 0 [ 2021.911149] CPU: 0 PID: 14129 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2021.919040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2021.928391] Call Trace: [ 2021.930985] dump_stack+0x1fc/0x2ef [ 2021.934625] should_fail.cold+0xa/0xf [ 2021.938436] ? vfs_mkdir+0x508/0x7a0 [ 2021.942155] ? setup_fault_attr+0x200/0x200 [ 2021.946481] ? blk_queue_enter+0x40b/0xb70 [ 2021.950728] __should_failslab+0x115/0x180 [ 2021.954970] should_failslab+0x5/0x10 [ 2021.958776] kmem_cache_alloc_node+0x54/0x3b0 [ 2021.963282] create_task_io_context+0x2c/0x430 [ 2021.967875] generic_make_request_checks+0x1c4f/0x22e0 [ 2021.973166] ? should_fail_bio.isra.0+0xa0/0xa0 [ 2021.977845] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2021.982867] ? kmem_cache_alloc+0x315/0x370 [ 2021.987198] generic_make_request+0x23f/0xdf0 [ 2021.991703] ? blk_put_request+0x110/0x110 [ 2021.995943] ? check_preemption_disabled+0x41/0x280 [ 2022.000976] submit_bio+0xb1/0x430 [ 2022.004521] ? generic_make_request+0xdf0/0xdf0 [ 2022.009192] ? check_preemption_disabled+0x41/0x280 [ 2022.014222] ? guard_bio_eod+0x2a0/0x650 [ 2022.018294] submit_bh_wbc+0x5a7/0x760 [ 2022.022194] __sync_dirty_buffer+0x14e/0x320 [ 2022.026606] __ext4_handle_dirty_metadata+0x234/0x590 [ 2022.031805] ext4_getblk+0x32d/0x4f0 [ 2022.035529] ? ext4_iomap_begin+0xe00/0xe00 [ 2022.039861] ? ext4_free_inode+0x1780/0x1780 [ 2022.044276] ? debug_check_no_obj_freed+0x201/0x490 [ 2022.049297] ? __dquot_initialize+0x298/0xb70 [ 2022.053805] ext4_bread+0x7c/0x210 [ 2022.057354] ? ext4_getblk+0x4f0/0x4f0 [ 2022.061248] ? dquot_initialize_needed+0x290/0x290 [ 2022.066181] ? trace_hardirqs_off+0x64/0x200 [ 2022.070591] ext4_append+0x155/0x370 [ 2022.074311] ext4_mkdir+0x5bd/0xe10 [ 2022.077951] ? ext4_init_dot_dotdot+0x600/0x600 [ 2022.082626] ? generic_permission+0x116/0x4d0 [ 2022.087141] ? inode_permission.part.0+0x10c/0x450 [ 2022.092081] vfs_mkdir+0x508/0x7a0 [ 2022.095648] do_mkdirat+0x262/0x2d0 [ 2022.099273] ? __ia32_sys_mknod+0x120/0x120 [ 2022.103600] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2022.108619] ? do_syscall_64+0x21/0x620 [ 2022.112600] do_syscall_64+0xf9/0x620 [ 2022.116414] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2022.121601] RIP: 0033:0x7ff1645fa387 [ 2022.125313] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2022.144209] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 2022.151918] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fa387 [ 2022.159189] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 2022.166458] RBP: 00007ff162f701d0 R08: 0000000000000000 R09: 00007ff162f701d0 [ 2022.173725] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2022.180992] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 [ 2022.195248] ceph: No mds server is up or the cluster is laggy 08:15:35 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000000100b602000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85fffffdfcffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:35 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000004808000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:35 executing program 0: open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) (async) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f00000011c0)=0x0) clock_gettime(0x0, 0x0) (async) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4000}, r1, 0x0, 0xffffffffffffffff, 0x0) (async) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000000)) (async) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) (async) mount(&(0x7f0000000640)=ANY=[@ANYBLOB='[d::],0::6:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) futex(0x0, 0x4, 0x1, &(0x7f0000000400), 0x0, 0x0) (async) pselect6(0x40, &(0x7f0000000140)={0x0, 0x101, 0x0, 0x3f, 0x80000000, 0x1f, 0x81, 0x791b}, &(0x7f00000001c0)={0x1, 0x0, 0x9, 0xff, 0xff, 0x3, 0x3, 0x3}, 0x0, &(0x7f0000000280), &(0x7f0000000300)={0x0}) 08:15:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x76ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:35 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000004c08000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:35 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x77ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2022.347951] libceph: connect [d::]:6789 error -101 [ 2022.374139] libceph: mon0 [d::]:6789 connect error [ 2022.392446] ceph: No mds server is up or the cluster is laggy [ 2022.419908] libceph: connect [d::]:6789 error -101 [ 2022.427938] libceph: mon0 [d::]:6789 connect error 08:15:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 36) 08:15:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000000100e202000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:36 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000006008000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x78ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85fffffdfdffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2022.552725] FAULT_INJECTION: forcing a failure. [ 2022.552725] name failslab, interval 1, probability 0, space 0, times 0 [ 2022.564318] CPU: 0 PID: 14185 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2022.572214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2022.581568] Call Trace: [ 2022.584161] dump_stack+0x1fc/0x2ef [ 2022.587794] should_fail.cold+0xa/0xf [ 2022.591602] ? setup_fault_attr+0x200/0x200 [ 2022.595929] ? __lock_acquire+0x6de/0x3ff0 08:15:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x79ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:36 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000006808000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2022.600171] __should_failslab+0x115/0x180 [ 2022.604411] should_failslab+0x5/0x10 [ 2022.608214] kmem_cache_alloc+0x3f/0x370 [ 2022.612278] ? mempool_alloc+0x350/0x350 [ 2022.616344] mempool_alloc+0x146/0x350 [ 2022.620232] ? mempool_resize+0x790/0x790 [ 2022.624381] ? mark_held_locks+0xf0/0xf0 [ 2022.628444] ? mark_held_locks+0xf0/0xf0 [ 2022.632510] ? check_preemption_disabled+0x41/0x280 [ 2022.637533] ? find_get_entry+0x4f4/0x8a0 [ 2022.641686] bio_alloc_bioset+0x389/0x5e0 [ 2022.645837] ? bvec_alloc+0x2f0/0x2f0 [ 2022.649642] ? lock_downgrade+0x720/0x720 [ 2022.653792] ? lock_acquire+0x170/0x3c0 [ 2022.657767] ? mark_buffer_dirty_inode+0x12c/0x3c0 [ 2022.662709] submit_bh_wbc+0x141/0x760 [ 2022.666608] __sync_dirty_buffer+0x14e/0x320 [ 2022.671018] __ext4_handle_dirty_metadata+0x234/0x590 [ 2022.676221] ext4_getblk+0x32d/0x4f0 [ 2022.679940] ? ext4_iomap_begin+0xe00/0xe00 [ 2022.684265] ? ext4_free_inode+0x1780/0x1780 [ 2022.688673] ? debug_check_no_obj_freed+0x201/0x490 [ 2022.693692] ? __dquot_initialize+0x298/0xb70 [ 2022.698193] ext4_bread+0x7c/0x210 [ 2022.701738] ? ext4_getblk+0x4f0/0x4f0 [ 2022.705631] ? dquot_initialize_needed+0x290/0x290 [ 2022.710649] ? trace_hardirqs_off+0x64/0x200 [ 2022.715068] ext4_append+0x155/0x370 [ 2022.718790] ext4_mkdir+0x5bd/0xe10 [ 2022.722425] ? ext4_init_dot_dotdot+0x600/0x600 [ 2022.727083] ? generic_permission+0x116/0x4d0 [ 2022.731591] ? inode_permission.part.0+0x10c/0x450 [ 2022.736515] vfs_mkdir+0x508/0x7a0 [ 2022.740038] do_mkdirat+0x262/0x2d0 [ 2022.743655] ? __ia32_sys_mknod+0x120/0x120 [ 2022.747957] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2022.752967] ? do_syscall_64+0x21/0x620 [ 2022.756940] do_syscall_64+0xf9/0x620 [ 2022.760737] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2022.765918] RIP: 0033:0x7ff1645fa387 [ 2022.769619] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2022.788599] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 2022.796298] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fa387 [ 2022.803564] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 2022.810835] RBP: 00007ff162f701d0 R08: 0000000000000000 R09: 00007ff162f701d0 [ 2022.818102] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2022.822414] libceph: connect [d::]:6789 error -101 [ 2022.825360] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 [ 2022.830337] libceph: mon0 [d::]:6789 connect error 08:15:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000000100e502000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:36 executing program 0: open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) (async) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) (async) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{}, {0x0, 0x3938700}}, 0x0) (async) timer_create(0x0, &(0x7f0000000080)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f00000011c0)=0x0) (async) clock_gettime(0x0, 0x0) (async) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x4000}, r1, 0x0, 0xffffffffffffffff, 0x0) (async) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000000)) (async) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) (async) mount(&(0x7f0000000640)=ANY=[@ANYBLOB='[d::],0::6:'], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) (async) futex(0x0, 0x4, 0x1, &(0x7f0000000400), 0x0, 0x0) (async) pselect6(0x40, &(0x7f0000000140)={0x0, 0x101, 0x0, 0x3f, 0x80000000, 0x1f, 0x81, 0x791b}, &(0x7f00000001c0)={0x1, 0x0, 0x9, 0xff, 0xff, 0x3, 0x3, 0x3}, 0x0, &(0x7f0000000280), &(0x7f0000000300)={0x0}) 08:15:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85fffffffdffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:36 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000006c08000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:36 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x7a000000}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 37) 08:15:36 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000000100e902000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2023.122983] net_ratelimit: 1400 callbacks suppressed [ 2023.122988] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2023.136561] ceph: No mds server is up or the cluster is laggy [ 2023.189456] FAULT_INJECTION: forcing a failure. [ 2023.189456] name failslab, interval 1, probability 0, space 0, times 0 [ 2023.208295] CPU: 0 PID: 14226 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2023.216188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2023.225542] Call Trace: [ 2023.228137] dump_stack+0x1fc/0x2ef [ 2023.231773] should_fail.cold+0xa/0xf [ 2023.235584] ? setup_fault_attr+0x200/0x200 [ 2023.239916] ? __lock_acquire+0x6de/0x3ff0 [ 2023.244243] __should_failslab+0x115/0x180 [ 2023.248483] should_failslab+0x5/0x10 [ 2023.252285] kmem_cache_alloc+0x3f/0x370 [ 2023.256345] ? mempool_alloc+0x350/0x350 [ 2023.260406] mempool_alloc+0x146/0x350 [ 2023.264290] ? mempool_resize+0x790/0x790 [ 2023.268438] ? __sync_dirty_buffer+0x1ef/0x320 [ 2023.273011] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 2023.278764] ? kernel_fpu_enable+0x1f/0x40 [ 2023.282986] ? kernel_fpu_end+0x11b/0x170 [ 2023.287125] ? kernel_fpu_enable+0x40/0x40 [ 2023.291352] bio_alloc_bioset+0x389/0x5e0 [ 2023.295489] ? bvec_alloc+0x2f0/0x2f0 [ 2023.299278] ? lock_downgrade+0x720/0x720 [ 2023.303419] ? check_preemption_disabled+0x41/0x280 [ 2023.308425] submit_bh_wbc+0x141/0x760 [ 2023.312314] __sync_dirty_buffer+0x14e/0x320 [ 2023.316731] __ext4_handle_dirty_metadata+0x234/0x590 [ 2023.321914] ? ext4_dirent_csum_set+0x1e1/0x2c0 [ 2023.326575] ext4_mkdir+0x689/0xe10 [ 2023.330194] ? ext4_init_dot_dotdot+0x600/0x600 [ 2023.334853] ? generic_permission+0x116/0x4d0 [ 2023.339340] ? inode_permission.part.0+0x10c/0x450 [ 2023.344256] vfs_mkdir+0x508/0x7a0 [ 2023.347782] do_mkdirat+0x262/0x2d0 [ 2023.351403] ? __ia32_sys_mknod+0x120/0x120 [ 2023.355716] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2023.360719] ? do_syscall_64+0x21/0x620 [ 2023.364683] do_syscall_64+0xf9/0x620 [ 2023.368472] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2023.373650] RIP: 0033:0x7ff1645fa387 08:15:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x7aad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:37 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000007408000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2023.377348] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2023.396254] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 2023.403951] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fa387 [ 2023.411209] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 2023.418468] RBP: 00007ff162f701d0 R08: 0000000000000000 R09: 00007ff162f701d0 [ 2023.425731] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2023.432984] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 08:15:37 executing program 0: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000400)=ANY=[], 0x44) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x1, 0x0, 0x6, 0xcf, 0xff, "f74f8b4151c095f1112d82838ed8e2f244b486240c35d97272d9d36b426fd012fecee2b360a78c70e9f781d06d781e2c4f20fe6727d81889078c71f3743f96", 0x7}, 0x60) write(0xffffffffffffffff, &(0x7f00000000c0)="240000001a005f0014f9f407000904000a800000000000000000000008000100", 0x20) r1 = socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="73797a30d3e472c46863a75e0f010000000100000017542d4ed364bff612a3477dde4170f4832ace7463dceaa301d159c4bb30ce0c168aef927828f1cd7def4acf64e839dad61eee5e2ea5eb61f94bf029f2fab57f1308c90c73826dfc8302bd6cdcf26cb81a9bcc9694d6fa352c391da1f8a2188b22cdacd462531150a56c44f45b37dc616b72aedf02a1654718410ce93f7828f72593cbb761168dc5ed4c44255d57ec2fef7b9c5a7556ce8f5f16a858d6"], 0xd) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924b68, 0x0) [ 2023.478088] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (14232) [ 2023.490924] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (14226) 08:15:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000003000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 38) 08:15:37 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000007a08000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x7bad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000fffffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:37 executing program 0: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) (async) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000400)=ANY=[], 0x44) (async) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x1, 0x0, 0x6, 0xcf, 0xff, "f74f8b4151c095f1112d82838ed8e2f244b486240c35d97272d9d36b426fd012fecee2b360a78c70e9f781d06d781e2c4f20fe6727d81889078c71f3743f96", 0x7}, 0x60) (async) write(0xffffffffffffffff, &(0x7f00000000c0)="240000001a005f0014f9f407000904000a800000000000000000000008000100", 0x20) r1 = socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="73797a30d3e472c46863a75e0f010000000100000017542d4ed364bff612a3477dde4170f4832ace7463dceaa301d159c4bb30ce0c168aef927828f1cd7def4acf64e839dad61eee5e2ea5eb61f94bf029f2fab57f1308c90c73826dfc8302bd6cdcf26cb81a9bcc9694d6fa352c391da1f8a2188b22cdacd462531150a56c44f45b37dc616b72aedf02a1654718410ce93f7828f72593cbb761168dc5ed4c44255d57ec2fef7b9c5a7556ce8f5f16a858d6"], 0xd) (async) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924b68, 0x0) 08:15:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001001103000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2023.674633] FAULT_INJECTION: forcing a failure. [ 2023.674633] name failslab, interval 1, probability 0, space 0, times 0 [ 2023.714017] CPU: 1 PID: 14267 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 08:15:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x7cad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:37 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000009000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2023.722091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2023.731550] Call Trace: [ 2023.734151] dump_stack+0x1fc/0x2ef [ 2023.737789] should_fail.cold+0xa/0xf [ 2023.741599] ? setup_fault_attr+0x200/0x200 [ 2023.745930] ? __lock_acquire+0x6de/0x3ff0 [ 2023.750174] __should_failslab+0x115/0x180 [ 2023.754419] should_failslab+0x5/0x10 [ 2023.758224] kmem_cache_alloc+0x3f/0x370 [ 2023.762288] ? mempool_alloc+0x350/0x350 [ 2023.766356] mempool_alloc+0x146/0x350 [ 2023.770246] ? mempool_resize+0x790/0x790 08:15:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x7dad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2023.774745] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 2023.779594] ? kernel_fpu_enable+0x1f/0x40 [ 2023.783833] ? kernel_fpu_end+0x11b/0x170 [ 2023.787988] ? kernel_fpu_enable+0x40/0x40 [ 2023.792229] bio_alloc_bioset+0x389/0x5e0 [ 2023.796380] ? bvec_alloc+0x2f0/0x2f0 [ 2023.800186] ? lock_downgrade+0x720/0x720 [ 2023.804344] ? check_preemption_disabled+0x41/0x280 [ 2023.809370] submit_bh_wbc+0x141/0x760 [ 2023.813266] __sync_dirty_buffer+0x14e/0x320 [ 2023.817682] __ext4_handle_dirty_metadata+0x234/0x590 08:15:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x7ead0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2023.822879] ? ext4_dirent_csum_set+0x1e1/0x2c0 [ 2023.827608] add_dirent_to_buf+0x44a/0x770 [ 2023.831852] ? ext4_insert_dentry+0x490/0x490 [ 2023.836488] ? __ext4_read_dirblock+0x3cd/0x9d0 [ 2023.841170] ext4_add_entry+0x508/0xbb0 [ 2023.845155] ? make_indexed_dir+0xee0/0xee0 [ 2023.849496] ? __sync_dirty_buffer+0x1ef/0x320 [ 2023.854062] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 2023.859428] ext4_mkdir+0x6f5/0xe10 [ 2023.863067] ? ext4_init_dot_dotdot+0x600/0x600 [ 2023.867157] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 08:15:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x7fad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2023.867745] ? generic_permission+0x116/0x4d0 [ 2023.879578] ? inode_permission.part.0+0x10c/0x450 [ 2023.884519] vfs_mkdir+0x508/0x7a0 [ 2023.888065] do_mkdirat+0x262/0x2d0 [ 2023.891689] ? __ia32_sys_mknod+0x120/0x120 [ 2023.896007] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2023.901028] ? do_syscall_64+0x21/0x620 [ 2023.905008] do_syscall_64+0xf9/0x620 [ 2023.908817] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2023.914001] RIP: 0033:0x7ff1645fa387 08:15:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x80020000}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2023.917709] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2023.936614] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000213 ORIG_RAX: 0000000000000102 [ 2023.944327] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fa387 [ 2023.951602] RDX: 00000000000001ff RSI: 0000000020000100 RDI: 00000000ffffff9c [ 2023.958982] RBP: 00007ff162f701d0 R08: 0000000000000000 R09: 00007ff162f701d0 [ 2023.966252] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 2023.973894] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 08:15:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 39) 08:15:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x80ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85001fffffffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:37 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c00010008000000000000000a000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:37 executing program 0: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) (async) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000400)=ANY=[], 0x44) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x1, 0x0, 0x6, 0xcf, 0xff, "f74f8b4151c095f1112d82838ed8e2f244b486240c35d97272d9d36b426fd012fecee2b360a78c70e9f781d06d781e2c4f20fe6727d81889078c71f3743f96", 0x7}, 0x60) (async) write(0xffffffffffffffff, &(0x7f00000000c0)="240000001a005f0014f9f407000904000a800000000000000000000008000100", 0x20) r1 = socket(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="73797a30d3e472c46863a75e0f010000000100000017542d4ed364bff612a3477dde4170f4832ace7463dceaa301d159c4bb30ce0c168aef927828f1cd7def4acf64e839dad61eee5e2ea5eb61f94bf029f2fab57f1308c90c73826dfc8302bd6cdcf26cb81a9bcc9694d6fa352c391da1f8a2188b22cdacd462531150a56c44f45b37dc616b72aedf02a1654718410ce93f7828f72593cbb761168dc5ed4c44255d57ec2fef7b9c5a7556ce8f5f16a858d6"], 0xd) sendmmsg$alg(r1, &(0x7f0000000140), 0x4924b68, 0x0) 08:15:37 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001005903000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:37 executing program 0: mlockall(0x3) brk(0x55555ede5ffe) brk(0x55555ede6001) brk(0x6) brk(0x0) 08:15:37 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x81000000}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85fcfdffffffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2024.199466] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 2024.218558] FAULT_INJECTION: forcing a failure. [ 2024.218558] name failslab, interval 1, probability 0, space 0, times 0 [ 2024.233510] CPU: 0 PID: 14338 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2024.235319] nla_parse: 12 callbacks suppressed [ 2024.235344] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2024.241413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2024.241420] Call Trace: [ 2024.241441] dump_stack+0x1fc/0x2ef [ 2024.241460] should_fail.cold+0xa/0xf [ 2024.241477] ? setup_fault_attr+0x200/0x200 [ 2024.241492] ? lock_acquire+0x170/0x3c0 [ 2024.241512] __should_failslab+0x115/0x180 [ 2024.241529] should_failslab+0x5/0x10 [ 2024.241543] kmem_cache_alloc_trace+0x284/0x380 [ 2024.241557] ? _copy_from_user+0xd2/0x130 [ 2024.241575] copy_mount_options+0x59/0x380 [ 2024.241593] ksys_mount+0x9b/0x130 [ 2024.241610] __x64_sys_mount+0xba/0x150 [ 2024.241626] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2024.241640] do_syscall_64+0xf9/0x620 [ 2024.241658] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2024.241670] RIP: 0033:0x7ff1645fc7aa 08:15:38 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c00010008000000000000000b000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2024.241683] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2024.241690] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2024.241703] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fc7aa [ 2024.241711] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff162f6ffe0 [ 2024.241720] RBP: 00007ff162f70020 R08: 00007ff162f70020 R09: 0000000020000000 [ 2024.241727] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2024.241735] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 08:15:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000000100a603000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x81ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 40) 08:15:38 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000014000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2024.455493] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 2024.475005] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85fdfdffffffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x82ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e858cffffffffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2024.627907] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 2024.639142] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:38 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c00010008000000000000001c000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2024.693848] FAULT_INJECTION: forcing a failure. [ 2024.693848] name failslab, interval 1, probability 0, space 0, times 0 [ 2024.733230] CPU: 1 PID: 14373 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2024.741137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2024.750496] Call Trace: [ 2024.753100] dump_stack+0x1fc/0x2ef [ 2024.756754] should_fail.cold+0xa/0xf [ 2024.760565] ? setup_fault_attr+0x200/0x200 [ 2024.764892] ? lock_acquire+0x170/0x3c0 [ 2024.768881] __should_failslab+0x115/0x180 [ 2024.773149] should_failslab+0x5/0x10 [ 2024.776966] __kmalloc_track_caller+0x2a6/0x3c0 [ 2024.781646] ? strndup_user+0x70/0x120 [ 2024.785545] memdup_user+0x22/0xb0 [ 2024.789135] strndup_user+0x70/0x120 [ 2024.792863] ksys_mount+0x34/0x130 [ 2024.796412] __x64_sys_mount+0xba/0x150 [ 2024.800401] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2024.804984] do_syscall_64+0xf9/0x620 [ 2024.808790] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2024.813980] RIP: 0033:0x7ff1645fc7aa [ 2024.817696] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2024.833310] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 2024.836614] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2024.836629] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fc7aa [ 2024.836637] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff162f6ffe0 [ 2024.836646] RBP: 00007ff162f70020 R08: 00007ff162f70020 R09: 0000000020000000 [ 2024.836655] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2024.836663] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 08:15:38 executing program 0: mlockall(0x3) (async, rerun: 32) brk(0x55555ede5ffe) (rerun: 32) brk(0x55555ede6001) (async) brk(0x6) (async) brk(0x0) 08:15:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x83ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000000100e703000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:38 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c00010008000000000000002f000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8597ffffffffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 41) 08:15:38 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000000100fb03000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2025.101675] FAULT_INJECTION: forcing a failure. [ 2025.101675] name failslab, interval 1, probability 0, space 0, times 0 [ 2025.135435] CPU: 1 PID: 14408 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2025.143347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2025.152704] Call Trace: [ 2025.155302] dump_stack+0x1fc/0x2ef [ 2025.158938] should_fail.cold+0xa/0xf [ 2025.162748] ? setup_fault_attr+0x200/0x200 [ 2025.167073] ? lock_acquire+0x170/0x3c0 [ 2025.171066] __should_failslab+0x115/0x180 [ 2025.175366] should_failslab+0x5/0x10 [ 2025.179176] kmem_cache_alloc_trace+0x284/0x380 [ 2025.183858] ? _copy_from_user+0xd2/0x130 [ 2025.188023] copy_mount_options+0x59/0x380 [ 2025.192281] ksys_mount+0x9b/0x130 [ 2025.195831] __x64_sys_mount+0xba/0x150 [ 2025.199821] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2025.204413] do_syscall_64+0xf9/0x620 [ 2025.208229] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2025.213423] RIP: 0033:0x7ff1645fc7aa [ 2025.217224] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2025.236126] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2025.243838] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fc7aa 08:15:38 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x84ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2025.251115] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff162f6ffe0 [ 2025.258386] RBP: 00007ff162f70020 R08: 00007ff162f70020 R09: 0000000020000000 [ 2025.265663] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2025.272943] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 [ 2025.290858] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:38 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000040000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85f5ffffffffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 42) 08:15:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000005000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2025.419630] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2025.500050] FAULT_INJECTION: forcing a failure. [ 2025.500050] name failslab, interval 1, probability 0, space 0, times 0 [ 2025.519893] CPU: 1 PID: 14448 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2025.527797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2025.537154] Call Trace: [ 2025.539750] dump_stack+0x1fc/0x2ef [ 2025.543389] should_fail.cold+0xa/0xf [ 2025.547195] ? setup_fault_attr+0x200/0x200 [ 2025.551517] ? lock_acquire+0x170/0x3c0 [ 2025.555502] __should_failslab+0x115/0x180 [ 2025.559743] should_failslab+0x5/0x10 [ 2025.563549] kmem_cache_alloc+0x277/0x370 [ 2025.567711] getname_flags+0xce/0x590 [ 2025.571520] user_path_at_empty+0x2a/0x50 [ 2025.575674] do_mount+0x147/0x2f50 [ 2025.579217] ? cmp_ex_sort+0xc0/0xc0 [ 2025.582935] ? __do_page_fault+0x180/0xd60 [ 2025.587198] ? copy_mount_string+0x40/0x40 [ 2025.591451] ? memset+0x20/0x40 [ 2025.594738] ? copy_mount_options+0x26f/0x380 [ 2025.599248] ksys_mount+0xcf/0x130 [ 2025.602796] __x64_sys_mount+0xba/0x150 [ 2025.606791] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2025.611388] do_syscall_64+0xf9/0x620 [ 2025.615208] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2025.620414] RIP: 0033:0x7ff1645fc7aa [ 2025.624134] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2025.643041] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2025.650760] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fc7aa [ 2025.658178] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff162f6ffe0 [ 2025.665450] RBP: 00007ff162f70020 R08: 00007ff162f70020 R09: 0000000020000000 [ 2025.672722] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2025.680006] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 08:15:39 executing program 0: mlockall(0x3) brk(0x55555ede5ffe) brk(0x55555ede6001) brk(0x6) brk(0x0) mlockall(0x3) (async) brk(0x55555ede5ffe) (async) brk(0x55555ede6001) (async) brk(0x6) (async) brk(0x0) (async) 08:15:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x85ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:39 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000060000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85f6ffffffffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000006000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 43) 08:15:39 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x86ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2026.053096] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2026.086829] FAULT_INJECTION: forcing a failure. [ 2026.086829] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2026.098652] CPU: 0 PID: 14480 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2026.106536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2026.115904] Call Trace: [ 2026.118538] dump_stack+0x1fc/0x2ef [ 2026.122186] should_fail.cold+0xa/0xf [ 2026.126017] ? setup_fault_attr+0x200/0x200 [ 2026.130346] ? is_bpf_text_address+0xfc/0x1b0 [ 2026.134853] ? kernel_text_address+0xbd/0xf0 [ 2026.139279] ? __kernel_text_address+0x9/0x30 [ 2026.143787] __alloc_pages_nodemask+0x239/0x2890 [ 2026.148556] ? __lock_acquire+0x6de/0x3ff0 08:15:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85fbffffffffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:39 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000002000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2026.152798] ? __x64_sys_mount+0xba/0x150 [ 2026.156955] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2026.161802] ? ext4_mkdir+0x82b/0xe10 [ 2026.165613] ? mark_held_locks+0xf0/0xf0 [ 2026.169690] ? mark_held_locks+0xf0/0xf0 [ 2026.173769] ? list_lru_add+0x292/0x600 [ 2026.177752] ? mntput_no_expire+0xf2/0xa30 [ 2026.181992] cache_grow_begin+0xa4/0x8a0 [ 2026.186059] ? setup_fault_attr+0x200/0x200 [ 2026.190386] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 2026.195245] cache_alloc_refill+0x273/0x340 [ 2026.199588] kmem_cache_alloc_trace+0x354/0x380 [ 2026.204282] copy_mount_options+0x59/0x380 [ 2026.208529] ksys_mount+0x9b/0x130 [ 2026.212138] __x64_sys_mount+0xba/0x150 [ 2026.216120] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2026.220719] do_syscall_64+0xf9/0x620 [ 2026.224531] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2026.229741] RIP: 0033:0x7ff1645fc7aa [ 2026.233462] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 08:15:39 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000007000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2026.252452] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2026.260215] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fc7aa [ 2026.267489] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff162f6ffe0 [ 2026.274756] RBP: 00007ff162f70020 R08: 00007ff162f70020 R09: 0000000020000000 [ 2026.282021] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2026.289299] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 08:15:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 44) 08:15:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85fdffffffffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2026.443327] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:40 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000140)=0xc9ae) write$cgroup_int(r1, &(0x7f0000000200), 0x12) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x14) ioctl$TCFLSH(r2, 0x8926, 0x0) dup2(r1, r2) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) io_setup(0x9, &(0x7f0000000100)=0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000010002000000000002000200", @ANYRES32=0x0, @ANYBLOB="04000800000500", @ANYRES32=0xee00, @ANYBLOB="08000300", @ANYRES32=0x0, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="10000500000000003683010000000000"], 0x44, 0x2) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x14) ioctl$TCFLSH(r5, 0x8926, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x10) io_submit(r4, 0x7821, &(0x7f0000000540)=[&(0x7f00000000c0)={0xfff0, 0x60, 0x3, 0x1, 0x0, r3, &(0x7f0000000000), 0x11000}]) 08:15:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x87ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000009000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:40 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000003000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2026.539630] FAULT_INJECTION: forcing a failure. [ 2026.539630] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2026.551454] CPU: 0 PID: 14516 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2026.559339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2026.568690] Call Trace: [ 2026.571285] dump_stack+0x1fc/0x2ef [ 2026.575356] should_fail.cold+0xa/0xf [ 2026.579166] ? setup_fault_attr+0x200/0x200 [ 2026.583495] ? unwind_next_frame+0xeee/0x1400 [ 2026.587993] ? __save_stack_trace+0x72/0x190 [ 2026.592406] ? deref_stack_reg+0x134/0x1d0 [ 2026.596659] ? get_reg+0x176/0x1f0 [ 2026.600214] __alloc_pages_nodemask+0x239/0x2890 [ 2026.604993] ? cmp_ex_search+0x87/0xb0 [ 2026.608977] ? __lock_acquire+0x6de/0x3ff0 [ 2026.613229] ? copy_mount_options+0x1e9/0x380 [ 2026.617734] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2026.622573] ? ex_handler_default+0x14/0x90 [ 2026.626876] ? phys_mem_access_encrypted+0x10/0x10 [ 2026.631966] ? no_context+0xce/0x940 [ 2026.635681] ? force_sig_info_fault.constprop.0+0x320/0x320 [ 2026.641379] ? bad_area_access_error+0x23b/0x4a0 [ 2026.646127] cache_grow_begin+0xa4/0x8a0 [ 2026.650188] ? setup_fault_attr+0x200/0x200 [ 2026.654507] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 2026.659251] cache_alloc_refill+0x273/0x340 [ 2026.663577] kmem_cache_alloc+0x346/0x370 [ 2026.667711] getname_flags+0xce/0x590 [ 2026.671495] user_path_at_empty+0x2a/0x50 [ 2026.676064] do_mount+0x147/0x2f50 [ 2026.679592] ? cmp_ex_sort+0xc0/0xc0 [ 2026.683293] ? __do_page_fault+0x180/0xd60 [ 2026.687514] ? copy_mount_string+0x40/0x40 [ 2026.691740] ? memset+0x20/0x40 [ 2026.695018] ? copy_mount_options+0x26f/0x380 [ 2026.699504] ksys_mount+0xcf/0x130 [ 2026.703056] __x64_sys_mount+0xba/0x150 [ 2026.707025] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2026.711593] do_syscall_64+0xf9/0x620 [ 2026.715380] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2026.720560] RIP: 0033:0x7ff1645fc7aa [ 2026.724265] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2026.743169] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2026.750881] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fc7aa [ 2026.758151] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff162f6ffe0 [ 2026.765406] RBP: 00007ff162f70020 R08: 00007ff162f70020 R09: 0000000020000000 [ 2026.772659] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2026.779918] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 [ 2026.817531] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (14521) 08:15:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 45) 08:15:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x88600000}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:40 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000005000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2026.858394] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000311000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000000009affff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2026.926308] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 08:15:40 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000006000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x88a8ffff}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2027.029906] FAULT_INJECTION: forcing a failure. [ 2027.029906] name failslab, interval 1, probability 0, space 0, times 0 [ 2027.080447] CPU: 1 PID: 14553 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2027.088362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2027.097725] Call Trace: [ 2027.098363] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 2027.100319] dump_stack+0x1fc/0x2ef [ 2027.100340] should_fail.cold+0xa/0xf [ 2027.100358] ? setup_fault_attr+0x200/0x200 [ 2027.100373] ? lock_acquire+0x170/0x3c0 [ 2027.100392] __should_failslab+0x115/0x180 08:15:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x88ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2027.100410] should_failslab+0x5/0x10 [ 2027.131459] kmem_cache_alloc+0x277/0x370 [ 2027.135618] alloc_vfsmnt+0x23/0x780 [ 2027.139344] vfs_kern_mount.part.0+0x27/0x470 [ 2027.143848] ? kfree+0x110/0x210 [ 2027.147227] vfs_kern_mount+0x3c/0x60 [ 2027.151042] btrfs_mount+0x23a/0xaa0 [ 2027.154767] ? btrfs_show_options+0xfd0/0xfd0 [ 2027.159268] ? __mutex_unlock_slowpath+0xea/0x610 [ 2027.164288] ? check_preemption_disabled+0x41/0x280 [ 2027.169325] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2027.174350] ? pcpu_alloc+0xc9/0x1190 [ 2027.178152] ? __lockdep_init_map+0x100/0x5a0 [ 2027.182724] mount_fs+0xa3/0x310 [ 2027.186115] vfs_kern_mount.part.0+0x68/0x470 [ 2027.190622] do_mount+0x115c/0x2f50 [ 2027.194259] ? cmp_ex_sort+0xc0/0xc0 [ 2027.197983] ? __do_page_fault+0x180/0xd60 [ 2027.202227] ? copy_mount_string+0x40/0x40 [ 2027.206581] ? memset+0x20/0x40 [ 2027.209875] ? copy_mount_options+0x26f/0x380 [ 2027.214388] ksys_mount+0xcf/0x130 [ 2027.217940] __x64_sys_mount+0xba/0x150 [ 2027.221925] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2027.226518] do_syscall_64+0xf9/0x620 [ 2027.230334] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2027.235537] RIP: 0033:0x7ff1645fc7aa [ 2027.239258] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2027.258173] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2027.265887] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fc7aa [ 2027.273148] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff162f6ffe0 [ 2027.280406] RBP: 00007ff162f70020 R08: 00007ff162f70020 R09: 0000000020000000 [ 2027.287730] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2027.295005] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 08:15:40 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) (async) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000140)=0xc9ae) write$cgroup_int(r1, &(0x7f0000000200), 0x12) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x14) (async) ioctl$TCFLSH(r2, 0x8926, 0x0) (async) dup2(r1, r2) (async) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) (async) io_setup(0x9, &(0x7f0000000100)=0x0) (async) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000010002000000000002000200", @ANYRES32=0x0, @ANYBLOB="04000800000500", @ANYRES32=0xee00, @ANYBLOB="08000300", @ANYRES32=0x0, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="10000500000000003683010000000000"], 0x44, 0x2) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x14) (async) ioctl$TCFLSH(r5, 0x8926, 0x0) (async) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x10) io_submit(r4, 0x7821, &(0x7f0000000540)=[&(0x7f00000000c0)={0xfff0, 0x60, 0x3, 0x1, 0x0, r3, &(0x7f0000000000), 0x11000}]) 08:15:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x89ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:40 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000000100021c000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:40 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000007000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 46) 08:15:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000020000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500020000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2027.384967] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 08:15:41 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000009000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x8aad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:41 executing program 0: perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x2) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) (async) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, 0xffffffffffffffff, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events.local\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000140)=0xc9ae) (async) write$cgroup_int(r1, &(0x7f0000000200), 0x12) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x14) (async) ioctl$TCFLSH(r2, 0x8926, 0x0) (async) dup2(r1, r2) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) (async) io_setup(0x9, &(0x7f0000000100)=0x0) (async, rerun: 64) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (rerun: 64) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000010002000000000002000200", @ANYRES32=0x0, @ANYBLOB="04000800000500", @ANYRES32=0xee00, @ANYBLOB="08000300", @ANYRES32=0x0, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="10000500000000003683010000000000"], 0x44, 0x2) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x14) (async, rerun: 32) ioctl$TCFLSH(r5, 0x8926, 0x0) (async, rerun: 32) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x10) io_submit(r4, 0x7821, &(0x7f0000000540)=[&(0x7f00000000c0)={0xfff0, 0x60, 0x3, 0x1, 0x0, r3, &(0x7f0000000000), 0x11000}]) [ 2027.513539] FAULT_INJECTION: forcing a failure. [ 2027.513539] name failslab, interval 1, probability 0, space 0, times 0 [ 2027.548841] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 08:15:41 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c00010008000000000000000a000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2027.566112] CPU: 0 PID: 14606 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2027.566534] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2027.574016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2027.574023] Call Trace: [ 2027.574045] dump_stack+0x1fc/0x2ef [ 2027.574063] should_fail.cold+0xa/0xf [ 2027.574081] ? setup_fault_attr+0x200/0x200 [ 2027.574096] ? lock_acquire+0x170/0x3c0 [ 2027.574117] __should_failslab+0x115/0x180 [ 2027.574132] should_failslab+0x5/0x10 [ 2027.574147] __kmalloc_track_caller+0x2a6/0x3c0 [ 2027.574161] ? kstrdup_const+0x53/0x80 [ 2027.574185] kstrdup+0x36/0x70 [ 2027.574203] kstrdup_const+0x53/0x80 [ 2027.574219] alloc_vfsmnt+0xb5/0x780 [ 2027.574233] ? _raw_read_unlock+0x29/0x40 [ 2027.574248] vfs_kern_mount.part.0+0x27/0x470 [ 2027.574266] do_mount+0x115c/0x2f50 [ 2027.574282] ? cmp_ex_sort+0xc0/0xc0 [ 2027.574303] ? __do_page_fault+0x180/0xd60 [ 2027.657548] ? copy_mount_string+0x40/0x40 [ 2027.661772] ? memset+0x20/0x40 [ 2027.665037] ? copy_mount_options+0x26f/0x380 [ 2027.669542] ksys_mount+0xcf/0x130 [ 2027.673195] __x64_sys_mount+0xba/0x150 [ 2027.677181] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2027.681751] do_syscall_64+0xf9/0x620 [ 2027.685542] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2027.690713] RIP: 0033:0x7ff1645fc7aa [ 2027.694413] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 08:15:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000023000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2027.713301] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2027.721110] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fc7aa [ 2027.728382] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff162f6ffe0 [ 2027.735635] RBP: 00007ff162f70020 R08: 00007ff162f70020 R09: 0000000020000000 [ 2027.742904] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2027.750160] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 08:15:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x8bad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500030000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 47) [ 2027.826767] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 2027.835926] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:41 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c00010008000000000000000b000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpid() rt_tgsigqueueinfo(r1, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x4}) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='wlan0\x00', 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000070, 0xc00) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[{0x0, 0x1104}], 0x1}, 0x0) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)={0x1a4, r2, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x20004010}, 0x48040) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000000)) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x24040005) read(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r3, &(0x7f0000000040)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r3, &(0x7f0000000080)=ANY=[@ANYBLOB], 0xd) 08:15:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x8c010000}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000000100022a000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2027.973823] FAULT_INJECTION: forcing a failure. [ 2027.973823] name failslab, interval 1, probability 0, space 0, times 0 [ 2028.005507] CPU: 1 PID: 14653 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2028.013413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2028.022777] Call Trace: [ 2028.025369] dump_stack+0x1fc/0x2ef [ 2028.029045] should_fail.cold+0xa/0xf [ 2028.032873] ? setup_fault_attr+0x200/0x200 [ 2028.037200] ? lock_acquire+0x170/0x3c0 [ 2028.041186] __should_failslab+0x115/0x180 [ 2028.045432] should_failslab+0x5/0x10 [ 2028.049241] kmem_cache_alloc+0x277/0x370 [ 2028.053398] alloc_vfsmnt+0x23/0x780 [ 2028.057127] ? _raw_read_unlock+0x29/0x40 [ 2028.061288] vfs_kern_mount.part.0+0x27/0x470 [ 2028.065794] do_mount+0x115c/0x2f50 [ 2028.069428] ? cmp_ex_sort+0xc0/0xc0 08:15:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x8c030000}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:41 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000010000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2028.073157] ? __do_page_fault+0x180/0xd60 [ 2028.077396] ? copy_mount_string+0x40/0x40 [ 2028.081643] ? memset+0x20/0x40 [ 2028.084979] ? copy_mount_options+0x26f/0x380 [ 2028.089461] ksys_mount+0xcf/0x130 [ 2028.092991] __x64_sys_mount+0xba/0x150 [ 2028.096953] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2028.101518] do_syscall_64+0xf9/0x620 [ 2028.105307] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2028.110481] RIP: 0033:0x7ff1645fc7aa [ 2028.114183] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2028.133071] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2028.140764] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fc7aa [ 2028.148026] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff162f6ffe0 [ 2028.155466] RBP: 00007ff162f70020 R08: 00007ff162f70020 R09: 0000000020000000 [ 2028.162730] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 08:15:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) r0 = socket$inet_udp(0x2, 0x2, 0x0) (async, rerun: 32) r1 = getpid() rt_tgsigqueueinfo(r1, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x4}) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) (async, rerun: 32) sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) (async, rerun: 32) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='wlan0\x00', 0x10) (async) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000070, 0xc00) (async) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[{0x0, 0x1104}], 0x1}, 0x0) (async) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)={0x1a4, r2, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x20004010}, 0x48040) (async) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000000)) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x24040005) (async) read(0xffffffffffffffff, 0x0, 0x0) (async) close(0xffffffffffffffff) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r3, &(0x7f0000000040)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r3, &(0x7f0000000080)=ANY=[@ANYBLOB], 0xd) [ 2028.169981] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 08:15:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 48) 08:15:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500040000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x8cad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:41 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000014000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:41 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000000100003f000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500050000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2028.340731] FAULT_INJECTION: forcing a failure. [ 2028.340731] name failslab, interval 1, probability 0, space 0, times 0 [ 2028.379533] CPU: 0 PID: 14683 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 08:15:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = socket$inet_udp(0x2, 0x2, 0x0) (async, rerun: 64) r1 = getpid() (rerun: 64) rt_tgsigqueueinfo(r1, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x4}) (async) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) (async, rerun: 32) sched_setscheduler(r1, 0x5, &(0x7f00000001c0)) (rerun: 32) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='wlan0\x00', 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000070, 0xc00) (async) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[{0x0, 0x1104}], 0x1}, 0x0) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_TRAP_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)={0x1a4, r2, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}, {@pci={{0x8}, {0x11}}, {0x1c}}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x20004010}, 0x48040) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000000)) sendmsg$IPSET_CMD_HEADER(0xffffffffffffffff, 0x0, 0x24040005) (async) read(0xffffffffffffffff, 0x0, 0x0) (async) close(0xffffffffffffffff) (async) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r3, &(0x7f0000000040)={0x1f, 0xffff, 0x3}, 0x6) write$binfmt_misc(r3, &(0x7f0000000080)=ANY=[@ANYBLOB], 0xd) [ 2028.387471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2028.396833] Call Trace: [ 2028.399431] dump_stack+0x1fc/0x2ef [ 2028.403072] should_fail.cold+0xa/0xf [ 2028.406886] ? setup_fault_attr+0x200/0x200 [ 2028.411219] ? lock_acquire+0x170/0x3c0 [ 2028.415210] __should_failslab+0x115/0x180 [ 2028.419451] should_failslab+0x5/0x10 [ 2028.423246] kmem_cache_alloc+0x277/0x370 [ 2028.427380] alloc_vfsmnt+0x23/0x780 [ 2028.431174] vfs_kern_mount.part.0+0x27/0x470 [ 2028.435661] ? kfree+0x110/0x210 [ 2028.439019] vfs_kern_mount+0x3c/0x60 [ 2028.442804] btrfs_mount+0x23a/0xaa0 [ 2028.446500] ? btrfs_show_options+0xfd0/0xfd0 [ 2028.450987] ? __mutex_unlock_slowpath+0xea/0x610 [ 2028.455828] ? check_preemption_disabled+0x41/0x280 [ 2028.460833] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2028.465834] ? pcpu_alloc+0xc9/0x1190 [ 2028.469619] ? __lockdep_init_map+0x100/0x5a0 [ 2028.474106] mount_fs+0xa3/0x310 [ 2028.477459] vfs_kern_mount.part.0+0x68/0x470 [ 2028.481940] do_mount+0x115c/0x2f50 [ 2028.485551] ? cmp_ex_sort+0xc0/0xc0 [ 2028.489262] ? __do_page_fault+0x180/0xd60 [ 2028.493486] ? copy_mount_string+0x40/0x40 [ 2028.497707] ? memset+0x20/0x40 [ 2028.500972] ? copy_mount_options+0x26f/0x380 [ 2028.505463] ksys_mount+0xcf/0x130 [ 2028.509000] __x64_sys_mount+0xba/0x150 [ 2028.512964] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2028.517534] do_syscall_64+0xf9/0x620 [ 2028.521329] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2028.526512] RIP: 0033:0x7ff1645fc7aa [ 2028.530220] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2028.549114] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2028.556823] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fc7aa [ 2028.564091] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff162f6ffe0 [ 2028.571343] RBP: 00007ff162f70020 R08: 00007ff162f70020 R09: 0000000020000000 [ 2028.578601] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 08:15:42 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c00010008000000000000001c000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2028.585874] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 08:15:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x8dad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000040000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 49) 08:15:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500060000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:42 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000400)=ANY=[], 0x44) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x4c, r2, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x38, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0x6}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8}]}]}, 0x4c}, 0x1, 0xa00000000000000}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r3, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x28, r4, 0x400, 0x0, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x40880}, 0x15) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x90, r4, 0x8, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_DEVKEY={0x34, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x6}, @NL802154_DEVKEY_ATTR_ID={0x20, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x700}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x6}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x1}]}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x74c0}]}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x90}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r2, 0x8, 0x70bd26, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000005c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0xb0, r2, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x20}}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x88}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'geneve1\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_batadv\x00'}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x10}, 0x1) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) r6 = dup(r5) write$UHID_INPUT(r6, &(0x7f0000001040)={0x18, {"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", 0x1000}}, 0x1006) [ 2028.734846] validate_nla: 3 callbacks suppressed [ 2028.734879] netlink: 'syz-executor.2': attribute type 5 has an invalid length. 08:15:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000359000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500070000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2028.835336] FAULT_INJECTION: forcing a failure. [ 2028.835336] name failslab, interval 1, probability 0, space 0, times 0 [ 2028.841537] IPVS: Scheduler module ip_vs_sip not found [ 2028.869939] CPU: 1 PID: 14731 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2028.877846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2028.887191] Call Trace: [ 2028.889777] dump_stack+0x1fc/0x2ef [ 2028.893398] should_fail.cold+0xa/0xf [ 2028.897190] ? setup_fault_attr+0x200/0x200 [ 2028.901610] ? lock_acquire+0x170/0x3c0 [ 2028.905580] __should_failslab+0x115/0x180 [ 2028.909807] should_failslab+0x5/0x10 [ 2028.913712] __kmalloc_track_caller+0x2a6/0x3c0 [ 2028.918372] ? kstrdup_const+0x53/0x80 [ 2028.922250] kstrdup+0x36/0x70 [ 2028.925434] kstrdup_const+0x53/0x80 [ 2028.929135] alloc_vfsmnt+0xb5/0x780 [ 2028.932841] vfs_kern_mount.part.0+0x27/0x470 [ 2028.937325] ? kfree+0x110/0x210 [ 2028.940684] vfs_kern_mount+0x3c/0x60 [ 2028.944476] btrfs_mount+0x23a/0xaa0 [ 2028.948182] ? btrfs_show_options+0xfd0/0xfd0 [ 2028.952665] ? __mutex_unlock_slowpath+0xea/0x610 [ 2028.957498] ? check_preemption_disabled+0x41/0x280 [ 2028.962506] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2028.967514] ? pcpu_alloc+0xc9/0x1190 [ 2028.971326] ? __lockdep_init_map+0x100/0x5a0 [ 2028.975817] mount_fs+0xa3/0x310 [ 2028.979179] vfs_kern_mount.part.0+0x68/0x470 [ 2028.983682] do_mount+0x115c/0x2f50 [ 2028.987304] ? cmp_ex_sort+0xc0/0xc0 [ 2028.991009] ? __do_page_fault+0x180/0xd60 [ 2028.995237] ? copy_mount_string+0x40/0x40 [ 2028.999465] ? memset+0x20/0x40 [ 2029.002824] ? copy_mount_options+0x26f/0x380 [ 2029.007320] ksys_mount+0xcf/0x130 [ 2029.010851] __x64_sys_mount+0xba/0x150 [ 2029.014815] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2029.019387] do_syscall_64+0xf9/0x620 [ 2029.023185] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2029.028366] RIP: 0033:0x7ff1645fc7aa [ 2029.032066] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2029.050953] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2029.058659] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fc7aa [ 2029.065920] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff162f6ffe0 [ 2029.073812] RBP: 00007ff162f70020 R08: 00007ff162f70020 R09: 0000000020000000 08:15:42 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000400)=ANY=[], 0x44) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x4c, r2, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x38, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0x6}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8}]}]}, 0x4c}, 0x1, 0xa00000000000000}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r3, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x28, r4, 0x400, 0x0, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x40880}, 0x15) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x90, r4, 0x8, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_DEVKEY={0x34, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x6}, @NL802154_DEVKEY_ATTR_ID={0x20, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x700}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x6}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x1}]}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x74c0}]}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x90}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r2, 0x8, 0x70bd26, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000005c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0xb0, r2, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x20}}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x88}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'geneve1\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_batadv\x00'}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x10}, 0x1) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) r6 = dup(r5) write$UHID_INPUT(r6, &(0x7f0000001040)={0x18, {"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", 0x1000}}, 0x1006) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) (async) write$P9_RREADLINK(r0, &(0x7f0000000400)=ANY=[], 0x44) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400), 0xffffffffffffffff) (async) sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x4c, r2, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x38, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0x6}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8}]}]}, 0x4c}, 0x1, 0xa00000000000000}, 0x0) (async) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) (async) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r3, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x28, r4, 0x400, 0x0, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x40880}, 0x15) (async) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x90, r4, 0x8, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_DEVKEY={0x34, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x6}, @NL802154_DEVKEY_ATTR_ID={0x20, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x700}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x6}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x1}]}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x74c0}]}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x90}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) (async) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r2, 0x8, 0x70bd26, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) (async) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000005c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0xb0, r2, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x20}}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x88}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'geneve1\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_batadv\x00'}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x10}, 0x1) (async) syz_open_dev$tty1(0xc, 0x4, 0x1) (async) dup(r5) (async) write$UHID_INPUT(r6, &(0x7f0000001040)={0x18, {"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", 0x1000}}, 0x1006) (async) [ 2029.081068] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2029.088343] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 08:15:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x8ead0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:42 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c00010008000000000000002f000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:42 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000000100005e000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2029.207600] IPVS: Scheduler module ip_vs_sip not found 08:15:42 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000400)=ANY=[], 0x44) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x4c, r2, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x38, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0x6}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8}]}]}, 0x4c}, 0x1, 0xa00000000000000}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r3, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x28, r4, 0x400, 0x0, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x40880}, 0x15) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x90, r4, 0x8, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_DEVKEY={0x34, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x6}, @NL802154_DEVKEY_ATTR_ID={0x20, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x700}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x6}, @NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x1}]}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x74c0}]}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x90}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) (async) sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r2, 0x8, 0x70bd26, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) (async) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000005c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0xb0, r2, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x20}}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x88}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'geneve1\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_batadv\x00'}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x10}, 0x1) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) r6 = dup(r5) write$UHID_INPUT(r6, &(0x7f0000001040)={0x18, {"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", 0x1000}}, 0x1006) 08:15:42 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x8fad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500080000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2029.273380] nla_parse: 3 callbacks suppressed [ 2029.273407] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 50) 08:15:42 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000060000500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000068000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2029.368469] IPVS: Scheduler module ip_vs_sip not found 08:15:43 executing program 0: mlock2(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score\x00') mmap$snddsp_status(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8, 0x10, r0, 0x82000000) move_pages(0x0, 0x2, &(0x7f0000000080)=[&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001000/0x3000)=nil], &(0x7f0000000000)=[0x1, 0x1], &(0x7f0000000000), 0x0) 08:15:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x90ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:43 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000008020500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2029.424008] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500090000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000268000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:43 executing program 0: mlock2(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score\x00') mmap$snddsp_status(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8, 0x10, r0, 0x82000000) move_pages(0x0, 0x2, &(0x7f0000000080)=[&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001000/0x3000)=nil], &(0x7f0000000000)=[0x1, 0x1], &(0x7f0000000000), 0x0) mlock2(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score\x00') (async) mmap$snddsp_status(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8, 0x10, r0, 0x82000000) (async) move_pages(0x0, 0x2, &(0x7f0000000080)=[&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001000/0x3000)=nil], &(0x7f0000000000)=[0x1, 0x1], &(0x7f0000000000), 0x0) (async) [ 2029.548665] FAULT_INJECTION: forcing a failure. [ 2029.548665] name failslab, interval 1, probability 0, space 0, times 0 [ 2029.562900] CPU: 1 PID: 14810 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2029.570811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2029.580693] Call Trace: [ 2029.583292] dump_stack+0x1fc/0x2ef [ 2029.586938] should_fail.cold+0xa/0xf [ 2029.590748] ? setup_fault_attr+0x200/0x200 [ 2029.595076] ? lock_acquire+0x170/0x3c0 [ 2029.599170] __should_failslab+0x115/0x180 [ 2029.603405] should_failslab+0x5/0x10 [ 2029.607211] kmem_cache_alloc_trace+0x284/0x380 [ 2029.611898] btrfs_mount_root+0x188/0x1830 [ 2029.616160] ? btrfs_decode_error+0x70/0x70 [ 2029.620494] ? __mutex_unlock_slowpath+0xea/0x610 [ 2029.625349] ? check_preemption_disabled+0x41/0x280 [ 2029.630379] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2029.635403] ? pcpu_alloc+0xc9/0x1190 [ 2029.639215] ? __lockdep_init_map+0x100/0x5a0 [ 2029.643723] mount_fs+0xa3/0x310 [ 2029.647093] vfs_kern_mount.part.0+0x68/0x470 [ 2029.651603] ? kfree+0x110/0x210 [ 2029.655012] vfs_kern_mount+0x3c/0x60 [ 2029.658838] btrfs_mount+0x23a/0xaa0 [ 2029.662569] ? btrfs_show_options+0xfd0/0xfd0 [ 2029.667070] ? __mutex_unlock_slowpath+0xea/0x610 [ 2029.672017] ? check_preemption_disabled+0x41/0x280 [ 2029.677477] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2029.682497] ? pcpu_alloc+0xc9/0x1190 [ 2029.686309] ? __lockdep_init_map+0x100/0x5a0 [ 2029.690805] mount_fs+0xa3/0x310 [ 2029.694164] vfs_kern_mount.part.0+0x68/0x470 [ 2029.698649] do_mount+0x115c/0x2f50 [ 2029.702275] ? cmp_ex_sort+0xc0/0xc0 [ 2029.706027] ? __do_page_fault+0x180/0xd60 [ 2029.710265] ? copy_mount_string+0x40/0x40 [ 2029.714509] ? memset+0x20/0x40 [ 2029.717799] ? copy_mount_options+0x26f/0x380 [ 2029.722295] ksys_mount+0xcf/0x130 [ 2029.725846] __x64_sys_mount+0xba/0x150 [ 2029.729834] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2029.734426] do_syscall_64+0xf9/0x620 [ 2029.738237] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2029.743442] RIP: 0033:0x7ff1645fc7aa 08:15:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x91ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x92ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x93ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2029.747151] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2029.766090] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2029.773983] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fc7aa [ 2029.781260] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff162f6ffe0 [ 2029.788524] RBP: 00007ff162f70020 R08: 00007ff162f70020 R09: 0000000020000000 [ 2029.795785] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2029.803056] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 [ 2029.812346] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 51) 08:15:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x94ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:43 executing program 0: mlock2(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) (async) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='oom_score\x00') mmap$snddsp_status(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8, 0x10, r0, 0x82000000) (async) move_pages(0x0, 0x2, &(0x7f0000000080)=[&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001000/0x3000)=nil], &(0x7f0000000000)=[0x1, 0x1], &(0x7f0000000000), 0x0) 08:15:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500100000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:43 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000008030500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:43 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000272000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:43 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)={0x1d, r1}, 0x10, &(0x7f00000005c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0200000030000000050000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="000000a03f010000bc3aca5c7143e9939bee604f000000000000edb5797af89821d833116d9f5ad6a652a9a20c276b1e0d2e9d5fd5bf0aa9393bf7f1299eacabb38131049d0d63590000"], 0x80}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x568}, {&(0x7f0000000fc0)=""/4096, 0x36c}, {&(0x7f0000000400)=""/106, 0x509}, {&(0x7f0000000740)=""/73, 0x176}, {&(0x7f0000000200)=""/77, 0x62}, {&(0x7f00000007c0)=""/154, 0x410}, {&(0x7f0000000100)=""/22, 0xa}], 0x4, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 08:15:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x95ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2030.013505] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500230000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:43 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000008040500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2030.059310] FAULT_INJECTION: forcing a failure. [ 2030.059310] name failslab, interval 1, probability 0, space 0, times 0 [ 2030.095249] CPU: 1 PID: 14869 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2030.103247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2030.112601] Call Trace: [ 2030.115192] dump_stack+0x1fc/0x2ef [ 2030.118826] should_fail.cold+0xa/0xf [ 2030.122638] ? setup_fault_attr+0x200/0x200 [ 2030.127065] ? lock_acquire+0x170/0x3c0 [ 2030.131053] __should_failslab+0x115/0x180 [ 2030.135292] should_failslab+0x5/0x10 [ 2030.139102] kmem_cache_alloc_trace+0x284/0x380 [ 2030.143793] btrfs_mount_root+0x1e1/0x1830 [ 2030.148049] ? btrfs_decode_error+0x70/0x70 [ 2030.152378] ? __mutex_unlock_slowpath+0xea/0x610 [ 2030.157228] ? check_preemption_disabled+0x41/0x280 [ 2030.162257] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2030.167277] ? pcpu_alloc+0xc9/0x1190 [ 2030.171094] ? __lockdep_init_map+0x100/0x5a0 [ 2030.175595] mount_fs+0xa3/0x310 [ 2030.178974] vfs_kern_mount.part.0+0x68/0x470 [ 2030.183477] ? kfree+0x110/0x210 [ 2030.186848] vfs_kern_mount+0x3c/0x60 [ 2030.190658] btrfs_mount+0x23a/0xaa0 [ 2030.194382] ? btrfs_show_options+0xfd0/0xfd0 [ 2030.198879] ? __mutex_unlock_slowpath+0xea/0x610 [ 2030.203728] ? check_preemption_disabled+0x41/0x280 [ 2030.208781] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2030.213801] ? pcpu_alloc+0xc9/0x1190 [ 2030.217612] ? __lockdep_init_map+0x100/0x5a0 [ 2030.222156] mount_fs+0xa3/0x310 [ 2030.225531] vfs_kern_mount.part.0+0x68/0x470 [ 2030.230037] do_mount+0x115c/0x2f50 [ 2030.233675] ? cmp_ex_sort+0xc0/0xc0 [ 2030.237395] ? __do_page_fault+0x180/0xd60 [ 2030.241634] ? copy_mount_string+0x40/0x40 [ 2030.245322] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2030.245883] ? memset+0x20/0x40 [ 2030.245899] ? copy_mount_options+0x26f/0x380 [ 2030.245916] ksys_mount+0xcf/0x130 [ 2030.265754] __x64_sys_mount+0xba/0x150 [ 2030.269731] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2030.274664] do_syscall_64+0xf9/0x620 [ 2030.278479] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2030.283664] RIP: 0033:0x7ff1645fc7aa [ 2030.287377] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 08:15:43 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x96ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:43 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)={0x1d, r1}, 0x10, &(0x7f00000005c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0200000030000000050000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="000000a03f010000bc3aca5c7143e9939bee604f000000000000edb5797af89821d833116d9f5ad6a652a9a20c276b1e0d2e9d5fd5bf0aa9393bf7f1299eacabb38131049d0d63590000"], 0x80}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x568}, {&(0x7f0000000fc0)=""/4096, 0x36c}, {&(0x7f0000000400)=""/106, 0x509}, {&(0x7f0000000740)=""/73, 0x176}, {&(0x7f0000000200)=""/77, 0x62}, {&(0x7f00000007c0)=""/154, 0x410}, {&(0x7f0000000100)=""/22, 0xa}], 0x4, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) socket$unix(0x1, 0x2, 0x0) (async) bind$unix(r0, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) (async) socket$can_bcm(0x1d, 0x2, 0x2) (async) connect$can_bcm(r2, &(0x7f0000000000), 0x10) (async) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0) (async) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)={0x1d, r1}, 0x10, &(0x7f00000005c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0200000030000000050000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="000000a03f010000bc3aca5c7143e9939bee604f000000000000edb5797af89821d833116d9f5ad6a652a9a20c276b1e0d2e9d5fd5bf0aa9393bf7f1299eacabb38131049d0d63590000"], 0x80}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) (async) socket(0x10, 0x803, 0x0) (async) sendto(r3, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) (async) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x568}, {&(0x7f0000000fc0)=""/4096, 0x36c}, {&(0x7f0000000400)=""/106, 0x509}, {&(0x7f0000000740)=""/73, 0x176}, {&(0x7f0000000200)=""/77, 0x62}, {&(0x7f00000007c0)=""/154, 0x410}, {&(0x7f0000000100)=""/22, 0xa}], 0x4, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (async) [ 2030.306278] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2030.313988] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fc7aa [ 2030.321264] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff162f6ffe0 [ 2030.328534] RBP: 00007ff162f70020 R08: 00007ff162f70020 R09: 0000000020000000 [ 2030.335801] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2030.343067] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 08:15:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 52) 08:15:44 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000008050500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:44 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000274000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x97ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500480000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:44 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000177000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2030.533741] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2030.578955] FAULT_INJECTION: forcing a failure. [ 2030.578955] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2030.590780] CPU: 1 PID: 14926 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2030.598679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2030.608032] Call Trace: [ 2030.610625] dump_stack+0x1fc/0x2ef [ 2030.614270] should_fail.cold+0xa/0xf [ 2030.618083] ? setup_fault_attr+0x200/0x200 [ 2030.622418] ? kernel_text_address+0xbd/0xf0 [ 2030.626836] ? __kernel_text_address+0x9/0x30 [ 2030.631343] __alloc_pages_nodemask+0x239/0x2890 [ 2030.636123] ? __lock_acquire+0x6de/0x3ff0 [ 2030.640807] ? vfs_kern_mount.part.0+0x68/0x470 [ 2030.645499] ? vfs_kern_mount+0x3c/0x60 [ 2030.649476] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2030.654314] ? do_mount+0x115c/0x2f50 [ 2030.658105] ? ksys_mount+0xcf/0x130 [ 2030.661814] ? __x64_sys_mount+0xba/0x150 [ 2030.665952] ? do_syscall_64+0xf9/0x620 [ 2030.669941] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2030.675312] ? cache_alloc_refill+0x2f8/0x340 [ 2030.679803] ? lock_downgrade+0x720/0x720 [ 2030.683939] ? do_raw_spin_lock+0xcb/0x220 [ 2030.688168] cache_grow_begin+0xa4/0x8a0 [ 2030.692229] ? setup_fault_attr+0x200/0x200 [ 2030.696540] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 2030.701285] cache_alloc_refill+0x273/0x340 [ 2030.705602] kmem_cache_alloc_trace+0x354/0x380 [ 2030.710265] btrfs_mount_root+0x188/0x1830 [ 2030.714494] ? btrfs_decode_error+0x70/0x70 [ 2030.718823] ? __mutex_unlock_slowpath+0xea/0x610 [ 2030.723660] ? check_preemption_disabled+0x41/0x280 [ 2030.728676] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2030.733679] ? pcpu_alloc+0xc9/0x1190 [ 2030.737472] ? __lockdep_init_map+0x100/0x5a0 [ 2030.741959] mount_fs+0xa3/0x310 [ 2030.745320] vfs_kern_mount.part.0+0x68/0x470 [ 2030.749804] ? kfree+0x110/0x210 [ 2030.753161] vfs_kern_mount+0x3c/0x60 [ 2030.756952] btrfs_mount+0x23a/0xaa0 [ 2030.760659] ? btrfs_show_options+0xfd0/0xfd0 [ 2030.765155] ? __mutex_unlock_slowpath+0xea/0x610 [ 2030.769988] ? check_preemption_disabled+0x41/0x280 [ 2030.774999] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2030.780002] ? pcpu_alloc+0xc9/0x1190 [ 2030.783791] ? __lockdep_init_map+0x100/0x5a0 [ 2030.788291] mount_fs+0xa3/0x310 [ 2030.791664] vfs_kern_mount.part.0+0x68/0x470 [ 2030.796240] do_mount+0x115c/0x2f50 [ 2030.799858] ? cmp_ex_sort+0xc0/0xc0 [ 2030.803561] ? __do_page_fault+0x180/0xd60 [ 2030.807802] ? copy_mount_string+0x40/0x40 [ 2030.812039] ? memset+0x20/0x40 [ 2030.815312] ? copy_mount_options+0x26f/0x380 [ 2030.819816] ksys_mount+0xcf/0x130 [ 2030.823376] __x64_sys_mount+0xba/0x150 [ 2030.827355] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2030.831931] do_syscall_64+0xf9/0x620 [ 2030.835744] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2030.840922] RIP: 0033:0x7ff1645fc7aa [ 2030.844628] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2030.863536] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2030.871262] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fc7aa 08:15:44 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000008060500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2030.878521] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff162f6ffe0 [ 2030.885863] RBP: 00007ff162f70020 R08: 00007ff162f70020 R09: 0000000020000000 [ 2030.893121] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2030.900378] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 08:15:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x98ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:44 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000008070500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:44 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r2, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)={0x1d, r1}, 0x10, &(0x7f00000005c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0200000030000000050000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="000000a03f010000bc3aca5c7143e9939bee604f000000000000edb5797af89821d833116d9f5ad6a652a9a20c276b1e0d2e9d5fd5bf0aa9393bf7f1299eacabb38131049d0d63590000"], 0x80}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x568}, {&(0x7f0000000fc0)=""/4096, 0x36c}, {&(0x7f0000000400)=""/106, 0x509}, {&(0x7f0000000740)=""/73, 0x176}, {&(0x7f0000000200)=""/77, 0x62}, {&(0x7f00000007c0)=""/154, 0x410}, {&(0x7f0000000100)=""/22, 0xa}], 0x4, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) socket$unix(0x1, 0x2, 0x0) (async) bind$unix(r0, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) (async) socket$can_bcm(0x1d, 0x2, 0x2) (async) connect$can_bcm(r2, &(0x7f0000000000), 0x10) (async) sendmsg$can_bcm(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, 0x0, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0, 0x20000600}}, 0x0) (async) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000001c0)={0x1d, r1}, 0x10, &(0x7f00000005c0)={&(0x7f00000006c0)=ANY=[@ANYBLOB="0200000030000000050000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="000000a03f010000bc3aca5c7143e9939bee604f000000000000edb5797af89821d833116d9f5ad6a652a9a20c276b1e0d2e9d5fd5bf0aa9393bf7f1299eacabb38131049d0d63590000"], 0x80}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) (async) socket(0x10, 0x803, 0x0) (async) sendto(r3, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) (async) recvmmsg(r3, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f0000000140)=""/85, 0x568}, {&(0x7f0000000fc0)=""/4096, 0x36c}, {&(0x7f0000000400)=""/106, 0x509}, {&(0x7f0000000740)=""/73, 0x176}, {&(0x7f0000000200)=""/77, 0x62}, {&(0x7f00000007c0)=""/154, 0x410}, {&(0x7f0000000100)=""/22, 0xa}], 0x4, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) (async) 08:15:44 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000178000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 53) 08:15:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85004c0000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2031.042129] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:44 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000008080500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2031.177850] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x99ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500680000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2031.274787] FAULT_INJECTION: forcing a failure. [ 2031.274787] name failslab, interval 1, probability 0, space 0, times 0 [ 2031.299796] CPU: 0 PID: 14960 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2031.307698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2031.317054] Call Trace: [ 2031.319649] dump_stack+0x1fc/0x2ef [ 2031.323286] should_fail.cold+0xa/0xf [ 2031.327104] ? setup_fault_attr+0x200/0x200 [ 2031.331439] ? lock_acquire+0x170/0x3c0 [ 2031.335445] __should_failslab+0x115/0x180 [ 2031.339682] should_failslab+0x5/0x10 [ 2031.343484] __kmalloc_track_caller+0x2a6/0x3c0 [ 2031.348155] ? btrfs_mount_root+0x364/0x1830 [ 2031.352577] kstrdup+0x36/0x70 [ 2031.355796] btrfs_mount_root+0x364/0x1830 [ 2031.360045] ? btrfs_decode_error+0x70/0x70 [ 2031.364373] ? __mutex_unlock_slowpath+0xea/0x610 [ 2031.369311] ? check_preemption_disabled+0x41/0x280 [ 2031.374361] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2031.379384] ? pcpu_alloc+0xc9/0x1190 [ 2031.383277] ? __lockdep_init_map+0x100/0x5a0 [ 2031.387780] mount_fs+0xa3/0x310 [ 2031.391154] vfs_kern_mount.part.0+0x68/0x470 [ 2031.395742] ? kfree+0x110/0x210 [ 2031.399119] vfs_kern_mount+0x3c/0x60 [ 2031.402927] btrfs_mount+0x23a/0xaa0 [ 2031.406651] ? btrfs_show_options+0xfd0/0xfd0 [ 2031.411153] ? __mutex_unlock_slowpath+0xea/0x610 [ 2031.415440] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2031.416024] ? check_preemption_disabled+0x41/0x280 [ 2031.429635] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2031.434659] ? pcpu_alloc+0xc9/0x1190 [ 2031.438463] ? __lockdep_init_map+0x100/0x5a0 [ 2031.442972] mount_fs+0xa3/0x310 [ 2031.446352] vfs_kern_mount.part.0+0x68/0x470 [ 2031.450856] do_mount+0x115c/0x2f50 [ 2031.454494] ? cmp_ex_sort+0xc0/0xc0 [ 2031.458212] ? __do_page_fault+0x180/0xd60 [ 2031.462453] ? copy_mount_string+0x40/0x40 [ 2031.466787] ? memset+0x20/0x40 [ 2031.470069] ? copy_mount_options+0x26f/0x380 [ 2031.474569] ksys_mount+0xcf/0x130 [ 2031.478202] __x64_sys_mount+0xba/0x150 [ 2031.482181] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2031.486855] do_syscall_64+0xf9/0x620 [ 2031.490676] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2031.495868] RIP: 0033:0x7ff1645fc7aa [ 2031.499584] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2031.518483] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 08:15:45 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000283000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x9aad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:45 executing program 0: r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000001980)={{0x7f, 0x45, 0x4c, 0x46, 0x81, 0x4, 0x0, 0x8, 0x5, 0x3, 0x0, 0x56, 0x27e, 0x40, 0x82, 0x7fff, 0x0, 0x38, 0x1, 0x5, 0xea}, [{0x60000000, 0x3, 0x1f, 0x0, 0xff, 0x0, 0x0, 0x2}], "05eac7684f29cd8f859afd2b5494e697ba499a1ab0ef7464b6c6a09ef0888d1b228b7de7eb11a0571faedcb9f668e23c85980f7192f474f10d5e8f1188813c4d91c91d9c6617efcda37c858be9c524715e46fb0ddbdf79379482975ef49436a85b7fdd3283abc914b0bcded83042fabb4468ec7de8b197fcfbe256eac2089ba6b66f85a05296942a546033bbd842e4f7a112765fa772ecdf662a3ddd0a9b4e494c48680a250ab98984d4c41896868c64993a921f750f6c5a8f06ff320ad6fdc56a706b18864e1838bc4daa5c8c36e8898b9297d3be4e70b5f605a73acdd2ba9c398254232973387c73f2047427482d9fcefda965d82c1236d25e2030cecf6128a98da4b91acc0c5533b6eff40281da8bd7e0e959607c8b08715e7bbfbea4173cb078c5c226b02774af65775dcb7747cbbece4f597d68938e748b97f08588036bd6ac8120d468d7571c3c158db0c8e6badf21cf81f712924f1c7fa4d29a7327d7c42c52969f43853f0acc852b1e9362804745e7f9b341c11af6d8ab931e3eee8e38a9c232dec8b19f36b5ad2961827e738c4f3df24053d31c378f10c312a6f3e05917bdaca9d92a24b1bc5841c2b1a6e1a2ffcb4bf40e11146cbcde8f389aeafdc43e18d21f66902b88c28271a54231bd26e90b7424997494fff257f8a46a219effed88ef666fb564db5e6eac386127e2030aa526497ed282da472b588ed10a7f660f7e61599394655808cca407f7ac21a4bf8405fb39849d296191d5c21e850b17b5ccb9133197cc917696a02c4ee7c9a3db7cd9f477a2dd6069a7a4443ca058d47e140c4cf8fff485182ed889e89448a17f8317a2a26a7e12c7028609c858eca5a68a1fabc5a118ea1aaaf967800ae1215f47038513a83b05aa6a76b4acaf850bc52cd30a5398e0c9d292a2fb017b7326471a552653b9bffec6c736ab9dcf103da9eba40a30217799bc1afa89371852265425988c2311bea6491b4cd5f85a016180324ff6be23c1d04a950fd133552f66b0bb0183b7638b0edeac457941e9e72dac8a5d0bb8c3c9f532ad2f3b8862c2b0764c2f62534e1b8e193c794886aa732a6b14cb31030757569e60c2de1b36a4b9f82ff471c5ed236b573ad67b04bd169110d80b53147241ead4be1e0baaa7109daf888b0884e68ed238b16372e6eb204bf8ffa64d2cf316cf65decfed72dc6e557de3ec385f2fd252a548fda7eb113dd646399de4aef79d3402bb0408e45330cd8effeb9b36ce137665d9699d7ebdba59e7216eb3ad8858a17d0836edfb776d535b1eaa3b9ee20d6c61c2172bfe6c5120a768efbefdaad5fb135477fe9257af310d2be3b69c803ef73e8fb56db10edd7f78ebc5dc11621b8a2c7539e03879a1464879e690b7d9199a7cdeb34ec0c18ed929e39aca35569a41bb080ec8f7b475376b9ecbb1dfd5fb5906f6c0d62f68bcda6e23f6098c7800d8e75afe2aef684d73f6b709da43177414342e995cc919fae2d2cb4f5a01f175e5edc8df19acc2e3009d84fca4c8a9713342cd62892c48a7fe259feffabde9c2ec41e5e9c599c8ee2bf11e48241faece5efabe6ca1f7f1437ed3df3c80ccc487da1f4a50f4530cb5fd5b4b35d7684c20fec5d77d228def6be59947131c32035f8a0d0506b785486196d6c015e5568ae8c149214c728d534ceb67676ba23b9267259b394c00bf470ed1a3bf0a91287cbd9dfe9a5d3f577ffd55bb2cd6a858b46a59a237f7367892303cc67b70d8854d68c5f5a229e590bd8566731b843a2998a2eb2c1fd9b4c934e8d6f47f09ed83f5546008f1b4ac9807f21f2310a8fbd3576eb774007ff7ee818f11ff06af1a1a4b1e4af3342ff784f0c9cda545adc8fd04e8bea944ffccb2f97fab9ed44f06bd8dff54923241210294f08f8afa90b568919ea4e17109eaebeff91d4b55014349d978db29ba2e70700df35940bd504b2c77046cbfbc9c87d79baa3badc750026df02fde15f6c554b26a9ec5d5669e4949aa37f5bce4e328ca9e8c1a6e25509803c0d5983b7177eca2a59459957d0d42d96c5a4ea0180ebf4efca9cacf54a0cbd10ee50d6e98e13711fd1e540b41a3b988c5b0bf5902a24293884c8b54a7c80d766c2bcf330bd575f333ec175e342f1e60deefe5ce2b90245dfd11e0851d57221c360403ae444ad8211b54903ee33d079859f168b47ff046034739ff4b06c7457b124ead46296e3005cb0008fcc5e3c17c36d64bbf2d146870263712478bd665a1169f649d5d92c08d40d2a98e399e845c57cebb5ca1fa38d578cc5c2e56ac708a63eba49ba1473853a8c96741415f8ebb4ab25f3528e51dd9bd80ea1049979363a08b399b581966a0d27e7d07fc2251f4e3d61da6f50f7217956a3b4ad20b66f2badd79c21e6d1070719db2b95e200d81c5ad177e243611b590d18578dda12df0a7ca540c0db906b0927a7ca90bd46d8f58e90557be8d3444c7fb7aa040180c05a9c47697d7252f31fe6de6d267c3fb10d6f638d539c25bbe55c9c3d8731986a849a038071b9e1e78aae97847f1c092b5845b9f3dfa440a2030edf84f4974668355f7ef0212bf47c5019cf52c21af1ffae66bf0e53d60e6c33607c7846c9d690ee5fccbeee813a526f58daa2ecbc5fffe4401cc8476125cf47617c62898272279b1b8d6ac104d9240c897ef6cd7517fc7f91b5fa51a9836b9e2b9c96ef05b7ad9da94a593651f6a0ea38a2630be1194984b5f357e9a24cc60207e1d515603dfdef437694fe81612070725f536db8874f8915ebeebcb0959ff6a8fe808bba169e7f9a1d6d2ac95a61ea9ea1143c829cea4f5148911a99491a25bce2744fa0e425dbf37fefb1d133f9fe28cd1e13e8a61b63d9f805a7affefcebe18dc0b2300c7bbe66f31a94d26650052ae5e40e5b6f2f30298405116daed1a2274b8cde8bc91a19b91ca381e3256083e84f839f302fd2b341450f1a45453d0128cf09cf42f268b25b69ffbbbb35419b04d65fcb38afe47fecbcaf77e0d70a337d612c886eee2360248b010ce4f3377490655aa669fbf7b6a196c569d5751d979c7e2f5331ccd9215a66189144b9d01baebb68e51b1d8b0af2553d3a8cd909045b5d1b20624b3ab38b0fc92105bb20c32c90d56efda6036adaf940a4a21ec8ad363534be24b12d8e336f95f33045d01c9d1d02a67495cb39958d6feb7ca6e649f93fb5bda5c8c6e302eafe22b0f356420d8d524664c032534dcdef40b8f2ad5091ed7a3eca57d1b93b6619fc78b70616b71d23a2b31818d69fded56e05edcf6d1d8273ce213a699be57a44d0a1d8a7f949e1ec4a1554cea8aa0e888c553761d03b8243951ff08a7f0abab2717d486513df85f5860ef3ffd825e8bd9be1671a9e27425d9153a3348e736d3e5969c861a8cb01e048818a46692a285aa55d86f636541569e1ecc2214725a1b7f16e51d52766ff304a55316b3fd058c9fe9fa0fd409816f222cbbc0bead7a133be64df3861df0e49d780622f7ad043473a46d4f2824f9f2a57e115411ef835ca558dd61b421c3cf2a9c62120cf343db14f769bd40bb923fc186e12236473feb3c1e21d812eec6c4ba6d6ff5d8cd65ac4906f76f56e23e2a2b27462bf75d9d2cc60a1d9731fafe54b22b619e0e7a52a12da9218bdaf154798ddb95187a2e40cf9aeb877d85e0e31bf065b0b79cae48694de29cbfe64dbce318d3e4b30c22889c069b05f359aad49a63c3b2b645467105262706a2456a1904825827ab256cb307d8ff2316c45841b50b90082d36e02888e9c083b7a88e457d06c01ab940f75cdba4ddabe0aee85d7a49a11cf85729c34bbfd469b52fde670be833cbdf3b699d0147533d14c0216e7d22ad2a02bf897772924957f02a5c30b86a8c5a3c253f5d1402c2d7e5982f79a358443d8dbf2b5bdaf9fca9b6db7c04b803476af428b355ccef60956a782b712191735f92d15c9a139309aeb11ec7c079cade201a2d88c9f7bda5b904a220ef951906877dd8a6f2a876e7f7a86b954e4a37fe3e39824474b2d431072254abc27fe1d63849b2d3053f86655aeb1d19dc3ef54df21fe7ca5d2a945d1800dfbf23e04a64d60ae8e8007ca795c5dafc778178860940ce4afca811cdb297680eb63d5430b3dab414235a0ae836db19e89c7f7d971e36a2eb8d857593064b034c47ad0a1f5c0d0443e0e0e4a1f854c9e4670d96cb48a9c3e802d5ea62935bbbf3283dbf6bd773c8619af476bf5dc5e6f7344748935de172eaf65c5d082fcf717dda7a34418331c1cec8c5086adb323b4ada8517c2246752001946dbf1df19fb2c4a6f095e565d1df22e3ff5b5ea706973fa9a944d4c341d3f4c70d6f9e1fd35ce0eac5ef1d10118c831bd3d9b2af5e2289b1294132b5a996c5c0398005449abca2e6579e69a114b2dc52089a93def47dee7eb8305c3f86f90f2bf415da83e6cd9e3dd96ab6542cbec4d77a7318bcd6ee21ee94e08908fcd688615c687c52df7d5fbcc34a4e8a74f499c9dd6bbee3d7259632fca2fc6cc55e255f2f5f56fb361faccb770e348d6d35033f6d2572fc53151092bc5dd030f1927cc7ce680a6ebad73b901705a7effef0a5908fc126936a0250d2cbf189383983514a2cd75e273893e38e953d89c8a1753127e461d8ce67800c25881f55b3d71b82ba36ae516bce023a754ceb8de1dbf7bc36506af5a9449d99356583d293599878f2f8648f2ff308be278bd42784ff3a6b7be022050d12891ffc716ea4c0d27582546c0ff73108e11a13f6bd950b81ac4c836fd94aa0a2527cee768c0518f39fe839110ea3fa868724f087cf76455cacb2b05534b0c595c349a5ca875cc807053b644354cea906f8ed2b30355900d67745a2e8cae7e6d998d24450433e3222a94be4e7208c211911d1be210a1680f7e28e794795a505ad07bd60aadbdd667be9ead5e8b30702fa5f174ea7529b40df7022749247c4681e825f531887a9b4d49ebb36ad6aea9d1445662615d73f34898bb901f8a0351fc5c25beb681720f3e76a5d887114c699033bfadcc77dd02608152980f44633adfa048313e201762a205c151aec89a0a1587711753c230b0f296337c06eee30dd9f665d32b0b1a23eb39e90315c731efc24f030c3308991b0ddcef1d2eb19b31af5a6896b9029041a3b9330ba328dcaea5377097d845be1e6e81673e7846fb5ba91b620de356c92b8295163b02fe344841286be1f84e7976e448a211f3e06041cdb80ba167c62faf297ac478f22fe0f72a37c7f29d2c9e442e4fefb548f8b0f709ef79099fe7d49ad7a070e829f12199bd34b4596db612ffa1540b15548f17fede12c3dbc3f206b982757d17edd0e9a93d57e4f22ad67022ea97e5888925c4eb1c2ba8862d91233f482aedae8514f9b7b3f628dc2e9aca48e28faa9cabdf40129ae13cea72aa7bed1b874dce7f8feb4fe753594aa1989f1651ad5fc94dc031d1ab3b949ed76c56b34928abd5497cd15796182f4f2603a8a53b3e4b674933531868c2115b8e2964d78dc607938814c75712d302bc6572e0ad001f7c9811538270f87fcbc6ef156ff3b7f61197c5c039fa8b34fedaca26ce181f284dd53e224f0671d32833f7e39a879e3c6ee9d1f35370cfde5a4b0d4117e8caee42fb7587d9eb1c5106af5a5e7e2d7e2dd280c5323858607c3f8186974c2964a2cb763b74fe7bf5f2ce1102e3829270f50b4f4ba07aa76d6de577de18821420f6d0aca49c4f5642cb7b2af65db9934c7f5534fb92e8d67d39468a96cef933bd71128128e06553882fcd3389eb703206813d0827db4f70b88c562660", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x1a78) syz_emit_ethernet(0xc0e, &(0x7f0000000d40)={@broadcast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0xbd8, 0x3a, 0xff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x1f, 0xb, "a78c000005dc790853d5dea6b259b8e3cd2c8038336823493b87aa0568f00b1c71a8242373243ed2439adc07df0a69748e254c1e4a8a8b3f0ab0c430397754db3e340a14a2a1328c5f93037dc1435c11b3000000008419af736b41e5a8"}, {0x0, 0x16, "84f0da52ef24571313968050378ee824f4dffba7feed320557f7671975afc9c545c5ea6137c8ce680ba2d2e8794cc0ee661ab31313a50f67f637326bdc20eee126a2c281295ae9405b24d13dc48b7b6aa26e8a94498418f381922377d30a3b5ed2c6a2990e5ea6b275c1d5bddf59f3d1843df268e8c825c6b2cff208dfb5cd8283d0dcd52a6de228bf697d3d6506afec30ef7e07413c7afc1eb139e0fb1a5a643b4099519e31f3fd4457f0e6d586ad05e1000000"}, {0x0, 0x84, "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"}, {0x0, 0x1, "b20360609ee68487"}, {0x0, 0x9, "c139276371aea9b7cdbd32b0a978030a03d23d9fca26dd1213e1010898b256e481da1018059f850b91347107a9dd38da31c1a16267a090b62089ee0d776d581b1bd756ff9010"}, {0x0, 0xc7, "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"}]}}}}}}, 0x0) syz_emit_ethernet(0x92, &(0x7f0000000000)={@remote, @random="298c2b8ec8c5", @void, {@llc={0x4, {@snap={0xab, 0x0, ',a', "e0c192", 0x809b, "270c0038004bafb0bd2d86be3da2acc4db967c82ee1d6be914cb929a889927e81062d5e3e22b2eb6fd9e3f647e918f06645bac7a604fdb284d0f8962b253ce0b9b9168a6c5d2380393bf9fce4a9ee9681b80be1651e128efb4460dac937c645a4561df000739bacad376bf76d7e599ce6ca0013c880c3ab09056cd"}}}}}, &(0x7f00000000c0)={0x0, 0x3, [0x884, 0x4ac, 0x4dd, 0xce]}) [ 2031.526200] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fc7aa [ 2031.533472] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff162f6ffe0 [ 2031.540745] RBP: 00007ff162f70020 R08: 00007ff162f70020 R09: 0000000020000000 [ 2031.548014] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2031.555286] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 08:15:45 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000008090500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85006c0000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:45 executing program 0: r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000001980)={{0x7f, 0x45, 0x4c, 0x46, 0x81, 0x4, 0x0, 0x8, 0x5, 0x3, 0x0, 0x56, 0x27e, 0x40, 0x82, 0x7fff, 0x0, 0x38, 0x1, 0x5, 0xea}, [{0x60000000, 0x3, 0x1f, 0x0, 0xff, 0x0, 0x0, 0x2}], "05eac7684f29cd8f859afd2b5494e697ba499a1ab0ef7464b6c6a09ef0888d1b228b7de7eb11a0571faedcb9f668e23c85980f7192f474f10d5e8f1188813c4d91c91d9c6617efcda37c858be9c524715e46fb0ddbdf79379482975ef49436a85b7fdd3283abc914b0bcded83042fabb4468ec7de8b197fcfbe256eac2089ba6b66f85a05296942a546033bbd842e4f7a112765fa772ecdf662a3ddd0a9b4e494c48680a250ab98984d4c41896868c64993a921f750f6c5a8f06ff320ad6fdc56a706b18864e1838bc4daa5c8c36e8898b9297d3be4e70b5f605a73acdd2ba9c398254232973387c73f2047427482d9fcefda965d82c1236d25e2030cecf6128a98da4b91acc0c5533b6eff40281da8bd7e0e959607c8b08715e7bbfbea4173cb078c5c226b02774af65775dcb7747cbbece4f597d68938e748b97f08588036bd6ac8120d468d7571c3c158db0c8e6badf21cf81f712924f1c7fa4d29a7327d7c42c52969f43853f0acc852b1e9362804745e7f9b341c11af6d8ab931e3eee8e38a9c232dec8b19f36b5ad2961827e738c4f3df24053d31c378f10c312a6f3e05917bdaca9d92a24b1bc5841c2b1a6e1a2ffcb4bf40e11146cbcde8f389aeafdc43e18d21f66902b88c28271a54231bd26e90b7424997494fff257f8a46a219effed88ef666fb564db5e6eac386127e2030aa526497ed282da472b588ed10a7f660f7e61599394655808cca407f7ac21a4bf8405fb39849d296191d5c21e850b17b5ccb9133197cc917696a02c4ee7c9a3db7cd9f477a2dd6069a7a4443ca058d47e140c4cf8fff485182ed889e89448a17f8317a2a26a7e12c7028609c858eca5a68a1fabc5a118ea1aaaf967800ae1215f47038513a83b05aa6a76b4acaf850bc52cd30a5398e0c9d292a2fb017b7326471a552653b9bffec6c736ab9dcf103da9eba40a30217799bc1afa89371852265425988c2311bea6491b4cd5f85a016180324ff6be23c1d04a950fd133552f66b0bb0183b7638b0edeac457941e9e72dac8a5d0bb8c3c9f532ad2f3b8862c2b0764c2f62534e1b8e193c794886aa732a6b14cb31030757569e60c2de1b36a4b9f82ff471c5ed236b573ad67b04bd169110d80b53147241ead4be1e0baaa7109daf888b0884e68ed238b16372e6eb204bf8ffa64d2cf316cf65decfed72dc6e557de3ec385f2fd252a548fda7eb113dd646399de4aef79d3402bb0408e45330cd8effeb9b36ce137665d9699d7ebdba59e7216eb3ad8858a17d0836edfb776d535b1eaa3b9ee20d6c61c2172bfe6c5120a768efbefdaad5fb135477fe9257af310d2be3b69c803ef73e8fb56db10edd7f78ebc5dc11621b8a2c7539e03879a1464879e690b7d9199a7cdeb34ec0c18ed929e39aca35569a41bb080ec8f7b475376b9ecbb1dfd5fb5906f6c0d62f68bcda6e23f6098c7800d8e75afe2aef684d73f6b709da43177414342e995cc919fae2d2cb4f5a01f175e5edc8df19acc2e3009d84fca4c8a9713342cd62892c48a7fe259feffabde9c2ec41e5e9c599c8ee2bf11e48241faece5efabe6ca1f7f1437ed3df3c80ccc487da1f4a50f4530cb5fd5b4b35d7684c20fec5d77d228def6be59947131c32035f8a0d0506b785486196d6c015e5568ae8c149214c728d534ceb67676ba23b9267259b394c00bf470ed1a3bf0a91287cbd9dfe9a5d3f577ffd55bb2cd6a858b46a59a237f7367892303cc67b70d8854d68c5f5a229e590bd8566731b843a2998a2eb2c1fd9b4c934e8d6f47f09ed83f5546008f1b4ac9807f21f2310a8fbd3576eb774007ff7ee818f11ff06af1a1a4b1e4af3342ff784f0c9cda545adc8fd04e8bea944ffccb2f97fab9ed44f06bd8dff54923241210294f08f8afa90b568919ea4e17109eaebeff91d4b55014349d978db29ba2e70700df35940bd504b2c77046cbfbc9c87d79baa3badc750026df02fde15f6c554b26a9ec5d5669e4949aa37f5bce4e328ca9e8c1a6e25509803c0d5983b7177eca2a59459957d0d42d96c5a4ea0180ebf4efca9cacf54a0cbd10ee50d6e98e13711fd1e540b41a3b988c5b0bf5902a24293884c8b54a7c80d766c2bcf330bd575f333ec175e342f1e60deefe5ce2b90245dfd11e0851d57221c360403ae444ad8211b54903ee33d079859f168b47ff046034739ff4b06c7457b124ead46296e3005cb0008fcc5e3c17c36d64bbf2d146870263712478bd665a1169f649d5d92c08d40d2a98e399e845c57cebb5ca1fa38d578cc5c2e56ac708a63eba49ba1473853a8c96741415f8ebb4ab25f3528e51dd9bd80ea1049979363a08b399b581966a0d27e7d07fc2251f4e3d61da6f50f7217956a3b4ad20b66f2badd79c21e6d1070719db2b95e200d81c5ad177e243611b590d18578dda12df0a7ca540c0db906b0927a7ca90bd46d8f58e90557be8d3444c7fb7aa040180c05a9c47697d7252f31fe6de6d267c3fb10d6f638d539c25bbe55c9c3d8731986a849a038071b9e1e78aae97847f1c092b5845b9f3dfa440a2030edf84f4974668355f7ef0212bf47c5019cf52c21af1ffae66bf0e53d60e6c33607c7846c9d690ee5fccbeee813a526f58daa2ecbc5fffe4401cc8476125cf47617c62898272279b1b8d6ac104d9240c897ef6cd7517fc7f91b5fa51a9836b9e2b9c96ef05b7ad9da94a593651f6a0ea38a2630be1194984b5f357e9a24cc60207e1d515603dfdef437694fe81612070725f536db8874f8915ebeebcb0959ff6a8fe808bba169e7f9a1d6d2ac95a61ea9ea1143c829cea4f5148911a99491a25bce2744fa0e425dbf37fefb1d133f9fe28cd1e13e8a61b63d9f805a7affefcebe18dc0b2300c7bbe66f31a94d26650052ae5e40e5b6f2f30298405116daed1a2274b8cde8bc91a19b91ca381e3256083e84f839f302fd2b341450f1a45453d0128cf09cf42f268b25b69ffbbbb35419b04d65fcb38afe47fecbcaf77e0d70a337d612c886eee2360248b010ce4f3377490655aa669fbf7b6a196c569d5751d979c7e2f5331ccd9215a66189144b9d01baebb68e51b1d8b0af2553d3a8cd909045b5d1b20624b3ab38b0fc92105bb20c32c90d56efda6036adaf940a4a21ec8ad363534be24b12d8e336f95f33045d01c9d1d02a67495cb39958d6feb7ca6e649f93fb5bda5c8c6e302eafe22b0f356420d8d524664c032534dcdef40b8f2ad5091ed7a3eca57d1b93b6619fc78b70616b71d23a2b31818d69fded56e05edcf6d1d8273ce213a699be57a44d0a1d8a7f949e1ec4a1554cea8aa0e888c553761d03b8243951ff08a7f0abab2717d486513df85f5860ef3ffd825e8bd9be1671a9e27425d9153a3348e736d3e5969c861a8cb01e048818a46692a285aa55d86f636541569e1ecc2214725a1b7f16e51d52766ff304a55316b3fd058c9fe9fa0fd409816f222cbbc0bead7a133be64df3861df0e49d780622f7ad043473a46d4f2824f9f2a57e115411ef835ca558dd61b421c3cf2a9c62120cf343db14f769bd40bb923fc186e12236473feb3c1e21d812eec6c4ba6d6ff5d8cd65ac4906f76f56e23e2a2b27462bf75d9d2cc60a1d9731fafe54b22b619e0e7a52a12da9218bdaf154798ddb95187a2e40cf9aeb877d85e0e31bf065b0b79cae48694de29cbfe64dbce318d3e4b30c22889c069b05f359aad49a63c3b2b645467105262706a2456a1904825827ab256cb307d8ff2316c45841b50b90082d36e02888e9c083b7a88e457d06c01ab940f75cdba4ddabe0aee85d7a49a11cf85729c34bbfd469b52fde670be833cbdf3b699d0147533d14c0216e7d22ad2a02bf897772924957f02a5c30b86a8c5a3c253f5d1402c2d7e5982f79a358443d8dbf2b5bdaf9fca9b6db7c04b803476af428b355ccef60956a782b712191735f92d15c9a139309aeb11ec7c079cade201a2d88c9f7bda5b904a220ef951906877dd8a6f2a876e7f7a86b954e4a37fe3e39824474b2d431072254abc27fe1d63849b2d3053f86655aeb1d19dc3ef54df21fe7ca5d2a945d1800dfbf23e04a64d60ae8e8007ca795c5dafc778178860940ce4afca811cdb297680eb63d5430b3dab414235a0ae836db19e89c7f7d971e36a2eb8d857593064b034c47ad0a1f5c0d0443e0e0e4a1f854c9e4670d96cb48a9c3e802d5ea62935bbbf3283dbf6bd773c8619af476bf5dc5e6f7344748935de172eaf65c5d082fcf717dda7a34418331c1cec8c5086adb323b4ada8517c2246752001946dbf1df19fb2c4a6f095e565d1df22e3ff5b5ea706973fa9a944d4c341d3f4c70d6f9e1fd35ce0eac5ef1d10118c831bd3d9b2af5e2289b1294132b5a996c5c0398005449abca2e6579e69a114b2dc52089a93def47dee7eb8305c3f86f90f2bf415da83e6cd9e3dd96ab6542cbec4d77a7318bcd6ee21ee94e08908fcd688615c687c52df7d5fbcc34a4e8a74f499c9dd6bbee3d7259632fca2fc6cc55e255f2f5f56fb361faccb770e348d6d35033f6d2572fc53151092bc5dd030f1927cc7ce680a6ebad73b901705a7effef0a5908fc126936a0250d2cbf189383983514a2cd75e273893e38e953d89c8a1753127e461d8ce67800c25881f55b3d71b82ba36ae516bce023a754ceb8de1dbf7bc36506af5a9449d99356583d293599878f2f8648f2ff308be278bd42784ff3a6b7be022050d12891ffc716ea4c0d27582546c0ff73108e11a13f6bd950b81ac4c836fd94aa0a2527cee768c0518f39fe839110ea3fa868724f087cf76455cacb2b05534b0c595c349a5ca875cc807053b644354cea906f8ed2b30355900d67745a2e8cae7e6d998d24450433e3222a94be4e7208c211911d1be210a1680f7e28e794795a505ad07bd60aadbdd667be9ead5e8b30702fa5f174ea7529b40df7022749247c4681e825f531887a9b4d49ebb36ad6aea9d1445662615d73f34898bb901f8a0351fc5c25beb681720f3e76a5d887114c699033bfadcc77dd02608152980f44633adfa048313e201762a205c151aec89a0a1587711753c230b0f296337c06eee30dd9f665d32b0b1a23eb39e90315c731efc24f030c3308991b0ddcef1d2eb19b31af5a6896b9029041a3b9330ba328dcaea5377097d845be1e6e81673e7846fb5ba91b620de356c92b8295163b02fe344841286be1f84e7976e448a211f3e06041cdb80ba167c62faf297ac478f22fe0f72a37c7f29d2c9e442e4fefb548f8b0f709ef79099fe7d49ad7a070e829f12199bd34b4596db612ffa1540b15548f17fede12c3dbc3f206b982757d17edd0e9a93d57e4f22ad67022ea97e5888925c4eb1c2ba8862d91233f482aedae8514f9b7b3f628dc2e9aca48e28faa9cabdf40129ae13cea72aa7bed1b874dce7f8feb4fe753594aa1989f1651ad5fc94dc031d1ab3b949ed76c56b34928abd5497cd15796182f4f2603a8a53b3e4b674933531868c2115b8e2964d78dc607938814c75712d302bc6572e0ad001f7c9811538270f87fcbc6ef156ff3b7f61197c5c039fa8b34fedaca26ce181f284dd53e224f0671d32833f7e39a879e3c6ee9d1f35370cfde5a4b0d4117e8caee42fb7587d9eb1c5106af5a5e7e2d7e2dd280c5323858607c3f8186974c2964a2cb763b74fe7bf5f2ce1102e3829270f50b4f4ba07aa76d6de577de18821420f6d0aca49c4f5642cb7b2af65db9934c7f5534fb92e8d67d39468a96cef933bd71128128e06553882fcd3389eb703206813d0827db4f70b88c562660", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x1a78) (async) syz_emit_ethernet(0xc0e, &(0x7f0000000d40)={@broadcast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0xbd8, 0x3a, 0xff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x1f, 0xb, "a78c000005dc790853d5dea6b259b8e3cd2c8038336823493b87aa0568f00b1c71a8242373243ed2439adc07df0a69748e254c1e4a8a8b3f0ab0c430397754db3e340a14a2a1328c5f93037dc1435c11b3000000008419af736b41e5a8"}, {0x0, 0x16, "84f0da52ef24571313968050378ee824f4dffba7feed320557f7671975afc9c545c5ea6137c8ce680ba2d2e8794cc0ee661ab31313a50f67f637326bdc20eee126a2c281295ae9405b24d13dc48b7b6aa26e8a94498418f381922377d30a3b5ed2c6a2990e5ea6b275c1d5bddf59f3d1843df268e8c825c6b2cff208dfb5cd8283d0dcd52a6de228bf697d3d6506afec30ef7e07413c7afc1eb139e0fb1a5a643b4099519e31f3fd4457f0e6d586ad05e1000000"}, {0x0, 0x84, "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"}, {0x0, 0x1, "b20360609ee68487"}, {0x0, 0x9, "c139276371aea9b7cdbd32b0a978030a03d23d9fca26dd1213e1010898b256e481da1018059f850b91347107a9dd38da31c1a16267a090b62089ee0d776d581b1bd756ff9010"}, {0x0, 0xc7, "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"}]}}}}}}, 0x0) syz_emit_ethernet(0x92, &(0x7f0000000000)={@remote, @random="298c2b8ec8c5", @void, {@llc={0x4, {@snap={0xab, 0x0, ',a', "e0c192", 0x809b, "270c0038004bafb0bd2d86be3da2acc4db967c82ee1d6be914cb929a889927e81062d5e3e22b2eb6fd9e3f647e918f06645bac7a604fdb284d0f8962b253ce0b9b9168a6c5d2380393bf9fce4a9ee9681b80be1651e128efb4460dac937c645a4561df000739bacad376bf76d7e599ce6ca0013c880c3ab09056cd"}}}}}, &(0x7f00000000c0)={0x0, 0x3, [0x884, 0x4ac, 0x4dd, 0xce]}) 08:15:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 54) 08:15:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x9bad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:45 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000188000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:45 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c0001000800000000000000080a0500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2031.744353] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500740000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:45 executing program 0: r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000001980)={{0x7f, 0x45, 0x4c, 0x46, 0x81, 0x4, 0x0, 0x8, 0x5, 0x3, 0x0, 0x56, 0x27e, 0x40, 0x82, 0x7fff, 0x0, 0x38, 0x1, 0x5, 0xea}, [{0x60000000, 0x3, 0x1f, 0x0, 0xff, 0x0, 0x0, 0x2}], "05eac7684f29cd8f859afd2b5494e697ba499a1ab0ef7464b6c6a09ef0888d1b228b7de7eb11a0571faedcb9f668e23c85980f7192f474f10d5e8f1188813c4d91c91d9c6617efcda37c858be9c524715e46fb0ddbdf79379482975ef49436a85b7fdd3283abc914b0bcded83042fabb4468ec7de8b197fcfbe256eac2089ba6b66f85a05296942a546033bbd842e4f7a112765fa772ecdf662a3ddd0a9b4e494c48680a250ab98984d4c41896868c64993a921f750f6c5a8f06ff320ad6fdc56a706b18864e1838bc4daa5c8c36e8898b9297d3be4e70b5f605a73acdd2ba9c398254232973387c73f2047427482d9fcefda965d82c1236d25e2030cecf6128a98da4b91acc0c5533b6eff40281da8bd7e0e959607c8b08715e7bbfbea4173cb078c5c226b02774af65775dcb7747cbbece4f597d68938e748b97f08588036bd6ac8120d468d7571c3c158db0c8e6badf21cf81f712924f1c7fa4d29a7327d7c42c52969f43853f0acc852b1e9362804745e7f9b341c11af6d8ab931e3eee8e38a9c232dec8b19f36b5ad2961827e738c4f3df24053d31c378f10c312a6f3e05917bdaca9d92a24b1bc5841c2b1a6e1a2ffcb4bf40e11146cbcde8f389aeafdc43e18d21f66902b88c28271a54231bd26e90b7424997494fff257f8a46a219effed88ef666fb564db5e6eac386127e2030aa526497ed282da472b588ed10a7f660f7e61599394655808cca407f7ac21a4bf8405fb39849d296191d5c21e850b17b5ccb9133197cc917696a02c4ee7c9a3db7cd9f477a2dd6069a7a4443ca058d47e140c4cf8fff485182ed889e89448a17f8317a2a26a7e12c7028609c858eca5a68a1fabc5a118ea1aaaf967800ae1215f47038513a83b05aa6a76b4acaf850bc52cd30a5398e0c9d292a2fb017b7326471a552653b9bffec6c736ab9dcf103da9eba40a30217799bc1afa89371852265425988c2311bea6491b4cd5f85a016180324ff6be23c1d04a950fd133552f66b0bb0183b7638b0edeac457941e9e72dac8a5d0bb8c3c9f532ad2f3b8862c2b0764c2f62534e1b8e193c794886aa732a6b14cb31030757569e60c2de1b36a4b9f82ff471c5ed236b573ad67b04bd169110d80b53147241ead4be1e0baaa7109daf888b0884e68ed238b16372e6eb204bf8ffa64d2cf316cf65decfed72dc6e557de3ec385f2fd252a548fda7eb113dd646399de4aef79d3402bb0408e45330cd8effeb9b36ce137665d9699d7ebdba59e7216eb3ad8858a17d0836edfb776d535b1eaa3b9ee20d6c61c2172bfe6c5120a768efbefdaad5fb135477fe9257af310d2be3b69c803ef73e8fb56db10edd7f78ebc5dc11621b8a2c7539e03879a1464879e690b7d9199a7cdeb34ec0c18ed929e39aca35569a41bb080ec8f7b475376b9ecbb1dfd5fb5906f6c0d62f68bcda6e23f6098c7800d8e75afe2aef684d73f6b709da43177414342e995cc919fae2d2cb4f5a01f175e5edc8df19acc2e3009d84fca4c8a9713342cd62892c48a7fe259feffabde9c2ec41e5e9c599c8ee2bf11e48241faece5efabe6ca1f7f1437ed3df3c80ccc487da1f4a50f4530cb5fd5b4b35d7684c20fec5d77d228def6be59947131c32035f8a0d0506b785486196d6c015e5568ae8c149214c728d534ceb67676ba23b9267259b394c00bf470ed1a3bf0a91287cbd9dfe9a5d3f577ffd55bb2cd6a858b46a59a237f7367892303cc67b70d8854d68c5f5a229e590bd8566731b843a2998a2eb2c1fd9b4c934e8d6f47f09ed83f5546008f1b4ac9807f21f2310a8fbd3576eb774007ff7ee818f11ff06af1a1a4b1e4af3342ff784f0c9cda545adc8fd04e8bea944ffccb2f97fab9ed44f06bd8dff54923241210294f08f8afa90b568919ea4e17109eaebeff91d4b55014349d978db29ba2e70700df35940bd504b2c77046cbfbc9c87d79baa3badc750026df02fde15f6c554b26a9ec5d5669e4949aa37f5bce4e328ca9e8c1a6e25509803c0d5983b7177eca2a59459957d0d42d96c5a4ea0180ebf4efca9cacf54a0cbd10ee50d6e98e13711fd1e540b41a3b988c5b0bf5902a24293884c8b54a7c80d766c2bcf330bd575f333ec175e342f1e60deefe5ce2b90245dfd11e0851d57221c360403ae444ad8211b54903ee33d079859f168b47ff046034739ff4b06c7457b124ead46296e3005cb0008fcc5e3c17c36d64bbf2d146870263712478bd665a1169f649d5d92c08d40d2a98e399e845c57cebb5ca1fa38d578cc5c2e56ac708a63eba49ba1473853a8c96741415f8ebb4ab25f3528e51dd9bd80ea1049979363a08b399b581966a0d27e7d07fc2251f4e3d61da6f50f7217956a3b4ad20b66f2badd79c21e6d1070719db2b95e200d81c5ad177e243611b590d18578dda12df0a7ca540c0db906b0927a7ca90bd46d8f58e90557be8d3444c7fb7aa040180c05a9c47697d7252f31fe6de6d267c3fb10d6f638d539c25bbe55c9c3d8731986a849a038071b9e1e78aae97847f1c092b5845b9f3dfa440a2030edf84f4974668355f7ef0212bf47c5019cf52c21af1ffae66bf0e53d60e6c33607c7846c9d690ee5fccbeee813a526f58daa2ecbc5fffe4401cc8476125cf47617c62898272279b1b8d6ac104d9240c897ef6cd7517fc7f91b5fa51a9836b9e2b9c96ef05b7ad9da94a593651f6a0ea38a2630be1194984b5f357e9a24cc60207e1d515603dfdef437694fe81612070725f536db8874f8915ebeebcb0959ff6a8fe808bba169e7f9a1d6d2ac95a61ea9ea1143c829cea4f5148911a99491a25bce2744fa0e425dbf37fefb1d133f9fe28cd1e13e8a61b63d9f805a7affefcebe18dc0b2300c7bbe66f31a94d26650052ae5e40e5b6f2f30298405116daed1a2274b8cde8bc91a19b91ca381e3256083e84f839f302fd2b341450f1a45453d0128cf09cf42f268b25b69ffbbbb35419b04d65fcb38afe47fecbcaf77e0d70a337d612c886eee2360248b010ce4f3377490655aa669fbf7b6a196c569d5751d979c7e2f5331ccd9215a66189144b9d01baebb68e51b1d8b0af2553d3a8cd909045b5d1b20624b3ab38b0fc92105bb20c32c90d56efda6036adaf940a4a21ec8ad363534be24b12d8e336f95f33045d01c9d1d02a67495cb39958d6feb7ca6e649f93fb5bda5c8c6e302eafe22b0f356420d8d524664c032534dcdef40b8f2ad5091ed7a3eca57d1b93b6619fc78b70616b71d23a2b31818d69fded56e05edcf6d1d8273ce213a699be57a44d0a1d8a7f949e1ec4a1554cea8aa0e888c553761d03b8243951ff08a7f0abab2717d486513df85f5860ef3ffd825e8bd9be1671a9e27425d9153a3348e736d3e5969c861a8cb01e048818a46692a285aa55d86f636541569e1ecc2214725a1b7f16e51d52766ff304a55316b3fd058c9fe9fa0fd409816f222cbbc0bead7a133be64df3861df0e49d780622f7ad043473a46d4f2824f9f2a57e115411ef835ca558dd61b421c3cf2a9c62120cf343db14f769bd40bb923fc186e12236473feb3c1e21d812eec6c4ba6d6ff5d8cd65ac4906f76f56e23e2a2b27462bf75d9d2cc60a1d9731fafe54b22b619e0e7a52a12da9218bdaf154798ddb95187a2e40cf9aeb877d85e0e31bf065b0b79cae48694de29cbfe64dbce318d3e4b30c22889c069b05f359aad49a63c3b2b645467105262706a2456a1904825827ab256cb307d8ff2316c45841b50b90082d36e02888e9c083b7a88e457d06c01ab940f75cdba4ddabe0aee85d7a49a11cf85729c34bbfd469b52fde670be833cbdf3b699d0147533d14c0216e7d22ad2a02bf897772924957f02a5c30b86a8c5a3c253f5d1402c2d7e5982f79a358443d8dbf2b5bdaf9fca9b6db7c04b803476af428b355ccef60956a782b712191735f92d15c9a139309aeb11ec7c079cade201a2d88c9f7bda5b904a220ef951906877dd8a6f2a876e7f7a86b954e4a37fe3e39824474b2d431072254abc27fe1d63849b2d3053f86655aeb1d19dc3ef54df21fe7ca5d2a945d1800dfbf23e04a64d60ae8e8007ca795c5dafc778178860940ce4afca811cdb297680eb63d5430b3dab414235a0ae836db19e89c7f7d971e36a2eb8d857593064b034c47ad0a1f5c0d0443e0e0e4a1f854c9e4670d96cb48a9c3e802d5ea62935bbbf3283dbf6bd773c8619af476bf5dc5e6f7344748935de172eaf65c5d082fcf717dda7a34418331c1cec8c5086adb323b4ada8517c2246752001946dbf1df19fb2c4a6f095e565d1df22e3ff5b5ea706973fa9a944d4c341d3f4c70d6f9e1fd35ce0eac5ef1d10118c831bd3d9b2af5e2289b1294132b5a996c5c0398005449abca2e6579e69a114b2dc52089a93def47dee7eb8305c3f86f90f2bf415da83e6cd9e3dd96ab6542cbec4d77a7318bcd6ee21ee94e08908fcd688615c687c52df7d5fbcc34a4e8a74f499c9dd6bbee3d7259632fca2fc6cc55e255f2f5f56fb361faccb770e348d6d35033f6d2572fc53151092bc5dd030f1927cc7ce680a6ebad73b901705a7effef0a5908fc126936a0250d2cbf189383983514a2cd75e273893e38e953d89c8a1753127e461d8ce67800c25881f55b3d71b82ba36ae516bce023a754ceb8de1dbf7bc36506af5a9449d99356583d293599878f2f8648f2ff308be278bd42784ff3a6b7be022050d12891ffc716ea4c0d27582546c0ff73108e11a13f6bd950b81ac4c836fd94aa0a2527cee768c0518f39fe839110ea3fa868724f087cf76455cacb2b05534b0c595c349a5ca875cc807053b644354cea906f8ed2b30355900d67745a2e8cae7e6d998d24450433e3222a94be4e7208c211911d1be210a1680f7e28e794795a505ad07bd60aadbdd667be9ead5e8b30702fa5f174ea7529b40df7022749247c4681e825f531887a9b4d49ebb36ad6aea9d1445662615d73f34898bb901f8a0351fc5c25beb681720f3e76a5d887114c699033bfadcc77dd02608152980f44633adfa048313e201762a205c151aec89a0a1587711753c230b0f296337c06eee30dd9f665d32b0b1a23eb39e90315c731efc24f030c3308991b0ddcef1d2eb19b31af5a6896b9029041a3b9330ba328dcaea5377097d845be1e6e81673e7846fb5ba91b620de356c92b8295163b02fe344841286be1f84e7976e448a211f3e06041cdb80ba167c62faf297ac478f22fe0f72a37c7f29d2c9e442e4fefb548f8b0f709ef79099fe7d49ad7a070e829f12199bd34b4596db612ffa1540b15548f17fede12c3dbc3f206b982757d17edd0e9a93d57e4f22ad67022ea97e5888925c4eb1c2ba8862d91233f482aedae8514f9b7b3f628dc2e9aca48e28faa9cabdf40129ae13cea72aa7bed1b874dce7f8feb4fe753594aa1989f1651ad5fc94dc031d1ab3b949ed76c56b34928abd5497cd15796182f4f2603a8a53b3e4b674933531868c2115b8e2964d78dc607938814c75712d302bc6572e0ad001f7c9811538270f87fcbc6ef156ff3b7f61197c5c039fa8b34fedaca26ce181f284dd53e224f0671d32833f7e39a879e3c6ee9d1f35370cfde5a4b0d4117e8caee42fb7587d9eb1c5106af5a5e7e2d7e2dd280c5323858607c3f8186974c2964a2cb763b74fe7bf5f2ce1102e3829270f50b4f4ba07aa76d6de577de18821420f6d0aca49c4f5642cb7b2af65db9934c7f5534fb92e8d67d39468a96cef933bd71128128e06553882fcd3389eb703206813d0827db4f70b88c562660", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x1a78) (async) syz_emit_ethernet(0xc0e, &(0x7f0000000d40)={@broadcast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0xbd8, 0x3a, 0xff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @local, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x1f, 0xb, "a78c000005dc790853d5dea6b259b8e3cd2c8038336823493b87aa0568f00b1c71a8242373243ed2439adc07df0a69748e254c1e4a8a8b3f0ab0c430397754db3e340a14a2a1328c5f93037dc1435c11b3000000008419af736b41e5a8"}, {0x0, 0x16, "84f0da52ef24571313968050378ee824f4dffba7feed320557f7671975afc9c545c5ea6137c8ce680ba2d2e8794cc0ee661ab31313a50f67f637326bdc20eee126a2c281295ae9405b24d13dc48b7b6aa26e8a94498418f381922377d30a3b5ed2c6a2990e5ea6b275c1d5bddf59f3d1843df268e8c825c6b2cff208dfb5cd8283d0dcd52a6de228bf697d3d6506afec30ef7e07413c7afc1eb139e0fb1a5a643b4099519e31f3fd4457f0e6d586ad05e1000000"}, {0x0, 0x84, "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"}, {0x0, 0x1, "b20360609ee68487"}, {0x0, 0x9, "c139276371aea9b7cdbd32b0a978030a03d23d9fca26dd1213e1010898b256e481da1018059f850b91347107a9dd38da31c1a16267a090b62089ee0d776d581b1bd756ff9010"}, {0x0, 0xc7, "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"}]}}}}}}, 0x0) (async, rerun: 32) syz_emit_ethernet(0x92, &(0x7f0000000000)={@remote, @random="298c2b8ec8c5", @void, {@llc={0x4, {@snap={0xab, 0x0, ',a', "e0c192", 0x809b, "270c0038004bafb0bd2d86be3da2acc4db967c82ee1d6be914cb929a889927e81062d5e3e22b2eb6fd9e3f647e918f06645bac7a604fdb284d0f8962b253ce0b9b9168a6c5d2380393bf9fce4a9ee9681b80be1651e128efb4460dac937c645a4561df000739bacad376bf76d7e599ce6ca0013c880c3ab09056cd"}}}}}, &(0x7f00000000c0)={0x0, 0x3, [0x884, 0x4ac, 0x4dd, 0xce]}) (rerun: 32) [ 2031.810189] FAULT_INJECTION: forcing a failure. [ 2031.810189] name failslab, interval 1, probability 0, space 0, times 0 [ 2031.834550] CPU: 1 PID: 15017 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2031.842447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2031.851800] Call Trace: [ 2031.854410] dump_stack+0x1fc/0x2ef [ 2031.858063] should_fail.cold+0xa/0xf [ 2031.861872] ? setup_fault_attr+0x200/0x200 [ 2031.866199] ? lock_acquire+0x170/0x3c0 [ 2031.870186] __should_failslab+0x115/0x180 [ 2031.874430] should_failslab+0x5/0x10 [ 2031.878240] __kmalloc_track_caller+0x2a6/0x3c0 [ 2031.882918] ? btrfs_mount_root+0x364/0x1830 [ 2031.887343] kstrdup+0x36/0x70 [ 2031.890560] btrfs_mount_root+0x364/0x1830 [ 2031.894810] ? btrfs_decode_error+0x70/0x70 [ 2031.899157] ? __mutex_unlock_slowpath+0xea/0x610 [ 2031.904021] ? check_preemption_disabled+0x41/0x280 [ 2031.909049] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2031.914078] ? pcpu_alloc+0xc9/0x1190 [ 2031.917889] ? __lockdep_init_map+0x100/0x5a0 [ 2031.922395] mount_fs+0xa3/0x310 [ 2031.925775] vfs_kern_mount.part.0+0x68/0x470 [ 2031.930278] ? kfree+0x110/0x210 [ 2031.933656] vfs_kern_mount+0x3c/0x60 [ 2031.937473] btrfs_mount+0x23a/0xaa0 [ 2031.941202] ? btrfs_show_options+0xfd0/0xfd0 [ 2031.945705] ? __mutex_unlock_slowpath+0xea/0x610 [ 2031.950570] ? check_preemption_disabled+0x41/0x280 [ 2031.955605] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2031.960626] ? pcpu_alloc+0xc9/0x1190 [ 2031.964437] ? __lockdep_init_map+0x100/0x5a0 [ 2031.968960] mount_fs+0xa3/0x310 [ 2031.972344] vfs_kern_mount.part.0+0x68/0x470 [ 2031.976852] do_mount+0x115c/0x2f50 [ 2031.980489] ? cmp_ex_sort+0xc0/0xc0 [ 2031.984305] ? __do_page_fault+0x180/0xd60 [ 2031.988564] ? copy_mount_string+0x40/0x40 [ 2031.992817] ? memset+0x20/0x40 [ 2031.996108] ? copy_mount_options+0x26f/0x380 [ 2032.000615] ksys_mount+0xcf/0x130 [ 2032.004168] __x64_sys_mount+0xba/0x150 [ 2032.008152] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2032.012753] do_syscall_64+0xf9/0x620 [ 2032.016596] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2032.021793] RIP: 0033:0x7ff1645fc7aa [ 2032.025514] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2032.044427] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2032.052136] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fc7aa 08:15:45 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c0001000800000000000000080b0500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2032.059408] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff162f6ffe0 [ 2032.066679] RBP: 00007ff162f70020 R08: 00007ff162f70020 R09: 0000000020000000 [ 2032.073952] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2032.081223] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 08:15:45 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x9c000000}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:45 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000000100018b000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:45 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c0001000800000000000000080c0500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 55) 08:15:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x5cc}}, './file0\x00'}) openat$cgroup_ro(r1, &(0x7f0000000280)='freezer.state\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2d2, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x60, 0x0, 0x0, 0x0, 0x140}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000300)='blkio.bfq.time\x00', 0x0, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000400)=ANY=[], 0x44) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x7, 0x81, 0x1f, 0xfe, 0x0, 0x40, 0x80000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x80, 0xffff, 0x1, 0x3, 0x4, 0x80000000, 0x8, 0x0, 0x6, 0x0, 0x80000000}, 0x0, 0x8, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x1, 0x0, 0x4, 0xff, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97d, 0x0, @perf_config_ext={0x8000, 0x8}, 0x2117, 0x5, 0x0, 0x0, 0x3, 0x1d05, 0xc5, 0x0, 0x9e000000, 0x0, 0xf3c5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r4, 0x101, 0x9, &(0x7f0000004a00)=0x800100, 0x4) write(r4, &(0x7f0000000340)="c81c5f2ad267be855261299cca1ce25e53a865790f61cd4bbb24c08a2d35a8b473163a3f389964831b816f63691c9ebf6b2203e7678fc0d595ff17fcc56dc9784aa0272977a25e82c39595a79f2be13342b1024e32753a6823b6c74f2d0b9b086212761ce6dcd96a59c528e3554c33f1c76c6e03a6e28e5681b457c0712f0b5e1819a127ddef5b74a8b5710f05a1aa1d34438c1850e5b07a3c6f22ad69515c461fdebd0f9ad47d602af8fa1dd51e0e150c2069285982efee49eb4872a7d9d894dd8e1491bba9babd84e45e5bd187c070bfcd059628944879eb903a36423bf9819f449d45b560bb7acdb53dcbb19ec081", 0xf0) 08:15:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85007a0000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:45 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c0001000800000000000000080e0500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:45 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x5cc}}, './file0\x00'}) openat$cgroup_ro(r1, &(0x7f0000000280)='freezer.state\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2d2, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x60, 0x0, 0x0, 0x0, 0x140}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000300)='blkio.bfq.time\x00', 0x0, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000400)=ANY=[], 0x44) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x7, 0x81, 0x1f, 0xfe, 0x0, 0x40, 0x80000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x80, 0xffff, 0x1, 0x3, 0x4, 0x80000000, 0x8, 0x0, 0x6, 0x0, 0x80000000}, 0x0, 0x8, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x1, 0x0, 0x4, 0xff, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97d, 0x0, @perf_config_ext={0x8000, 0x8}, 0x2117, 0x5, 0x0, 0x0, 0x3, 0x1d05, 0xc5, 0x0, 0x9e000000, 0x0, 0xf3c5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r4, 0x101, 0x9, &(0x7f0000004a00)=0x800100, 0x4) write(r4, &(0x7f0000000340)="c81c5f2ad267be855261299cca1ce25e53a865790f61cd4bbb24c08a2d35a8b473163a3f389964831b816f63691c9ebf6b2203e7678fc0d595ff17fcc56dc9784aa0272977a25e82c39595a79f2be13342b1024e32753a6823b6c74f2d0b9b086212761ce6dcd96a59c528e3554c33f1c76c6e03a6e28e5681b457c0712f0b5e1819a127ddef5b74a8b5710f05a1aa1d34438c1850e5b07a3c6f22ad69515c461fdebd0f9ad47d602af8fa1dd51e0e150c2069285982efee49eb4872a7d9d894dd8e1491bba9babd84e45e5bd187c070bfcd059628944879eb903a36423bf9819f449d45b560bb7acdb53dcbb19ec081", 0xf0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x5cc}}, './file0\x00'}) (async) openat$cgroup_ro(r1, &(0x7f0000000280)='freezer.state\x00', 0x0, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2d2, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94'}, 0x30) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x60, 0x0, 0x0, 0x0, 0x140}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) (async) openat$cgroup_ro(r3, &(0x7f0000000300)='blkio.bfq.time\x00', 0x0, 0x0) (async) write$P9_RREADLINK(r2, &(0x7f0000000400)=ANY=[], 0x44) (async) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x7, 0x81, 0x1f, 0xfe, 0x0, 0x40, 0x80000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x80, 0xffff, 0x1, 0x3, 0x4, 0x80000000, 0x8, 0x0, 0x6, 0x0, 0x80000000}, 0x0, 0x8, r2, 0x1) (async) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x1, 0x0, 0x4, 0xff, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97d, 0x0, @perf_config_ext={0x8000, 0x8}, 0x2117, 0x5, 0x0, 0x0, 0x3, 0x1d05, 0xc5, 0x0, 0x9e000000, 0x0, 0xf3c5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) getpid() (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) syz_init_net_socket$ax25(0x3, 0x5, 0x0) (async) setsockopt$ax25_int(r4, 0x101, 0x9, &(0x7f0000004a00)=0x800100, 0x4) (async) write(r4, &(0x7f0000000340)="c81c5f2ad267be855261299cca1ce25e53a865790f61cd4bbb24c08a2d35a8b473163a3f389964831b816f63691c9ebf6b2203e7678fc0d595ff17fcc56dc9784aa0272977a25e82c39595a79f2be13342b1024e32753a6823b6c74f2d0b9b086212761ce6dcd96a59c528e3554c33f1c76c6e03a6e28e5681b457c0712f0b5e1819a127ddef5b74a8b5710f05a1aa1d34438c1850e5b07a3c6f22ad69515c461fdebd0f9ad47d602af8fa1dd51e0e150c2069285982efee49eb4872a7d9d894dd8e1491bba9babd84e45e5bd187c070bfcd059628944879eb903a36423bf9819f449d45b560bb7acdb53dcbb19ec081", 0xf0) (async) [ 2032.307803] FAULT_INJECTION: forcing a failure. [ 2032.307803] name failslab, interval 1, probability 0, space 0, times 0 [ 2032.367653] CPU: 1 PID: 15059 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2032.375559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2032.384915] Call Trace: [ 2032.387511] dump_stack+0x1fc/0x2ef [ 2032.391147] should_fail.cold+0xa/0xf [ 2032.394961] ? setup_fault_attr+0x200/0x200 [ 2032.399289] ? lock_acquire+0x170/0x3c0 [ 2032.403277] __should_failslab+0x115/0x180 [ 2032.407523] should_failslab+0x5/0x10 [ 2032.411328] kmem_cache_alloc+0x277/0x370 [ 2032.415484] getname_kernel+0x4e/0x370 [ 2032.419385] kern_path+0x1b/0x40 [ 2032.422752] lookup_bdev+0xfc/0x220 [ 2032.426379] ? bd_acquire+0x440/0x440 [ 2032.430176] ? debug_check_no_obj_freed+0x201/0x490 [ 2032.435195] blkdev_get_by_path+0x1b/0xd0 [ 2032.439343] btrfs_scan_one_device+0xd0/0xd00 [ 2032.443828] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2032.448920] ? debug_check_no_obj_freed+0x201/0x490 [ 2032.453923] ? device_list_add+0xdd0/0xdd0 [ 2032.458159] ? kfree+0x110/0x210 [ 2032.461512] ? btrfs_mount_root+0x107a/0x1830 [ 2032.466000] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2032.470692] btrfs_mount_root+0x9df/0x1830 [ 2032.474951] ? btrfs_decode_error+0x70/0x70 [ 2032.479260] ? __mutex_unlock_slowpath+0xea/0x610 [ 2032.484092] ? check_preemption_disabled+0x41/0x280 [ 2032.489103] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2032.494108] ? pcpu_alloc+0xc9/0x1190 [ 2032.497910] ? __lockdep_init_map+0x100/0x5a0 [ 2032.502406] mount_fs+0xa3/0x310 [ 2032.505767] vfs_kern_mount.part.0+0x68/0x470 [ 2032.510245] ? kfree+0x110/0x210 [ 2032.513596] vfs_kern_mount+0x3c/0x60 [ 2032.517381] btrfs_mount+0x23a/0xaa0 [ 2032.521080] ? btrfs_show_options+0xfd0/0xfd0 [ 2032.525591] ? __mutex_unlock_slowpath+0xea/0x610 [ 2032.530489] ? check_preemption_disabled+0x41/0x280 [ 2032.535511] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2032.540525] ? pcpu_alloc+0xc9/0x1190 [ 2032.544322] ? __lockdep_init_map+0x100/0x5a0 [ 2032.548814] mount_fs+0xa3/0x310 [ 2032.552170] vfs_kern_mount.part.0+0x68/0x470 [ 2032.556653] do_mount+0x115c/0x2f50 [ 2032.560271] ? cmp_ex_sort+0xc0/0xc0 [ 2032.563993] ? __do_page_fault+0x180/0xd60 [ 2032.568225] ? copy_mount_string+0x40/0x40 [ 2032.572463] ? memset+0x20/0x40 [ 2032.575753] ? copy_mount_options+0x26f/0x380 [ 2032.580243] ksys_mount+0xcf/0x130 [ 2032.583865] __x64_sys_mount+0xba/0x150 [ 2032.587840] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2032.592415] do_syscall_64+0xf9/0x620 [ 2032.596234] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2032.601428] RIP: 0033:0x7ff1645fc7aa 08:15:46 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c0001000800000000000000080f0500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2032.605127] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2032.624020] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2032.631806] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fc7aa [ 2032.639065] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff162f6ffe0 [ 2032.646326] RBP: 00007ff162f70020 R08: 00007ff162f70020 R09: 0000000020000000 [ 2032.653579] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2032.660828] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 08:15:46 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x5cc}}, './file0\x00'}) openat$cgroup_ro(r1, &(0x7f0000000280)='freezer.state\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2d2, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94'}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x60, 0x0, 0x0, 0x0, 0x140}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000300)='blkio.bfq.time\x00', 0x0, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000400)=ANY=[], 0x44) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x7, 0x81, 0x1f, 0xfe, 0x0, 0x40, 0x80000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x80, 0xffff, 0x1, 0x3, 0x4, 0x80000000, 0x8, 0x0, 0x6, 0x0, 0x80000000}, 0x0, 0x8, r2, 0x1) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x1, 0x0, 0x4, 0xff, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97d, 0x0, @perf_config_ext={0x8000, 0x8}, 0x2117, 0x5, 0x0, 0x0, 0x3, 0x1d05, 0xc5, 0x0, 0x9e000000, 0x0, 0xf3c5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r4, 0x101, 0x9, &(0x7f0000004a00)=0x800100, 0x4) write(r4, &(0x7f0000000340)="c81c5f2ad267be855261299cca1ce25e53a865790f61cd4bbb24c08a2d35a8b473163a3f389964831b816f63691c9ebf6b2203e7678fc0d595ff17fcc56dc9784aa0272977a25e82c39595a79f2be13342b1024e32753a6823b6c74f2d0b9b086212761ce6dcd96a59c528e3554c33f1c76c6e03a6e28e5681b457c0712f0b5e1819a127ddef5b74a8b5710f05a1aa1d34438c1850e5b07a3c6f22ad69515c461fdebd0f9ad47d602af8fa1dd51e0e150c2069285982efee49eb4872a7d9d894dd8e1491bba9babd84e45e5bd187c070bfcd059628944879eb903a36423bf9819f449d45b560bb7acdb53dcbb19ec081", 0xf0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x5cc}}, './file0\x00'}) (async) openat$cgroup_ro(r1, &(0x7f0000000280)='freezer.state\x00', 0x0, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2d2, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xee\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90\xdd[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde\x9a[\xe2(\x88\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93\xd2\x00\x00\x00\x00\x00\x00\x00\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x832Z\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x007q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xe4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.\xa2\xd8\x18`\x1b\xbex\xc9BFK\xc6^\x13\xce68\xe4\x83\xfd?\x87\x94\v\xb4x\xf4|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xee>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8d\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xdde\xe8p29\v\x02\xa2b\x13R\xef\xffA\f\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x1e\x00_^9\xb1\b\x87\xc6\xb4\xf0\'f\xba\xbd\xfe\x11\xf8\xc8W\x81s^\xd9\x03\x00\x00\x00\x00\x00\x00\x00\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2\x1fA\x00\xdc\xdd\x11x\x90\x97QJ\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00&\xd8\xb3S\xe0\x1e\xa7\xc3`~U\x91\xfa\x92\x1e\xccdfFz\xa8\t\xe4+\x83\xac\x94'}, 0x30) (async) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) (async) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x60, 0x0, 0x0, 0x0, 0x140}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) (async) openat$cgroup_ro(r3, &(0x7f0000000300)='blkio.bfq.time\x00', 0x0, 0x0) (async) write$P9_RREADLINK(r2, &(0x7f0000000400)=ANY=[], 0x44) (async) perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x7, 0x81, 0x1f, 0xfe, 0x0, 0x40, 0x80000, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x80, 0xffff, 0x1, 0x3, 0x4, 0x80000000, 0x8, 0x0, 0x6, 0x0, 0x80000000}, 0x0, 0x8, r2, 0x1) (async) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x1, 0x0, 0x4, 0xff, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x97d, 0x0, @perf_config_ext={0x8000, 0x8}, 0x2117, 0x5, 0x0, 0x0, 0x3, 0x1d05, 0xc5, 0x0, 0x9e000000, 0x0, 0xf3c5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) getpid() (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async) syz_init_net_socket$ax25(0x3, 0x5, 0x0) (async) setsockopt$ax25_int(r4, 0x101, 0x9, &(0x7f0000004a00)=0x800100, 0x4) (async) write(r4, &(0x7f0000000340)="c81c5f2ad267be855261299cca1ce25e53a865790f61cd4bbb24c08a2d35a8b473163a3f389964831b816f63691c9ebf6b2203e7678fc0d595ff17fcc56dc9784aa0272977a25e82c39595a79f2be13342b1024e32753a6823b6c74f2d0b9b086212761ce6dcd96a59c528e3554c33f1c76c6e03a6e28e5681b457c0712f0b5e1819a127ddef5b74a8b5710f05a1aa1d34438c1850e5b07a3c6f22ad69515c461fdebd0f9ad47d602af8fa1dd51e0e150c2069285982efee49eb4872a7d9d894dd8e1491bba9babd84e45e5bd187c070bfcd059628944879eb903a36423bf9819f449d45b560bb7acdb53dcbb19ec081", 0xf0) (async) 08:15:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x9cad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 56) 08:15:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000300ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:46 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000090000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:46 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000008100500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2032.835300] FAULT_INJECTION: forcing a failure. [ 2032.835300] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2032.847220] CPU: 1 PID: 15103 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2032.855111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2032.864464] Call Trace: [ 2032.867067] dump_stack+0x1fc/0x2ef [ 2032.870805] should_fail.cold+0xa/0xf [ 2032.874629] ? setup_fault_attr+0x200/0x200 [ 2032.879055] __alloc_pages_nodemask+0x239/0x2890 [ 2032.883823] ? __save_stack_trace+0x72/0x190 [ 2032.888238] ? deref_stack_reg+0x134/0x1d0 [ 2032.892507] ? mark_held_locks+0xf0/0xf0 [ 2032.896581] ? unwind_next_frame+0xeee/0x1400 [ 2032.901088] ? __lock_acquire+0x6de/0x3ff0 [ 2032.905336] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2032.910286] ? is_bpf_text_address+0xd5/0x1b0 [ 2032.914803] ? __bpf_address_lookup+0x330/0x330 [ 2032.919741] ? check_preemption_disabled+0x41/0x280 [ 2032.924767] ? is_bpf_text_address+0xfc/0x1b0 [ 2032.929277] ? kernel_text_address+0xbd/0xf0 [ 2032.933695] cache_grow_begin+0xa4/0x8a0 [ 2032.937761] ? setup_fault_attr+0x200/0x200 [ 2032.942085] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 2032.946850] cache_alloc_refill+0x273/0x340 [ 2032.951191] kmem_cache_alloc+0x346/0x370 [ 2032.955349] getname_kernel+0x4e/0x370 [ 2032.959239] kern_path+0x1b/0x40 [ 2032.962615] lookup_bdev+0xfc/0x220 [ 2032.966244] ? bd_acquire+0x440/0x440 [ 2032.970306] ? debug_check_no_obj_freed+0x201/0x490 [ 2032.975508] blkdev_get_by_path+0x1b/0xd0 [ 2032.979665] btrfs_scan_one_device+0xd0/0xd00 08:15:46 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f00000003c0)={&(0x7f0000000240), &(0x7f00000002c0)=""/136, 0x88}) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0xfffffffffffffffe, 0x1f}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[], 0x30}}, 0x20004040) r1 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)=@gettclass={0x24, 0x2a, 0x2, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, r2, {0x7, 0xfff2}, {0xc, 0x9}, {0xb827a2c8fe0ea6cf, 0xf}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB="2c000000180064a428d157a5035400042cbd7000fddbdf250a001406fc04fe34b4356561c325720003", @ANYRES32=r2, @ANYBLOB="b4f9862c2fa437f53bacb6d53994f20214586c1c4dbeed6228ad37e435e4f8ce83a1917484787d167e0d500e3006a54e5cf0d0e06a77dc866e196705acd941922ca8b4bd16cc828261097a28a0ce97d34829dbec12b9a022a89086096a4868af10f39825605a3bc5db27711fa2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x4044001) syz_open_procfs(0x0, &(0x7f0000000700)='net/arp\x00') ioctl$mixer_OSS_ALSAEMULVER(0xffffffffffffffff, 0x80044df9, &(0x7f0000000400)) r4 = socket(0x10, 0x803, 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r5, 0x6, 0x15, &(0x7f00000004c0)=0x400, 0x4) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000740)="dd05f28781cfc7a598db49ddc95f90d94cf49c7a5dcce9a8771edd9832918ecaae670dce9bf4ef498cdfa4473ff296e2565734c999f7a417fdc82b349de783875524c957fda70700000077a14c06b80d72d51314ac929ef43b0e3e943f1eae334c1718f811fd99c587d10f82ff5245d78d0da776eed5f2acdcd09e98e2dcaac503e8fc34cee7ed7045050ca78517be77b02d727f2394dbf589452a9a5b4abba82d2c00becd978e7fe21dc374d148ca87265747cfe167707f58aa5dc02472e7dabf5a4edf43e1959e5e87096b539f09c1b47bacd6a9df9d32c854422e0411b0f21003456b22962ec70c29619ccd539cc0a751f382e93bef30d0dabc3917321315") 08:15:46 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000008480500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:46 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f00000003c0)={&(0x7f0000000240), &(0x7f00000002c0)=""/136, 0x88}) (async) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0xfffffffffffffffe, 0x1f}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$nl_route(0x10, 0x3, 0x0) (async) syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') (async) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[], 0x30}}, 0x20004040) (async) r1 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)=@gettclass={0x24, 0x2a, 0x2, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, r2, {0x7, 0xfff2}, {0xc, 0x9}, {0xb827a2c8fe0ea6cf, 0xf}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB="2c000000180064a428d157a5035400042cbd7000fddbdf250a001406fc04fe34b4356561c325720003", @ANYRES32=r2, @ANYBLOB="b4f9862c2fa437f53bacb6d53994f20214586c1c4dbeed6228ad37e435e4f8ce83a1917484787d167e0d500e3006a54e5cf0d0e06a77dc866e196705acd941922ca8b4bd16cc828261097a28a0ce97d34829dbec12b9a022a89086096a4868af10f39825605a3bc5db27711fa2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x4044001) (async) syz_open_procfs(0x0, &(0x7f0000000700)='net/arp\x00') ioctl$mixer_OSS_ALSAEMULVER(0xffffffffffffffff, 0x80044df9, &(0x7f0000000400)) (async) r4 = socket(0x10, 0x803, 0x0) (async) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r5, 0x6, 0x15, &(0x7f00000004c0)=0x400, 0x4) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) (async) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000740)="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") [ 2032.984172] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2032.989278] ? debug_check_no_obj_freed+0x201/0x490 [ 2032.994299] ? device_list_add+0xdd0/0xdd0 [ 2032.998538] ? kfree+0x110/0x210 [ 2033.001920] ? btrfs_mount_root+0x107a/0x1830 [ 2033.006431] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2033.011025] btrfs_mount_root+0x9df/0x1830 [ 2033.015258] ? btrfs_decode_error+0x70/0x70 [ 2033.019569] ? __mutex_unlock_slowpath+0xea/0x610 [ 2033.024414] ? check_preemption_disabled+0x41/0x280 [ 2033.029439] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2033.034458] ? pcpu_alloc+0xc9/0x1190 [ 2033.038305] ? __lockdep_init_map+0x100/0x5a0 [ 2033.042785] mount_fs+0xa3/0x310 [ 2033.046139] vfs_kern_mount.part.0+0x68/0x470 [ 2033.050630] ? kfree+0x110/0x210 [ 2033.054039] vfs_kern_mount+0x3c/0x60 [ 2033.057836] btrfs_mount+0x23a/0xaa0 [ 2033.061648] ? btrfs_show_options+0xfd0/0xfd0 [ 2033.066143] ? __mutex_unlock_slowpath+0xea/0x610 [ 2033.070974] ? check_preemption_disabled+0x41/0x280 [ 2033.075976] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2033.080973] ? pcpu_alloc+0xc9/0x1190 [ 2033.084866] ? __lockdep_init_map+0x100/0x5a0 [ 2033.089357] mount_fs+0xa3/0x310 [ 2033.092710] vfs_kern_mount.part.0+0x68/0x470 [ 2033.097201] do_mount+0x115c/0x2f50 [ 2033.100827] ? cmp_ex_sort+0xc0/0xc0 [ 2033.104548] ? __do_page_fault+0x180/0xd60 [ 2033.108783] ? copy_mount_string+0x40/0x40 [ 2033.113020] ? memset+0x20/0x40 [ 2033.116304] ? copy_mount_options+0x26f/0x380 [ 2033.120798] ksys_mount+0xcf/0x130 [ 2033.124322] __x64_sys_mount+0xba/0x150 [ 2033.128278] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2033.132847] do_syscall_64+0xf9/0x620 [ 2033.136651] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2033.141830] RIP: 0033:0x7ff1645fc7aa [ 2033.145525] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2033.164409] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2033.172117] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fc7aa [ 2033.179376] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff162f6ffe0 08:15:46 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x9dad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2033.186630] RBP: 00007ff162f70020 R08: 00007ff162f70020 R09: 0000000020000000 [ 2033.193882] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2033.201237] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 08:15:46 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f00000003c0)={&(0x7f0000000240), &(0x7f00000002c0)=""/136, 0x88}) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0xfffffffffffffffe, 0x1f}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) socket$nl_route(0x10, 0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[], 0x30}}, 0x20004040) r1 = socket(0x10, 0x80002, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)=@gettclass={0x24, 0x2a, 0x2, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, r2, {0x7, 0xfff2}, {0xc, 0x9}, {0xb827a2c8fe0ea6cf, 0xf}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB="2c000000180064a428d157a5035400042cbd7000fddbdf250a001406fc04fe34b4356561c325720003", @ANYRES32=r2, @ANYBLOB="b4f9862c2fa437f53bacb6d53994f20214586c1c4dbeed6228ad37e435e4f8ce83a1917484787d167e0d500e3006a54e5cf0d0e06a77dc866e196705acd941922ca8b4bd16cc828261097a28a0ce97d34829dbec12b9a022a89086096a4868af10f39825605a3bc5db27711fa2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x4044001) syz_open_procfs(0x0, &(0x7f0000000700)='net/arp\x00') ioctl$mixer_OSS_ALSAEMULVER(0xffffffffffffffff, 0x80044df9, &(0x7f0000000400)) r4 = socket(0x10, 0x803, 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r5, 0x6, 0x15, &(0x7f00000004c0)=0x400, 0x4) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000740)="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") openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) ioctl$MON_IOCX_GETX(r0, 0x400c920a, &(0x7f00000003c0)={&(0x7f0000000240), &(0x7f00000002c0)=""/136, 0x88}) (async) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0xfffffffffffffffe, 0x1f}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) (async) socket$nl_route(0x10, 0x3, 0x0) (async) syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') (async) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[], 0x30}}, 0x20004040) (async) socket(0x10, 0x80002, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)) (async) socket$nl_route(0x10, 0x3, 0x0) (async) sendmsg$nl_route_sched(r0, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)=@gettclass={0x24, 0x2a, 0x2, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, r2, {0x7, 0xfff2}, {0xc, 0x9}, {0xb827a2c8fe0ea6cf, 0xf}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x10) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB="2c000000180064a428d157a5035400042cbd7000fddbdf250a001406fc04fe34b4356561c325720003", @ANYRES32=r2, @ANYBLOB="b4f9862c2fa437f53bacb6d53994f20214586c1c4dbeed6228ad37e435e4f8ce83a1917484787d167e0d500e3006a54e5cf0d0e06a77dc866e196705acd941922ca8b4bd16cc828261097a28a0ce97d34829dbec12b9a022a89086096a4868af10f39825605a3bc5db27711fa2"], 0x2c}, 0x1, 0x0, 0x0, 0x423487cfdbb94300}, 0x4044001) (async) syz_open_procfs(0x0, &(0x7f0000000700)='net/arp\x00') (async) ioctl$mixer_OSS_ALSAEMULVER(0xffffffffffffffff, 0x80044df9, &(0x7f0000000400)) (async) socket(0x10, 0x803, 0x0) (async) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000480), 0x40, 0x0) (async) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r5, 0x6, 0x15, &(0x7f00000004c0)=0x400, 0x4) (async) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) (async) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) (async) sendmsg$nl_route(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newlink={0x5c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x1c, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6, 0x1, 0x988}, @IFLA_VLAN_EGRESS_QOS={0x4}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x10, 0x1}}]}}}, @IFLA_LINK={0x8, 0x5, r2}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x5c}}, 0x0) (async) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000740)="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") (async) [ 2033.225681] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (15111) [ 2033.244562] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (15134) 08:15:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000500ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:46 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c0001000800000000000000084c0500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:46 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000010000a5000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 57) 08:15:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x9ead0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:47 executing program 0: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_ADD(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[], 0x20}}, 0x0) getsockname$packet(r4, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="480000001000050700000000f6c3000000000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="2c57892b981d9948d762fbdf14ffb35d1a", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000800010071667100"], 0x2c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0x5}}, [@filter_kind_options=@f_route={{0xa}, {0xc, 0x2, [@TCA_ROUTE4_CLASSID={0x8}]}}]}, 0x3c}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_ADD(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[], 0x20}}, 0x0) getsockname$packet(r7, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="480000001000050700000000f6c3000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000030000000000000076657468"], 0x48}, 0x1, 0x0, 0x0, 0x8004}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {}, {0x5}}, [@filter_kind_options=@f_route={{0xa}, {0xc, 0x2, [@TCA_ROUTE4_CLASSID={0x8}]}}]}, 0x3c}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, 0x2, 0x3, 0x0, 0x0, 0x0, {0x3, 0x0, 0xa}, [@NFQA_CFG_PARAMS={0x9, 0x2, {0x3, 0x1}}, @NFQA_CFG_CMD={0x8, 0x1, {0x2, 0x0, 0x1e}}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x401}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000020}, 0x8040) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x70, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x40408c4}, 0x28040001) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f00000000c0)={0x38, r0, 0x1, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r2}, @val={0xc}}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x96c}], @chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x5}]]}, 0x38}}, 0x0) 08:15:47 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000008600500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:47 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000010000a6000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:47 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000008680500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x9effffff}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000600ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2033.538492] FAULT_INJECTION: forcing a failure. [ 2033.538492] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2033.550325] CPU: 1 PID: 15192 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2033.558213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2033.567568] Call Trace: [ 2033.570156] dump_stack+0x1fc/0x2ef [ 2033.573795] should_fail.cold+0xa/0xf [ 2033.577598] ? setup_fault_attr+0x200/0x200 [ 2033.581912] ? is_bpf_text_address+0xfc/0x1b0 [ 2033.586409] ? kernel_text_address+0xbd/0xf0 [ 2033.590809] __alloc_pages_nodemask+0x239/0x2890 [ 2033.595561] ? __lock_acquire+0x6de/0x3ff0 [ 2033.599783] ? mount_fs+0xa3/0x310 [ 2033.603306] ? vfs_kern_mount.part.0+0x68/0x470 [ 2033.607963] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 2033.612802] ? vfs_kern_mount.part.0+0x68/0x470 [ 2033.617460] ? do_mount+0x115c/0x2f50 [ 2033.621261] ? ksys_mount+0xcf/0x130 [ 2033.624960] ? __x64_sys_mount+0xba/0x150 [ 2033.629093] ? do_syscall_64+0xf9/0x620 [ 2033.633070] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2033.638430] ? lock_downgrade+0x720/0x720 [ 2033.642563] ? lock_acquire+0x170/0x3c0 [ 2033.646523] ? cache_alloc_refill+0x2f8/0x340 [ 2033.651010] cache_grow_begin+0xa4/0x8a0 [ 2033.655059] ? setup_fault_attr+0x200/0x200 [ 2033.659372] ? cache_alloc_pfmemalloc+0x1e/0x140 [ 2033.664130] cache_alloc_refill+0x273/0x340 [ 2033.668442] kmem_cache_alloc_trace+0x354/0x380 [ 2033.673101] btrfs_mount_root+0x1e1/0x1830 [ 2033.677351] ? btrfs_decode_error+0x70/0x70 [ 2033.681662] ? __mutex_unlock_slowpath+0xea/0x610 [ 2033.686496] ? check_preemption_disabled+0x41/0x280 [ 2033.691517] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2033.696518] ? pcpu_alloc+0xc9/0x1190 [ 2033.700305] ? __lockdep_init_map+0x100/0x5a0 [ 2033.704789] mount_fs+0xa3/0x310 [ 2033.708146] vfs_kern_mount.part.0+0x68/0x470 [ 2033.712726] ? kfree+0x110/0x210 [ 2033.716083] vfs_kern_mount+0x3c/0x60 [ 2033.719874] btrfs_mount+0x23a/0xaa0 [ 2033.723579] ? btrfs_show_options+0xfd0/0xfd0 [ 2033.728146] ? __mutex_unlock_slowpath+0xea/0x610 [ 2033.733068] ? check_preemption_disabled+0x41/0x280 [ 2033.738075] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2033.743080] ? pcpu_alloc+0xc9/0x1190 [ 2033.746874] ? __lockdep_init_map+0x100/0x5a0 [ 2033.751363] mount_fs+0xa3/0x310 [ 2033.754719] vfs_kern_mount.part.0+0x68/0x470 [ 2033.759204] do_mount+0x115c/0x2f50 [ 2033.762820] ? cmp_ex_sort+0xc0/0xc0 [ 2033.766523] ? __do_page_fault+0x180/0xd60 [ 2033.770743] ? copy_mount_string+0x40/0x40 [ 2033.774968] ? memset+0x20/0x40 [ 2033.778339] ? copy_mount_options+0x26f/0x380 [ 2033.782830] ksys_mount+0xcf/0x130 [ 2033.786371] __x64_sys_mount+0xba/0x150 [ 2033.790332] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2033.794898] do_syscall_64+0xf9/0x620 [ 2033.798690] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2033.803865] RIP: 0033:0x7ff1645fc7aa [ 2033.807575] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2033.826556] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2033.834514] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fc7aa [ 2033.841782] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff162f6ffe0 [ 2033.849043] RBP: 00007ff162f70020 R08: 00007ff162f70020 R09: 0000000020000000 [ 2033.856301] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2033.863563] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 08:15:47 executing program 0: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) (async) r3 = socket$netlink(0x10, 0x3, 0x0) (async) r4 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_ADD(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[], 0x20}}, 0x0) (async) getsockname$packet(r4, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="480000001000050700000000f6c3000000000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="2c57892b981d9948d762fbdf14ffb35d1a", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000800010071667100"], 0x2c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0x5}}, [@filter_kind_options=@f_route={{0xa}, {0xc, 0x2, [@TCA_ROUTE4_CLASSID={0x8}]}}]}, 0x3c}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) (async) r7 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_ADD(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[], 0x20}}, 0x0) getsockname$packet(r7, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="480000001000050700000000f6c3000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000030000000000000076657468"], 0x48}, 0x1, 0x0, 0x0, 0x8004}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {}, {0x5}}, [@filter_kind_options=@f_route={{0xa}, {0xc, 0x2, [@TCA_ROUTE4_CLASSID={0x8}]}}]}, 0x3c}}, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) (async) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, 0x2, 0x3, 0x0, 0x0, 0x0, {0x3, 0x0, 0xa}, [@NFQA_CFG_PARAMS={0x9, 0x2, {0x3, 0x1}}, @NFQA_CFG_CMD={0x8, 0x1, {0x2, 0x0, 0x1e}}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x401}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000020}, 0x8040) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x70, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x40408c4}, 0x28040001) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f00000000c0)={0x38, r0, 0x1, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r2}, @val={0xc}}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x96c}], @chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x5}]]}, 0x38}}, 0x0) 08:15:47 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c0001000800000000000000086c0500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000700ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:47 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000010003a6000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 58) 08:15:47 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000008740500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:47 executing program 0: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) (async) r3 = socket$netlink(0x10, 0x3, 0x0) (async) r4 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_ADD(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[], 0x20}}, 0x0) (async) getsockname$packet(r4, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="480000001000050700000000f6c3000000000000", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="2c57892b981d9948d762fbdf14ffb35d1a", @ANYRES32=r5, @ANYBLOB="00000000ffffffff000000000800010071667100"], 0x2c}}, 0x0) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0x5}}, [@filter_kind_options=@f_route={{0xa}, {0xc, 0x2, [@TCA_ROUTE4_CLASSID={0x8}]}}]}, 0x3c}}, 0x0) (async) r6 = socket$netlink(0x10, 0x3, 0x0) (async) r7 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_ADD(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[], 0x20}}, 0x0) (async) getsockname$packet(r7, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="480000001000050700000000f6c3000000000000", @ANYRES32=r8, @ANYBLOB="0000000000000000030000000000000076657468"], 0x48}, 0x1, 0x0, 0x0, 0x8004}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {}, {0x5}}, [@filter_kind_options=@f_route={{0xa}, {0xc, 0x2, [@TCA_ROUTE4_CLASSID={0x8}]}}]}, 0x3c}}, 0x0) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) (async) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, 0x2, 0x3, 0x0, 0x0, 0x0, {0x3, 0x0, 0xa}, [@NFQA_CFG_PARAMS={0x9, 0x2, {0x3, 0x1}}, @NFQA_CFG_CMD={0x8, 0x1, {0x2, 0x0, 0x1e}}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x401}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000020}, 0x8040) sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x70, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {}, [@HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x40408c4}, 0x28040001) (async) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000fc0)={&(0x7f00000000c0)={0x38, r0, 0x1, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r2}, @val={0xc}}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x96c}], @chandef_params=[@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x5}]]}, 0x38}}, 0x0) 08:15:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x9fad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:47 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000010002b6000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:47 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c0001000800000000000000087a0500", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:47 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='memory.events\x00') r1 = perf_event_open(&(0x7f0000000f80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x7, &(0x7f0000000300)=@framed={{}, [@map_idx={0x18, 0x4, 0x5, 0x0, 0xb}, @alu={0x0, 0x0, 0x7, 0x8, 0x0, 0xc, 0xfffffffffffffff0}, @ldst={0x3, 0x0, 0x1, 0x4, 0x0, 0xfffffffffffffff0, 0xa69c8cbc487c090f}]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x5}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x9, 0x0, 0x2}, 0x10}, 0x80) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800"/12], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='cpuacct.stat\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000180)) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x0, 0x0, 0x0, &(0x7f0000000880)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x1c, '\x00', 0x0, 0x21, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x0, 0xb, 0x0, 0x3ff}, 0x10, 0x0, r4}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x19, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x0, 0xfb20, 0x8}, 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r2, 0x0, 0x84, 0x0, &(0x7f0000000340)="102049fa3c7cac8f324547431df0f818da10de9e11d56b400bc8362730129f2d69513fd01ad763e4a83507f9db1169a19a3bbf58998bb3d8c6da3096d3ffd7439ac7846b079e9f77481c5f6884ea0e6b933f126e2ada4724cb635ed7e783021bf8f849b23b01cc9e5b56cb15ef8fafca637d66b9f2bbebf75d9e5960f7a81089156d8d60", &(0x7f00000002c0), 0x7ff, 0x0, 0x41, 0x64, &(0x7f0000000400)="e6ca80f78e48db8b66be819a0d1ed562db92ee2e3e0c5f6564c05d2b278a0338eafa898174cce8f7a239f429f8dd178f3b94f604326696f02dc90fc2246679cc53", &(0x7f0000000600)="2d42879b4d3dc8630fc80193f86cfacf466d40d5c071862cbcb940d77a73ccd1f66f9e741d4c85f68fe91cdff4eefc1c805813c774a47dc37af6bf43cfc9e6453fe6d779a392eb8b91cc7d89015227d80c126a87a7c0d5c4f72e718adacb642d489be613", 0x1, 0x6}, 0x48) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x806000) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0x44) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000800)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0a000000300a00000000000000000000181b00008a36c1d16461378771878c653ac03e0dcfefc3f8cfa70f4707d1e20fb4815509fd560c1d76e8c80ba55752c8e5596aa93eecea52d909b1905b4315457af66fec8cfaea690cfc91f24f3194528aefdfd7cbdcce26562dfb2855f1", @ANYRES32=r5, @ANYBLOB="0000008efbdc2b8d", @ANYRES32=r3, @ANYBLOB="00000000000400009500000000000000181b0000", @ANYRES32, @ANYBLOB="000000000000000040260300070000002053ff7fe500000055281000fcffffff9500000000000000"], &(0x7f00000002c0)='GPL\x00', 0x80c8, 0xe4, &(0x7f0000000ac0)=""/228, 0x41000, 0x10, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000000480)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x4, 0x9, 0x0, 0x2}, 0x10}, 0x80) 08:15:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0xa0ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:47 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000008000600", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000900ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2034.252425] FAULT_INJECTION: forcing a failure. [ 2034.252425] name failslab, interval 1, probability 0, space 0, times 0 [ 2034.264090] CPU: 1 PID: 15262 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2034.271979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2034.281332] Call Trace: [ 2034.283929] dump_stack+0x1fc/0x2ef [ 2034.287563] should_fail.cold+0xa/0xf [ 2034.291370] ? setup_fault_attr+0x200/0x200 [ 2034.295693] ? __lock_acquire+0x6de/0x3ff0 08:15:47 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000008000900", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:47 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0xa1ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2034.299931] __should_failslab+0x115/0x180 [ 2034.304173] should_failslab+0x5/0x10 [ 2034.307976] kmem_cache_alloc+0x3f/0x370 [ 2034.312045] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 2034.317692] __radix_tree_create+0x314/0x540 [ 2034.322117] page_cache_tree_insert+0xac/0x3f0 [ 2034.326705] ? file_check_and_advance_wb_err+0x3a0/0x3a0 [ 2034.332160] ? lock_acquire+0x170/0x3c0 [ 2034.336139] ? __add_to_page_cache_locked+0x45e/0xb60 [ 2034.341348] __add_to_page_cache_locked+0x46e/0xb60 [ 2034.346376] ? page_cache_tree_insert+0x3f0/0x3f0 [ 2034.351223] ? iput+0xc9/0x860 [ 2034.354433] add_to_page_cache_lru+0x16a/0x680 [ 2034.359022] ? add_to_page_cache_locked+0x40/0x40 [ 2034.363879] do_read_cache_page+0x50a/0x1170 [ 2034.368303] ? blkdev_writepages+0x20/0x20 [ 2034.372547] btrfs_scan_one_device+0x195/0xd00 [ 2034.377137] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2034.382242] ? debug_check_no_obj_freed+0x201/0x490 [ 2034.387276] ? device_list_add+0xdd0/0xdd0 [ 2034.391512] ? kfree+0x110/0x210 [ 2034.394882] ? btrfs_mount_root+0x107a/0x1830 [ 2034.399381] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2034.403970] btrfs_mount_root+0x9df/0x1830 [ 2034.408209] ? btrfs_decode_error+0x70/0x70 [ 2034.412534] ? __mutex_unlock_slowpath+0xea/0x610 [ 2034.417387] ? check_preemption_disabled+0x41/0x280 [ 2034.422416] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2034.427438] ? pcpu_alloc+0xc9/0x1190 [ 2034.431259] ? __lockdep_init_map+0x100/0x5a0 [ 2034.435764] mount_fs+0xa3/0x310 [ 2034.439573] vfs_kern_mount.part.0+0x68/0x470 [ 2034.444071] ? kfree+0x110/0x210 [ 2034.447447] vfs_kern_mount+0x3c/0x60 [ 2034.451261] btrfs_mount+0x23a/0xaa0 [ 2034.454991] ? btrfs_show_options+0xfd0/0xfd0 [ 2034.459499] ? __mutex_unlock_slowpath+0xea/0x610 [ 2034.464354] ? check_preemption_disabled+0x41/0x280 [ 2034.469383] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2034.474411] ? pcpu_alloc+0xc9/0x1190 [ 2034.478217] ? __lockdep_init_map+0x100/0x5a0 [ 2034.482720] mount_fs+0xa3/0x310 [ 2034.486089] vfs_kern_mount.part.0+0x68/0x470 [ 2034.490574] do_mount+0x115c/0x2f50 [ 2034.494375] ? cmp_ex_sort+0xc0/0xc0 [ 2034.498070] ? __do_page_fault+0x180/0xd60 [ 2034.502284] ? copy_mount_string+0x40/0x40 [ 2034.506528] ? memset+0x20/0x40 [ 2034.509913] ? copy_mount_options+0x26f/0x380 [ 2034.514402] ksys_mount+0xcf/0x130 [ 2034.517931] __x64_sys_mount+0xba/0x150 [ 2034.521909] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2034.526482] do_syscall_64+0xf9/0x620 [ 2034.530279] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2034.535465] RIP: 0033:0x7ff1645fc7aa [ 2034.539163] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2034.558048] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2034.565737] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fc7aa [ 2034.572985] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff162f6ffe0 [ 2034.580239] RBP: 00007ff162f70020 R08: 00007ff162f70020 R09: 0000000020000000 [ 2034.587501] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2034.594749] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 [ 2034.658328] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (15282) 08:15:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 59) 08:15:48 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000008000a00", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0xa2ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000010001be000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500001f00ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:48 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='memory.events\x00') r1 = perf_event_open(&(0x7f0000000f80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x7, &(0x7f0000000300)=@framed={{}, [@map_idx={0x18, 0x4, 0x5, 0x0, 0xb}, @alu={0x0, 0x0, 0x7, 0x8, 0x0, 0xc, 0xfffffffffffffff0}, @ldst={0x3, 0x0, 0x1, 0x4, 0x0, 0xfffffffffffffff0, 0xa69c8cbc487c090f}]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x5}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x9, 0x0, 0x2}, 0x10}, 0x80) (async) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800"/12], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) (async) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='cpuacct.stat\x00', 0x0, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000180)) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x0, 0x0, 0x0, &(0x7f0000000880)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x1c, '\x00', 0x0, 0x21, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x0, 0xb, 0x0, 0x3ff}, 0x10, 0x0, r4}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x19, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x0, 0xfb20, 0x8}, 0x10}, 0x80) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r2, 0x0, 0x84, 0x0, &(0x7f0000000340)="102049fa3c7cac8f324547431df0f818da10de9e11d56b400bc8362730129f2d69513fd01ad763e4a83507f9db1169a19a3bbf58998bb3d8c6da3096d3ffd7439ac7846b079e9f77481c5f6884ea0e6b933f126e2ada4724cb635ed7e783021bf8f849b23b01cc9e5b56cb15ef8fafca637d66b9f2bbebf75d9e5960f7a81089156d8d60", &(0x7f00000002c0), 0x7ff, 0x0, 0x41, 0x64, &(0x7f0000000400)="e6ca80f78e48db8b66be819a0d1ed562db92ee2e3e0c5f6564c05d2b278a0338eafa898174cce8f7a239f429f8dd178f3b94f604326696f02dc90fc2246679cc53", &(0x7f0000000600)="2d42879b4d3dc8630fc80193f86cfacf466d40d5c071862cbcb940d77a73ccd1f66f9e741d4c85f68fe91cdff4eefc1c805813c774a47dc37af6bf43cfc9e6453fe6d779a392eb8b91cc7d89015227d80c126a87a7c0d5c4f72e718adacb642d489be613", 0x1, 0x6}, 0x48) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x806000) (async) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0x44) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000800)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0a000000300a00000000000000000000181b00008a36c1d16461378771878c653ac03e0dcfefc3f8cfa70f4707d1e20fb4815509fd560c1d76e8c80ba55752c8e5596aa93eecea52d909b1905b4315457af66fec8cfaea690cfc91f24f3194528aefdfd7cbdcce26562dfb2855f1", @ANYRES32=r5, @ANYBLOB="0000008efbdc2b8d", @ANYRES32=r3, @ANYBLOB="00000000000400009500000000000000181b0000", @ANYRES32, @ANYBLOB="000000000000000040260300070000002053ff7fe500000055281000fcffffff9500000000000000"], &(0x7f00000002c0)='GPL\x00', 0x80c8, 0xe4, &(0x7f0000000ac0)=""/228, 0x41000, 0x10, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000000480)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x4, 0x9, 0x0, 0x2}, 0x10}, 0x80) [ 2034.872685] FAULT_INJECTION: forcing a failure. [ 2034.872685] name failslab, interval 1, probability 0, space 0, times 0 [ 2034.879414] nla_parse: 19 callbacks suppressed [ 2034.879439] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2034.896659] CPU: 0 PID: 15300 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2034.905731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2034.915082] Call Trace: [ 2034.917681] dump_stack+0x1fc/0x2ef [ 2034.921319] should_fail.cold+0xa/0xf [ 2034.925132] ? setup_fault_attr+0x200/0x200 [ 2034.929469] __should_failslab+0x115/0x180 [ 2034.933710] should_failslab+0x5/0x10 [ 2034.937516] __kmalloc+0x2ab/0x3c0 [ 2034.941067] ? device_list_add+0x85d/0xdd0 [ 2034.945308] device_list_add+0x85d/0xdd0 [ 2034.949380] ? btrfs_rm_dev_replace_free_srcdev+0x450/0x450 [ 2034.955150] btrfs_scan_one_device+0x33f/0xd00 [ 2034.959722] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2034.964808] ? debug_check_no_obj_freed+0x201/0x490 [ 2034.969814] ? device_list_add+0xdd0/0xdd0 [ 2034.974062] ? kfree+0x110/0x210 [ 2034.977411] ? btrfs_mount_root+0x107a/0x1830 [ 2034.981903] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2034.986467] btrfs_mount_root+0x9df/0x1830 [ 2034.990688] ? btrfs_decode_error+0x70/0x70 [ 2034.994992] ? __mutex_unlock_slowpath+0xea/0x610 [ 2034.999831] ? check_preemption_disabled+0x41/0x280 [ 2035.004863] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2035.009871] ? pcpu_alloc+0xc9/0x1190 [ 2035.013657] ? __lockdep_init_map+0x100/0x5a0 [ 2035.018140] mount_fs+0xa3/0x310 [ 2035.021493] vfs_kern_mount.part.0+0x68/0x470 [ 2035.025971] ? kfree+0x110/0x210 [ 2035.029320] vfs_kern_mount+0x3c/0x60 [ 2035.033104] btrfs_mount+0x23a/0xaa0 [ 2035.036801] ? btrfs_show_options+0xfd0/0xfd0 [ 2035.041283] ? __mutex_unlock_slowpath+0xea/0x610 [ 2035.046113] ? check_preemption_disabled+0x41/0x280 [ 2035.051113] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2035.056116] ? pcpu_alloc+0xc9/0x1190 [ 2035.059897] ? __lockdep_init_map+0x100/0x5a0 [ 2035.064782] mount_fs+0xa3/0x310 [ 2035.068310] vfs_kern_mount.part.0+0x68/0x470 [ 2035.072809] do_mount+0x115c/0x2f50 [ 2035.076434] ? cmp_ex_sort+0xc0/0xc0 [ 2035.080128] ? __do_page_fault+0x180/0xd60 [ 2035.084346] ? copy_mount_string+0x40/0x40 [ 2035.088565] ? memset+0x20/0x40 [ 2035.091836] ? copy_mount_options+0x26f/0x380 [ 2035.096321] ksys_mount+0xcf/0x130 [ 2035.099855] __x64_sys_mount+0xba/0x150 [ 2035.103821] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2035.108394] do_syscall_64+0xf9/0x620 [ 2035.112200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2035.117369] RIP: 0033:0x7ff1645fc7aa [ 2035.121067] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2035.139949] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2035.147726] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fc7aa [ 2035.154974] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff162f6ffe0 [ 2035.162221] RBP: 00007ff162f70020 R08: 00007ff162f70020 R09: 0000000020000000 08:15:48 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000008000b00", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0xa3ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2035.169656] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2035.176918] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 08:15:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000010000dc000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500002000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:48 executing program 0: perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='memory.events\x00') (async) r1 = perf_event_open(&(0x7f0000000f80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x1) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x7, &(0x7f0000000300)=@framed={{}, [@map_idx={0x18, 0x4, 0x5, 0x0, 0xb}, @alu={0x0, 0x0, 0x7, 0x8, 0x0, 0xc, 0xfffffffffffffff0}, @ldst={0x3, 0x0, 0x1, 0x4, 0x0, 0xfffffffffffffff0, 0xa69c8cbc487c090f}]}, &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x5}, 0x8, 0x10, &(0x7f0000000540)={0x1, 0x9, 0x0, 0x2}, 0x10}, 0x80) (async) perf_event_open(0x0, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800"/12], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) (async) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='cpuacct.stat\x00', 0x0, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000180)) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x0, 0x0, 0x0, &(0x7f0000000880)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x1c, '\x00', 0x0, 0x21, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x0, 0xb, 0x0, 0x3ff}, 0x10, 0x0, r4}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x19, 0x0, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000240)={0x2, 0x0, 0xfb20, 0x8}, 0x10}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={r2, 0x0, 0x84, 0x0, &(0x7f0000000340)="102049fa3c7cac8f324547431df0f818da10de9e11d56b400bc8362730129f2d69513fd01ad763e4a83507f9db1169a19a3bbf58998bb3d8c6da3096d3ffd7439ac7846b079e9f77481c5f6884ea0e6b933f126e2ada4724cb635ed7e783021bf8f849b23b01cc9e5b56cb15ef8fafca637d66b9f2bbebf75d9e5960f7a81089156d8d60", &(0x7f00000002c0), 0x7ff, 0x0, 0x41, 0x64, &(0x7f0000000400)="e6ca80f78e48db8b66be819a0d1ed562db92ee2e3e0c5f6564c05d2b278a0338eafa898174cce8f7a239f429f8dd178f3b94f604326696f02dc90fc2246679cc53", &(0x7f0000000600)="2d42879b4d3dc8630fc80193f86cfacf466d40d5c071862cbcb940d77a73ccd1f66f9e741d4c85f68fe91cdff4eefc1c805813c774a47dc37af6bf43cfc9e6453fe6d779a392eb8b91cc7d89015227d80c126a87a7c0d5c4f72e718adacb642d489be613", 0x1, 0x6}, 0x48) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r5, &(0x7f0000000200), 0x806000) (async) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000400)=ANY=[], 0x44) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000800)=@bpf_lsm={0x1d, 0xd, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0a000000300a00000000000000000000181b00008a36c1d16461378771878c653ac03e0dcfefc3f8cfa70f4707d1e20fb4815509fd560c1d76e8c80ba55752c8e5596aa93eecea52d909b1905b4315457af66fec8cfaea690cfc91f24f3194528aefdfd7cbdcce26562dfb2855f1", @ANYRES32=r5, @ANYBLOB="0000008efbdc2b8d", @ANYRES32=r3, @ANYBLOB="00000000000400009500000000000000181b0000", @ANYRES32, @ANYBLOB="000000000000000040260300070000002053ff7fe500000055281000fcffffff9500000000000000"], &(0x7f00000002c0)='GPL\x00', 0x80c8, 0xe4, &(0x7f0000000ac0)=""/228, 0x41000, 0x10, '\x00', 0x0, 0x1b, r0, 0x8, &(0x7f0000000480)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000007c0)={0x4, 0x9, 0x0, 0x2}, 0x10}, 0x80) 08:15:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 60) 08:15:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0xa4010000}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2035.317824] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:49 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000008001400", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:49 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000010002e2000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500002300ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="2400000018000100000000000000000080200000000400050000000008000300", @ANYRES32=0x0, @ANYBLOB="881bb11c4ccbff7223eaf70ee7e461c3243e0bb70f5d6ab962b7fd86fec7b56c9ab276947e694b9d06a78e3a96c52cc2a2ef6d69f7f76e855e"], 0x24}}, 0x0) 08:15:49 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000010002e5000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2035.633224] FAULT_INJECTION: forcing a failure. [ 2035.633224] name failslab, interval 1, probability 0, space 0, times 0 [ 2035.651514] CPU: 0 PID: 15366 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2035.659410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2035.667362] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2035.668755] Call Trace: [ 2035.668776] dump_stack+0x1fc/0x2ef 08:15:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="2400000018000100000000000000000080200000000400050000000008000300", @ANYRES32=0x0, @ANYBLOB="881bb11c4ccbff7223eaf70ee7e461c3243e0bb70f5d6ab962b7fd86fec7b56c9ab276947e694b9d06a78e3a96c52cc2a2ef6d69f7f76e855e"], 0x24}}, 0x0) [ 2035.668798] should_fail.cold+0xa/0xf [ 2035.668815] ? setup_fault_attr+0x200/0x200 [ 2035.668836] __should_failslab+0x115/0x180 [ 2035.695893] should_failslab+0x5/0x10 [ 2035.699689] __kmalloc+0x2ab/0x3c0 [ 2035.703219] ? device_list_add+0x85d/0xdd0 [ 2035.707441] device_list_add+0x85d/0xdd0 [ 2035.711486] ? btrfs_rm_dev_replace_free_srcdev+0x450/0x450 [ 2035.717187] btrfs_scan_one_device+0x33f/0xd00 [ 2035.721755] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2035.726847] ? debug_check_no_obj_freed+0x201/0x490 [ 2035.731866] ? device_list_add+0xdd0/0xdd0 [ 2035.736091] ? kfree+0x110/0x210 [ 2035.739439] ? btrfs_mount_root+0x107a/0x1830 [ 2035.743918] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2035.748484] btrfs_mount_root+0x9df/0x1830 [ 2035.752706] ? btrfs_decode_error+0x70/0x70 [ 2035.757010] ? __mutex_unlock_slowpath+0xea/0x610 [ 2035.761838] ? check_preemption_disabled+0x41/0x280 [ 2035.766839] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2035.771848] ? pcpu_alloc+0xc9/0x1190 [ 2035.775630] ? __lockdep_init_map+0x100/0x5a0 [ 2035.780107] mount_fs+0xa3/0x310 [ 2035.783457] vfs_kern_mount.part.0+0x68/0x470 [ 2035.787931] ? kfree+0x110/0x210 [ 2035.791298] vfs_kern_mount+0x3c/0x60 [ 2035.795089] btrfs_mount+0x23a/0xaa0 [ 2035.798794] ? btrfs_show_options+0xfd0/0xfd0 [ 2035.803284] ? __mutex_unlock_slowpath+0xea/0x610 [ 2035.808110] ? check_preemption_disabled+0x41/0x280 [ 2035.813114] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2035.818110] ? pcpu_alloc+0xc9/0x1190 [ 2035.821981] ? __lockdep_init_map+0x100/0x5a0 [ 2035.826458] mount_fs+0xa3/0x310 [ 2035.829812] vfs_kern_mount.part.0+0x68/0x470 [ 2035.834290] do_mount+0x115c/0x2f50 [ 2035.837909] ? cmp_ex_sort+0xc0/0xc0 [ 2035.841610] ? __do_page_fault+0x180/0xd60 [ 2035.845825] ? copy_mount_string+0x40/0x40 [ 2035.850059] ? memset+0x20/0x40 [ 2035.853349] ? copy_mount_options+0x26f/0x380 [ 2035.857846] ksys_mount+0xcf/0x130 [ 2035.861378] __x64_sys_mount+0xba/0x150 [ 2035.865351] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2035.869913] do_syscall_64+0xf9/0x620 [ 2035.873698] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2035.878866] RIP: 0033:0x7ff1645fc7aa [ 2035.882566] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2035.901453] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2035.909148] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fc7aa [ 2035.916426] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff162f6ffe0 [ 2035.923681] RBP: 00007ff162f70020 R08: 00007ff162f70020 R09: 0000000020000000 08:15:49 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000008003000", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0xa4ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2035.930936] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2035.938186] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 08:15:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 61) 08:15:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500003f00ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:49 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000008003300", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2036.007757] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="2400000018000100000000000000000080200000000400050000000008000300", @ANYRES32=0x0, @ANYBLOB="881bb11c4ccbff7223eaf70ee7e461c3243e0bb70f5d6ab962b7fd86fec7b56c9ab276947e694b9d06a78e3a96c52cc2a2ef6d69f7f76e855e"], 0x24}}, 0x0) 08:15:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0xa548ff6c}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:49 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x4) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001041, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xa}, 0x1a085}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, 0x0, 0x40) r2 = dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x8010) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000180)={0x27, 0xfef, 0x2, 0x2, 0x40, 0x7, "5c22671b1d6eafa651a5349f9aefcf9701b1ef07a812fecbd999ea30b24f20ff0e383e8a7440d3b8aef44e2959f6def2e27c911031596a6d0ef4b190c42cea", 0x1c}, 0x60) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000040)={0xf18}) keyctl$set_reqkey_keyring(0xe, 0x1) r4 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r4, 0x2e, 0xce, 0x53c132ef) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) r5 = socket(0x1, 0x3, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="900000001000010427bd7000fddbdf2500000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000680012800e00010069703665727370616e00000054000280080015000526080006000f00020000000400120008000c000920000008000d008100000008001500e8bd090014000600fe88000000000000000000000000000106000f000600000005000800a900000008000300", @ANYRES32=r6, @ANYBLOB="3be172be8edd5c52a93e5943cd0d75613ac8fc944f56aa10f4d5ac2bd36980eb91b3d0fa30258c5386d925ff4ac8fd9127379884230c47dfa930938f97730b999ac19ac55dc3d9c12268cb26a8af44800c0792bf4ae9d802"], 0x90}}, 0x20009000) 08:15:49 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000010003e7000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0xa5ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2036.177244] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500004000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:49 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000008006000", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2036.237997] FAULT_INJECTION: forcing a failure. [ 2036.237997] name failslab, interval 1, probability 0, space 0, times 0 [ 2036.271003] CPU: 1 PID: 15407 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2036.278913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2036.288358] Call Trace: [ 2036.290966] dump_stack+0x1fc/0x2ef [ 2036.294607] should_fail.cold+0xa/0xf [ 2036.298416] ? setup_fault_attr+0x200/0x200 [ 2036.302751] ? __lock_acquire+0x6de/0x3ff0 [ 2036.306985] __should_failslab+0x115/0x180 [ 2036.311208] should_failslab+0x5/0x10 [ 2036.314991] kmem_cache_alloc+0x3f/0x370 [ 2036.319035] ? mempool_alloc+0x350/0x350 [ 2036.323087] mempool_alloc+0x146/0x350 [ 2036.326976] ? lock_acquire+0x170/0x3c0 [ 2036.330955] ? mempool_resize+0x790/0x790 [ 2036.335095] ? check_preemption_disabled+0x41/0x280 [ 2036.340122] ? alloc_buffer_head+0x20/0x130 [ 2036.344459] bio_alloc_bioset+0x389/0x5e0 [ 2036.348689] ? alloc_page_buffers+0x2da/0x5c0 [ 2036.353168] ? bvec_alloc+0x2f0/0x2f0 [ 2036.356959] ? do_raw_spin_lock+0xcb/0x220 [ 2036.361450] ? create_empty_buffers+0x4e7/0x760 [ 2036.366117] submit_bh_wbc+0x141/0x760 [ 2036.369990] block_read_full_page+0x7cf/0xd10 [ 2036.374485] ? block_llseek+0xc0/0xc0 [ 2036.378271] ? __bread_gfp+0x300/0x300 [ 2036.382143] ? add_to_page_cache_locked+0x40/0x40 [ 2036.386975] do_read_cache_page+0x533/0x1170 [ 2036.391372] ? blkdev_writepages+0x20/0x20 [ 2036.395594] btrfs_scan_one_device+0x195/0xd00 [ 2036.400190] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 2036.405289] ? debug_check_no_obj_freed+0x201/0x490 [ 2036.410299] ? device_list_add+0xdd0/0xdd0 [ 2036.414534] ? kfree+0x110/0x210 [ 2036.417893] ? btrfs_mount_root+0x107a/0x1830 [ 2036.422393] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2036.426975] btrfs_mount_root+0x9df/0x1830 [ 2036.431213] ? btrfs_decode_error+0x70/0x70 [ 2036.435691] ? __mutex_unlock_slowpath+0xea/0x610 [ 2036.440526] ? check_preemption_disabled+0x41/0x280 [ 2036.445539] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2036.450548] ? pcpu_alloc+0xc9/0x1190 [ 2036.454354] ? __lockdep_init_map+0x100/0x5a0 [ 2036.458855] mount_fs+0xa3/0x310 [ 2036.462245] vfs_kern_mount.part.0+0x68/0x470 [ 2036.466728] ? kfree+0x110/0x210 [ 2036.470097] vfs_kern_mount+0x3c/0x60 [ 2036.473895] btrfs_mount+0x23a/0xaa0 [ 2036.477610] ? btrfs_show_options+0xfd0/0xfd0 [ 2036.482111] ? __mutex_unlock_slowpath+0xea/0x610 [ 2036.486960] ? check_preemption_disabled+0x41/0x280 [ 2036.492062] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2036.497070] ? pcpu_alloc+0xc9/0x1190 [ 2036.500867] ? __lockdep_init_map+0x100/0x5a0 [ 2036.505369] mount_fs+0xa3/0x310 [ 2036.508727] vfs_kern_mount.part.0+0x68/0x470 [ 2036.513206] do_mount+0x115c/0x2f50 [ 2036.516817] ? cmp_ex_sort+0xc0/0xc0 [ 2036.520521] ? __do_page_fault+0x180/0xd60 [ 2036.524760] ? copy_mount_string+0x40/0x40 [ 2036.528999] ? memset+0x20/0x40 [ 2036.532281] ? copy_mount_options+0x26f/0x380 [ 2036.536812] ksys_mount+0xcf/0x130 [ 2036.540362] __x64_sys_mount+0xba/0x150 [ 2036.544321] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2036.548888] do_syscall_64+0xf9/0x620 [ 2036.552694] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2036.557874] RIP: 0033:0x7ff1645fc7aa [ 2036.561580] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2036.580471] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2036.588170] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fc7aa [ 2036.595426] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff162f6ffe0 [ 2036.602678] RBP: 00007ff162f70020 R08: 00007ff162f70020 R09: 0000000020000000 [ 2036.609932] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2036.617186] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 [ 2036.652761] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (15412) 08:15:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) (async) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x4) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001041, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xa}, 0x1a085}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, 0x0, 0x40) (async, rerun: 32) r2 = dup3(r1, r0, 0x0) (rerun: 32) sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x8010) (async) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) (async) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000180)={0x27, 0xfef, 0x2, 0x2, 0x40, 0x7, "5c22671b1d6eafa651a5349f9aefcf9701b1ef07a812fecbd999ea30b24f20ff0e383e8a7440d3b8aef44e2959f6def2e27c911031596a6d0ef4b190c42cea", 0x1c}, 0x60) (rerun: 64) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000040)={0xf18}) (async, rerun: 64) keyctl$set_reqkey_keyring(0xe, 0x1) (async, rerun: 64) r4 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r4, 0x2e, 0xce, 0x53c132ef) (async) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) (async, rerun: 32) r5 = socket(0x1, 0x3, 0x0) (rerun: 32) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="900000001000010427bd7000fddbdf2500000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000680012800e00010069703665727370616e00000054000280080015000526080006000f00020000000400120008000c000920000008000d008100000008001500e8bd090014000600fe88000000000000000000000000000106000f000600000005000800a900000008000300", @ANYRES32=r6, @ANYBLOB="3be172be8edd5c52a93e5943cd0d75613ac8fc944f56aa10f4d5ac2bd36980eb91b3d0fa30258c5386d925ff4ac8fd9127379884230c47dfa930938f97730b999ac19ac55dc3d9c12268cb26a8af44800c0792bf4ae9d802"], 0x90}}, 0x20009000) 08:15:50 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000010002e9000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 62) 08:15:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500004800ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0xa6ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:50 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000008000200", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2036.812335] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2036.908807] FAULT_INJECTION: forcing a failure. [ 2036.908807] name failslab, interval 1, probability 0, space 0, times 0 [ 2036.936303] CPU: 0 PID: 15452 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2036.944203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2036.953557] Call Trace: [ 2036.956150] dump_stack+0x1fc/0x2ef [ 2036.959785] should_fail.cold+0xa/0xf [ 2036.963594] ? setup_fault_attr+0x200/0x200 [ 2036.967919] ? lock_acquire+0x170/0x3c0 [ 2036.971914] __should_failslab+0x115/0x180 [ 2036.976161] should_failslab+0x5/0x10 [ 2036.979966] kmem_cache_alloc+0x277/0x370 [ 2036.984125] getname_kernel+0x4e/0x370 [ 2036.988018] kern_path+0x1b/0x40 [ 2036.991390] lookup_bdev+0xfc/0x220 [ 2036.995023] ? bd_acquire+0x440/0x440 [ 2036.998839] blkdev_get_by_path+0x1b/0xd0 [ 2037.002994] btrfs_get_bdev_and_sb+0x2f/0x2f0 [ 2037.007496] open_fs_devices+0x5a3/0xa50 [ 2037.011571] ? find_fsid+0xb0/0xb0 [ 2037.015127] btrfs_open_devices+0x114/0x150 [ 2037.019461] btrfs_mount_root+0xa60/0x1830 [ 2037.023712] ? btrfs_decode_error+0x70/0x70 [ 2037.028038] ? __mutex_unlock_slowpath+0xea/0x610 [ 2037.032895] ? check_preemption_disabled+0x41/0x280 [ 2037.037979] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2037.042996] ? pcpu_alloc+0xc9/0x1190 [ 2037.046799] ? __lockdep_init_map+0x100/0x5a0 [ 2037.051304] mount_fs+0xa3/0x310 [ 2037.054682] vfs_kern_mount.part.0+0x68/0x470 [ 2037.059181] ? kfree+0x110/0x210 [ 2037.062556] vfs_kern_mount+0x3c/0x60 [ 2037.066373] btrfs_mount+0x23a/0xaa0 [ 2037.070100] ? btrfs_show_options+0xfd0/0xfd0 [ 2037.074597] ? __mutex_unlock_slowpath+0xea/0x610 [ 2037.079453] ? check_preemption_disabled+0x41/0x280 [ 2037.084482] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2037.089504] ? pcpu_alloc+0xc9/0x1190 [ 2037.093319] ? __lockdep_init_map+0x100/0x5a0 [ 2037.097824] mount_fs+0xa3/0x310 [ 2037.101205] vfs_kern_mount.part.0+0x68/0x470 [ 2037.105707] do_mount+0x115c/0x2f50 [ 2037.109344] ? cmp_ex_sort+0xc0/0xc0 [ 2037.113064] ? __do_page_fault+0x180/0xd60 [ 2037.117306] ? copy_mount_string+0x40/0x40 [ 2037.121554] ? memset+0x20/0x40 [ 2037.124828] ? copy_mount_options+0x26f/0x380 [ 2037.129308] ksys_mount+0xcf/0x130 [ 2037.132859] __x64_sys_mount+0xba/0x150 [ 2037.136820] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2037.141395] do_syscall_64+0xf9/0x620 [ 2037.145287] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2037.150465] RIP: 0033:0x7ff1645fc7aa [ 2037.154172] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2037.173151] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2037.180852] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fc7aa [ 2037.188117] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff162f6ffe0 [ 2037.195472] RBP: 00007ff162f70020 R08: 00007ff162f70020 R09: 0000000020000000 08:15:50 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200000100000000000100c0ed000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2037.202731] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2037.210442] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 [ 2037.220093] BTRFS warning (device ): duplicate device /dev/loop4 devid 0 generation 0 scanned by syz-executor.4 (15460) 08:15:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 63) 08:15:50 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) (async, rerun: 32) mkdir(&(0x7f0000000000)='./file0\x00', 0x4) (async, rerun: 32) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001041, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xa}, 0x1a085}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, 0x0, 0x40) (rerun: 64) r2 = dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x8010) (async) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) (async) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) (async) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000180)={0x27, 0xfef, 0x2, 0x2, 0x40, 0x7, "5c22671b1d6eafa651a5349f9aefcf9701b1ef07a812fecbd999ea30b24f20ff0e383e8a7440d3b8aef44e2959f6def2e27c911031596a6d0ef4b190c42cea", 0x1c}, 0x60) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000040)={0xf18}) (async, rerun: 32) keyctl$set_reqkey_keyring(0xe, 0x1) (async, rerun: 32) r4 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r4, 0x2e, 0xce, 0x53c132ef) (async, rerun: 64) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) (async, rerun: 64) r5 = socket(0x1, 0x3, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="900000001000010427bd7000fddbdf2500000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000680012800e00010069703665727370616e00000054000280080015000526080006000f00020000000400120008000c000920000008000d008100000008001500e8bd090014000600fe88000000000000000000000000000106000f000600000005000800a900000008000300", @ANYRES32=r6, @ANYBLOB="3be172be8edd5c52a93e5943cd0d75613ac8fc944f56aa10f4d5ac2bd36980eb91b3d0fa30258c5386d925ff4ac8fd9127379884230c47dfa930938f97730b999ac19ac55dc3d9c12268cb26a8af44800c0792bf4ae9d802"], 0x90}}, 0x20009000) 08:15:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500004c00ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:50 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000008000400", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0xa7ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2037.314801] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000010003fb000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2037.399532] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 08:15:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500006800ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2037.485108] FAULT_INJECTION: forcing a failure. [ 2037.485108] name failslab, interval 1, probability 0, space 0, times 0 [ 2037.496411] CPU: 1 PID: 15492 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2037.504296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2037.513645] Call Trace: [ 2037.516243] dump_stack+0x1fc/0x2ef [ 2037.519970] should_fail.cold+0xa/0xf [ 2037.523780] ? setup_fault_attr+0x200/0x200 [ 2037.528110] ? __lock_acquire+0x6de/0x3ff0 [ 2037.532366] __should_failslab+0x115/0x180 [ 2037.536613] should_failslab+0x5/0x10 [ 2037.540420] kmem_cache_alloc+0x3f/0x370 [ 2037.544630] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 2037.549338] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2037.550261] __radix_tree_create+0x314/0x540 [ 2037.563348] page_cache_tree_insert+0xac/0x3f0 [ 2037.567953] ? file_check_and_advance_wb_err+0x3a0/0x3a0 [ 2037.573418] ? lock_acquire+0x170/0x3c0 [ 2037.577485] ? __add_to_page_cache_locked+0x45e/0xb60 [ 2037.582688] __add_to_page_cache_locked+0x46e/0xb60 [ 2037.587804] ? page_cache_tree_insert+0x3f0/0x3f0 [ 2037.592664] add_to_page_cache_lru+0x16a/0x680 [ 2037.597255] ? add_to_page_cache_locked+0x40/0x40 [ 2037.602112] pagecache_get_page+0x478/0xd50 [ 2037.606447] __getblk_slow+0x216/0x9e0 [ 2037.610354] __bread_gfp+0x218/0x300 [ 2037.614076] btrfs_read_dev_super+0x8a/0x230 [ 2037.618488] btrfs_get_bdev_and_sb+0xf6/0x2f0 [ 2037.620886] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2037.622986] open_fs_devices+0x5a3/0xa50 [ 2037.623007] ? find_fsid+0xb0/0xb0 [ 2037.623033] btrfs_open_devices+0x114/0x150 [ 2037.623051] btrfs_mount_root+0xa60/0x1830 [ 2037.623077] ? btrfs_decode_error+0x70/0x70 [ 2037.652052] ? __mutex_unlock_slowpath+0xea/0x610 [ 2037.656916] ? check_preemption_disabled+0x41/0x280 [ 2037.661948] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2037.667006] ? pcpu_alloc+0xc9/0x1190 [ 2037.670819] ? __lockdep_init_map+0x100/0x5a0 [ 2037.675322] mount_fs+0xa3/0x310 [ 2037.678707] vfs_kern_mount.part.0+0x68/0x470 [ 2037.683248] ? kfree+0x110/0x210 [ 2037.686631] vfs_kern_mount+0x3c/0x60 [ 2037.690441] btrfs_mount+0x23a/0xaa0 [ 2037.694168] ? btrfs_show_options+0xfd0/0xfd0 [ 2037.698675] ? __mutex_unlock_slowpath+0xea/0x610 [ 2037.703527] ? check_preemption_disabled+0x41/0x280 [ 2037.708555] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2037.713580] ? pcpu_alloc+0xc9/0x1190 [ 2037.717389] ? __lockdep_init_map+0x100/0x5a0 [ 2037.721902] mount_fs+0xa3/0x310 [ 2037.725278] vfs_kern_mount.part.0+0x68/0x470 [ 2037.729784] do_mount+0x115c/0x2f50 [ 2037.733423] ? cmp_ex_sort+0xc0/0xc0 [ 2037.737177] ? __do_page_fault+0x180/0xd60 [ 2037.741429] ? copy_mount_string+0x40/0x40 [ 2037.745679] ? memset+0x20/0x40 [ 2037.748958] ? copy_mount_options+0x26f/0x380 [ 2037.753456] ksys_mount+0xcf/0x130 [ 2037.756996] __x64_sys_mount+0xba/0x150 [ 2037.760974] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2037.765567] do_syscall_64+0xf9/0x620 [ 2037.769376] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2037.774567] RIP: 0033:0x7ff1645fc7aa [ 2037.778293] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2037.797199] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2037.804998] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fc7aa [ 2037.812260] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff162f6ffe0 [ 2037.819531] RBP: 00007ff162f70020 R08: 00007ff162f70020 R09: 0000000020000000 [ 2037.826792] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 08:15:51 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000008000600", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0xa8ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:51 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000008000800", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0xa9ad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:51 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000008000900", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2037.834053] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 08:15:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) (fail_nth: 64) 08:15:51 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000008000a00", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) 08:15:51 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005640), 0x101000, 0x0) fstat(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000080)={0x8001, 0xa8, {}, {r1}, 0x4, 0x6}) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@huge_advise, 0x22}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@smackfsdef={'smackfsdef', 0x3d, 'huge=advise'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@fowner_lt={'fowner<', r2}}]}) 08:15:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500006c00ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc20000010000000000007f0000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) 08:15:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0xaaad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000fff000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2038.079253] tmpfs: Bad value 'advise"fscontext=system_u' for mount option 'huge' [ 2038.118604] FAULT_INJECTION: forcing a failure. 08:15:51 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000ffffff8c0000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000010010000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000740)) [ 2038.118604] name failslab, interval 1, probability 0, space 0, times 0 [ 2038.147132] CPU: 0 PID: 15552 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2038.155470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2038.164828] Call Trace: [ 2038.167858] dump_stack+0x1fc/0x2ef [ 2038.171498] should_fail.cold+0xa/0xf [ 2038.175310] ? setup_fault_attr+0x200/0x200 08:15:51 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005640), 0x101000, 0x0) fstat(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000080)={0x8001, 0xa8, {}, {r1}, 0x4, 0x6}) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@huge_advise, 0x22}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@smackfsdef={'smackfsdef', 0x3d, 'huge=advise'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@fowner_lt={'fowner<', r2}}]}) [ 2038.179637] ? lock_acquire+0x170/0x3c0 [ 2038.183625] __should_failslab+0x115/0x180 [ 2038.187875] should_failslab+0x5/0x10 [ 2038.191679] __kmalloc+0x2ab/0x3c0 [ 2038.195219] ? bio_alloc_bioset+0x3d7/0x5e0 [ 2038.199544] bio_alloc_bioset+0x3d7/0x5e0 [ 2038.203702] ? bvec_alloc+0x2f0/0x2f0 [ 2038.207513] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2038.212537] ? kmem_cache_alloc_trace+0x323/0x380 [ 2038.217390] btrfs_alloc_device+0xcd/0x670 [ 2038.221639] ? btrfs_finish_sprout+0x6c0/0x6c0 [ 2038.226218] ? blkdev_put+0x85/0x520 [ 2038.229931] close_fs_devices.part.0+0x263/0x8e0 [ 2038.234685] btrfs_close_devices+0x95/0x1f0 [ 2038.238992] btrfs_mount_root+0x10b9/0x1830 [ 2038.243298] ? btrfs_decode_error+0x70/0x70 [ 2038.247618] ? __mutex_unlock_slowpath+0xea/0x610 [ 2038.252465] ? check_preemption_disabled+0x41/0x280 [ 2038.257478] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2038.262494] ? pcpu_alloc+0xc9/0x1190 [ 2038.266297] ? __lockdep_init_map+0x100/0x5a0 [ 2038.270794] mount_fs+0xa3/0x310 [ 2038.274157] vfs_kern_mount.part.0+0x68/0x470 [ 2038.278718] ? kfree+0x110/0x210 [ 2038.282069] vfs_kern_mount+0x3c/0x60 [ 2038.285859] btrfs_mount+0x23a/0xaa0 [ 2038.289632] ? btrfs_show_options+0xfd0/0xfd0 [ 2038.294124] ? __mutex_unlock_slowpath+0xea/0x610 [ 2038.298953] ? check_preemption_disabled+0x41/0x280 [ 2038.303975] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2038.308978] ? pcpu_alloc+0xc9/0x1190 [ 2038.312770] ? __lockdep_init_map+0x100/0x5a0 [ 2038.317254] mount_fs+0xa3/0x310 [ 2038.320609] vfs_kern_mount.part.0+0x68/0x470 [ 2038.325087] do_mount+0x115c/0x2f50 [ 2038.328699] ? cmp_ex_sort+0xc0/0xc0 [ 2038.332412] ? __do_page_fault+0x180/0xd60 [ 2038.336636] ? copy_mount_string+0x40/0x40 [ 2038.340852] ? memset+0x20/0x40 [ 2038.344109] ? copy_mount_options+0x26f/0x380 [ 2038.348585] ksys_mount+0xcf/0x130 [ 2038.352120] __x64_sys_mount+0xba/0x150 [ 2038.356086] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2038.360652] do_syscall_64+0xf9/0x620 [ 2038.364443] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2038.369620] RIP: 0033:0x7ff1645fc7aa [ 2038.373335] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2038.392232] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2038.399946] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fc7aa [ 2038.407212] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff162f6ffe0 [ 2038.414462] RBP: 00007ff162f70020 R08: 00007ff162f70020 R09: 0000000020000000 [ 2038.421724] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 08:15:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0xabad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) [ 2038.428994] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 08:15:52 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x40, 0x0, 0x20, 0x0, 0x0, 0xfffffffffffffffe, 0x40008, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x73c, 0x0, 0x2}, 0x0, 0x0, r1, 0x0) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000300)='*]+\x00'}, 0x30) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='*]+\x00') r2 = signalfd(0xffffffffffffffff, &(0x7f0000000180)={[0xffffffffffffffff]}, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="8c00000010000304000000020000000000dff400", @ANYRES32=0x0, @ANYBLOB="adffa888000000005000128009000100766c616e000000004000028006000100000000000c0002000e0000000a000000280004800c00010000010000000000090c00010007000000010001000c000100080000000000000008000b00", @ANYRES32=r5, @ANYRES32, @ANYBLOB="0a000100aa"], 0x8c}, 0x1, 0x0, 0x0, 0x4001050}, 0x40408c4) sendmsg$tipc(r4, &(0x7f0000000500)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x1, {0x42, 0x0, 0x3}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000300)="b48c635d6b14487d9ee334971a33f2fd13eda99ffa69a228e1ff2dbe8db60cb00c4140d47dc733e7182f4faf17ad19266989e4edd314a79f679883c2acd9432c5cc38843a5c6fb8b9066ddf8e3d9d34523976cb8f76028020e33c2623cc84f9eff927e7a449be13b476f6802abd73a72abadfc45868e42ccba071c702746a643b899abdd40744e49fcabbefa8f380128c356b0e53f5b28af4e12b1bcdee210206e05915e62c73afa08a15a841e59b70375a09625f221558de5afa7bb581b740ae3b076aa875c55cd9dab634ff4229af023b713e95aff888c783b8e4ca5f8ed2afe92181854d42ae6763d86de535802fee7", 0xf1}, {&(0x7f0000000040)="c59c6a926f8efe7b353641", 0xb}, {&(0x7f0000000080)="0eb77ca75a67483a0daf292bb20d05778569dfa49189d69da37575501fea6b8bf502ac5ef5fbacb91400c91136e8e23c824090f3a6536a3062326b155368d191b123257df919c02058d5abc0eaad28cbbee1a9404a33a214cb80d17c43c8f048d077fb551a01d6a97499c4f3ca3c86dd118928f23bf0", 0x76}, {&(0x7f0000000200)="2c47bfff291079062853864611e0e54bf479b18d98c0af960e2296709ee7108bb3d808a590dfa8b15e52f5f4caed4d3d9302bf295132226f24797525fdec55105c6a174a162e28d7ffe9da61cbe8dcf5b571468e7735a73a0dc649f291163a57aa6dc0f729021ea49c25facd45a4695d", 0x70}], 0x4, 0x0, 0x0, 0x8000}, 0x4000000) [ 2038.473266] ------------[ cut here ]------------ [ 2038.478047] kernel BUG at fs/btrfs/volumes.c:1061! [ 2038.487403] ieee802154 phy0 wpan0: encryption failed: -22 [ 2038.493032] ieee802154 phy1 wpan1: encryption failed: -22 [ 2038.524514] tmpfs: Bad value 'advise"fscontext=system_u' for mount option 'huge' [ 2038.564400] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 2038.569785] CPU: 1 PID: 15552 Comm: syz-executor.3 Not tainted 4.19.211-syzkaller #0 [ 2038.577921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/22/2022 [ 2038.587293] RIP: 0010:close_fs_devices.part.0+0x6b0/0x8e0 [ 2038.592825] Code: 03 0f 8e 27 01 00 00 48 8b 44 24 20 c7 80 10 01 00 00 00 00 00 00 48 83 c4 48 5b 5d 41 5c 41 5d 41 5e 41 5f c3 e8 70 ad 71 fe <0f> 0b e8 69 ad 71 fe 0f 0b e8 22 8d a7 fe e9 17 fd ff ff 48 8b 7c [ 2038.611723] RSP: 0018:ffff88801da2f838 EFLAGS: 00010246 [ 2038.617091] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc90009e81000 08:15:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newlink={0x48, 0x10, 0x46d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0xacad0500}, @IFLA_BR_NF_CALL_IPTABLES={0x5}]}}}]}, 0x48}}, 0x0) 08:15:52 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000005640), 0x101000, 0x0) fstat(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000080)={0x8001, 0xa8, {}, {r1}, 0x4, 0x6}) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@huge_advise, 0x22}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@smackfsdef={'smackfsdef', 0x3d, 'huge=advise'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@fowner_lt={'fowner<', r2}}]}) [ 2038.624363] RDX: 0000000000040000 RSI: ffffffff82f0d800 RDI: 0000000000000007 [ 2038.631641] RBP: ffff88808ff428c0 R08: 0000000000000000 R09: fffffffffffff000 [ 2038.638924] R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000000 [ 2038.638992] tmpfs: Bad value 'advise"fscontext=system_u' for mount option 'huge' [ 2038.646194] R13: fffffffffffffff4 R14: dffffc0000000000 R15: ffff888030202900 [ 2038.646204] FS: 00007ff162f70700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 2038.646211] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2038.646219] CR2: 00007fc83f3f5000 CR3: 00000000944b9000 CR4: 00000000003406e0 [ 2038.646229] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2038.646235] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2038.646240] Call Trace: [ 2038.646299] btrfs_close_devices+0x95/0x1f0 [ 2038.646317] btrfs_mount_root+0x10b9/0x1830 [ 2038.708064] ? btrfs_decode_error+0x70/0x70 [ 2038.712383] ? __mutex_unlock_slowpath+0xea/0x610 [ 2038.717220] ? check_preemption_disabled+0x41/0x280 [ 2038.722232] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2038.727246] ? pcpu_alloc+0xc9/0x1190 [ 2038.731124] ? __lockdep_init_map+0x100/0x5a0 [ 2038.735604] mount_fs+0xa3/0x310 [ 2038.738961] vfs_kern_mount.part.0+0x68/0x470 [ 2038.743440] ? kfree+0x110/0x210 [ 2038.746806] vfs_kern_mount+0x3c/0x60 [ 2038.750600] btrfs_mount+0x23a/0xaa0 [ 2038.754302] ? btrfs_show_options+0xfd0/0xfd0 [ 2038.758784] ? __mutex_unlock_slowpath+0xea/0x610 [ 2038.763618] ? check_preemption_disabled+0x41/0x280 [ 2038.768624] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 2038.773637] ? pcpu_alloc+0xc9/0x1190 [ 2038.777435] ? __lockdep_init_map+0x100/0x5a0 [ 2038.781939] mount_fs+0xa3/0x310 [ 2038.785314] vfs_kern_mount.part.0+0x68/0x470 [ 2038.789917] do_mount+0x115c/0x2f50 [ 2038.793530] ? cmp_ex_sort+0xc0/0xc0 [ 2038.797241] ? __do_page_fault+0x180/0xd60 [ 2038.801518] ? copy_mount_string+0x40/0x40 [ 2038.805747] ? memset+0x20/0x40 [ 2038.809012] ? copy_mount_options+0x26f/0x380 [ 2038.813508] ksys_mount+0xcf/0x130 [ 2038.817057] __x64_sys_mount+0xba/0x150 [ 2038.821028] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2038.825600] do_syscall_64+0xf9/0x620 [ 2038.829395] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2038.834600] RIP: 0033:0x7ff1645fc7aa [ 2038.838343] Code: 48 c7 c2 b8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2038.857234] RSP: 002b:00007ff162f6ff88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2038.864922] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00007ff1645fc7aa [ 2038.872348] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007ff162f6ffe0 [ 2038.879600] RBP: 00007ff162f70020 R08: 00007ff162f70020 R09: 0000000020000000 [ 2038.886849] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2038.894102] R13: 0000000020000100 R14: 00007ff162f6ffe0 R15: 0000000020000740 [ 2038.901370] Modules linked in: [ 2038.907743] ---[ end trace c0b3b6df31fd048a ]--- [ 2038.913094] RIP: 0010:close_fs_devices.part.0+0x6b0/0x8e0 [ 2038.919107] Code: 03 0f 8e 27 01 00 00 48 8b 44 24 20 c7 80 10 01 00 00 00 00 00 00 48 83 c4 48 5b 5d 41 5c 41 5d 41 5e 41 5f c3 e8 70 ad 71 fe <0f> 0b e8 69 ad 71 fe 0f 0b e8 22 8d a7 fe e9 17 fd ff ff 48 8b 7c [ 2038.938710] RSP: 0018:ffff88801da2f838 EFLAGS: 00010246 [ 2038.947949] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc90009e81000 [ 2038.962913] RDX: 0000000000040000 RSI: ffffffff82f0d800 RDI: 0000000000000007 [ 2038.970329] RBP: ffff88808ff428c0 R08: 0000000000000000 R09: fffffffffffff000 [ 2038.977642] R10: 0000000000000007 R11: 0000000000000000 R12: 0000000000000000 [ 2038.986442] R13: fffffffffffffff4 R14: dffffc0000000000 R15: ffff888030202900 [ 2038.994410] FS: 00007ff162f70700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 2039.003507] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2039.010345] CR2: 0000000020000080 CR3: 00000000944b9000 CR4: 00000000003406e0 [ 2039.017650] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2039.025846] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2039.033827] Kernel panic - not syncing: Fatal exception [ 2039.039442] Kernel Offset: disabled [ 2039.043058] Rebooting in 86400 seconds..