10, 0x0, 0x0, 0x200200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x10) r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r6, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffea7) ioctl$KVM_REGISTER_COALESCED_MMIO(r6, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) pipe2$9p(&(0x7f0000000240), 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x7fffffffefff, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r7, 0xae9a) ioctl$KVM_RUN(r7, 0xae80, 0x0) 17:18:29 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:18:29 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, 0x0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) [ 308.139893] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18144 comm=syz-executor.5 [ 308.160115] net_ratelimit: 20 callbacks suppressed [ 308.160120] protocol 88fb is buggy, dev hsr_slave_0 [ 308.170219] protocol 88fb is buggy, dev hsr_slave_1 17:18:29 executing program 2: ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='smaps_rollup\x00') pipe2$9p(0x0, 0xc8000) write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x0) write$FUSE_BMAP(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, 0x8}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)) r2 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="0a00000008b59c09fb4c590021849265276dfb8bac9459216394287e7e383c46fe79cf7f64efc464f3dfb2045d717c2df425f037fc9b8b42cc035d34abe22124a339a60402c59b0583e2e918099743dadd1debff41268f7124fec1028ef918dad376440f3e729f3cfb6d45679f960b8c430f648789bbc34bbf82373a7fc5f25bca58365809de31d89df5ce"], 0x0) ioctl$TIOCSISO7816(r2, 0xc0285443, &(0x7f0000000180)={0x6, 0x100, 0x8, 0x2, 0x20}) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="850000000700000025000000040401009500000000000000"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="850005000700000025000000040401009500000000000000f740935e6a22817b90601fd66c85cd0f675c2bd11f482b794b0031fa06ce2701f307f4d720657bca81"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x40}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r5) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x20000840) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200200}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x0, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x10) r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r6, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffea7) ioctl$KVM_REGISTER_COALESCED_MMIO(r6, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) pipe2$9p(&(0x7f0000000240), 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r7, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x7fffffffefff, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r7, 0xae9a) ioctl$KVM_RUN(r7, 0xae80, 0x0) 17:18:29 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:18:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf220e206f47803371be2", 0xc7, 0x10000}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000100)=0x778, 0x4) 17:18:29 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) [ 308.466602] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=18171 comm=syz-executor.2 [ 308.880223] protocol 88fb is buggy, dev hsr_slave_0 [ 308.885327] protocol 88fb is buggy, dev hsr_slave_1 [ 308.890457] protocol 88fb is buggy, dev hsr_slave_0 [ 308.895528] protocol 88fb is buggy, dev hsr_slave_1 17:18:30 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r5, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:30 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:18:30 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can={0x1d, 0x0, 0x4}, 0x10, &(0x7f00000000c0), 0x38}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x800000000000000, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 17:18:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf220e206f47803371be2", 0xc7, 0x10000}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000100)=0x778, 0x4) 17:18:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$sg(0x0, 0x0, 0x0) dup2(r0, r1) 17:18:30 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x4}, 0x10) write(r0, &(0x7f00000000c0)="240000001e005f0214fffffffffffff8070000000000000001000000080009000d000000", 0x24) 17:18:30 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:30 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:18:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x807) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000100)=0x807) r2 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x807) fremovexattr(0xffffffffffffffff, 0x0) [ 309.040129] protocol 88fb is buggy, dev hsr_slave_0 [ 309.045239] protocol 88fb is buggy, dev hsr_slave_1 17:18:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf220e206f47803371be2", 0xc7, 0x10000}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000100)=0x778, 0x4) 17:18:30 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, 0x124) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000640)=""/148, 0x94}], 0x100000000000026e, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x18d, 0x6c00) pipe(0x0) [ 309.120099] protocol 88fb is buggy, dev hsr_slave_0 [ 309.125252] protocol 88fb is buggy, dev hsr_slave_1 17:18:31 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r4, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:31 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:31 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:18:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x2000000000000002, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') ustat(0x0, &(0x7f00000005c0)) 17:18:31 executing program 2: syz_genetlink_get_family_id$tipc2(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 17:18:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf220e206f47803371be231db", 0xc9, 0x10000}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000100)=0x778, 0x4) 17:18:31 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x20101, 0x0) ioctl$int_in(r0, 0x80000080045010, &(0x7f0000000000)) 17:18:31 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:31 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 17:18:31 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/enforce\x00', 0x0, 0x0) read(r2, 0x0, 0x0) 17:18:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf220e206f47803371be231db", 0xc9, 0x10000}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000100)=0x778, 0x4) 17:18:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000003c0)={0xe0003}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000002c0)=[@text64={0x40, &(0x7f0000000300)="640f01c366b8ad008ed00f08c4417b2c020f3548b800000100000000000f23c00f21f835010008000f23f80fc778fc0f350fd8060f30", 0x36}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 17:18:32 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:32 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x7, 0x209e20, 0x8000000001}, 0x414) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0xae5c6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77f7fb, 0x0, 0x82e700, 0x0, 0x0, [0xffffffffa0018000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, 0x2c) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x1, 0x0, 0xfc, 0x15921c4f}, {0x7fff, 0x5, 0x98, 0xfffffffa}]}) 17:18:32 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000340)={0x9, 0x8d}, 0x0) open(0x0, 0x4842, 0x0) sched_setattr(0x0, &(0x7f0000000200)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x200, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x7, 0x9a, 0xd94}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r4 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8000fffffffe) 17:18:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf220e206f47803371be231db", 0xc9, 0x10000}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000100)=0x778, 0x4) 17:18:32 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) r4 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r4, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) ioctl$TCSETA(r0, 0x5404, &(0x7f0000000000)) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x38) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000180)={0xb5, 0x1ff, 0x81, 0x95, 0x6, 0x2, 0x0, 0x1, 0x2, 0x1}) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10010, 0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) ioprio_set$pid(0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x0, &(0x7f0000000040), 0x0, 0x0) creat(0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, 0x0) syz_open_pts(r1, 0x0) ioctl$TCSETA(r1, 0x5404, &(0x7f0000000000)) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000500)={0x7fffffff, 0x1, 0x4, 0x0, 0xffffffff, 0x0, 0x3, 0x1, 0x0, 0x4, 0x3, 0x0, 0x6f, 0x6e80, &(0x7f0000000700)=""/182, 0x7ff, 0x5a, 0x7ff}) umount2(&(0x7f0000000540)='./file0\x00', 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x920020}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8}, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x80080) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x48, 0x0, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @rand_addr="666809ecdfab90af6db0928a52bcc0a6"}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) 17:18:32 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:32 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, 0x0, 0x0) 17:18:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf220e206f47803371be231dbf3", 0xca}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000100)=0x778, 0x4) [ 310.786669] FAT-fs (loop0): bogus number of reserved sectors [ 310.826215] FAT-fs (loop0): Can't find a valid FAT filesystem 17:18:32 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, 0x0, 0x0) [ 310.845817] tty_warn_deprecated_flags: 'syz-executor.0' is using deprecated serial flags (with no effect): 00008700 17:18:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf220e206f47803371be231dbf3", 0xca}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000100)=0x778, 0x4) 17:18:32 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, 0x0, 0x0) [ 311.067808] tty_warn_deprecated_flags: 'syz-executor.0' is using deprecated serial flags (with no effect): 00008700 17:18:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/route\x00') r1 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0x100100000000) 17:18:32 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x20101, 0x0) ioctl$int_in(r0, 0x80000080045007, 0x0) 17:18:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000140)={0x1, 0x800}, 0x5f4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080), 0x4) close(r0) 17:18:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf220e206f47803371be231dbf3", 0xca}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000100)=0x778, 0x4) 17:18:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='dummy0\x00', 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 17:18:33 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x00'/13, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0x0, 0x2011, r0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x7ffffffff000, 0x0, 0x0, 0x0) 17:18:33 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:33 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r4, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:33 executing program 0: r0 = memfd_create(&(0x7f0000000240)='\x00'/13, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0x0, 0x2011, r0, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x7ffffffff000, 0x0, 0x0, 0x0) 17:18:33 executing program 2: 17:18:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf220e206f47803371be231dbf3", 0xca, 0x10000}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) 17:18:33 executing program 0: 17:18:33 executing program 2: [ 311.854318] BTRFS error (device loop3): unsupported checksum algorithm 6967 17:18:33 executing program 0: 17:18:33 executing program 1: 17:18:33 executing program 2: [ 312.013601] BTRFS error (device loop3): superblock checksum mismatch 17:18:33 executing program 0: 17:18:33 executing program 2: [ 312.081058] BTRFS error (device loop3): open_ctree failed 17:18:34 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:34 executing program 1: 17:18:34 executing program 0: 17:18:34 executing program 2: 17:18:34 executing program 3: 17:18:34 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r4, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:34 executing program 0: 17:18:34 executing program 2: 17:18:34 executing program 3: 17:18:34 executing program 1: 17:18:34 executing program 0: 17:18:34 executing program 2: [ 313.200116] net_ratelimit: 20 callbacks suppressed [ 313.200120] protocol 88fb is buggy, dev hsr_slave_0 [ 313.210149] protocol 88fb is buggy, dev hsr_slave_1 [ 313.280095] protocol 88fb is buggy, dev hsr_slave_0 [ 313.285233] protocol 88fb is buggy, dev hsr_slave_1 17:18:35 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:35 executing program 3: 17:18:35 executing program 1: 17:18:35 executing program 0: 17:18:35 executing program 2: 17:18:35 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r2, &(0x7f0000000340), 0x41395527) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r3, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:35 executing program 1: 17:18:35 executing program 0: 17:18:35 executing program 2: 17:18:35 executing program 3: 17:18:35 executing program 0: 17:18:35 executing program 1: [ 313.840120] protocol 88fb is buggy, dev hsr_slave_0 [ 313.845252] protocol 88fb is buggy, dev hsr_slave_1 17:18:35 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) 17:18:35 executing program 3: 17:18:35 executing program 2: 17:18:35 executing program 0: 17:18:35 executing program 1: 17:18:35 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r3, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:35 executing program 0: 17:18:35 executing program 2: 17:18:35 executing program 3: 17:18:35 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) r4 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r4, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) [ 314.400111] protocol 88fb is buggy, dev hsr_slave_0 [ 314.405242] protocol 88fb is buggy, dev hsr_slave_1 17:18:36 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) r4 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r4, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf220e206f47803371be231db", 0xc9, 0x10000}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000100)=0x778, 0x4) [ 315.120197] protocol 88fb is buggy, dev hsr_slave_0 [ 315.125367] protocol 88fb is buggy, dev hsr_slave_1 17:18:36 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) pipe(&(0x7f0000000040)) r5 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r5, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf220e206f47803", 0xc4, 0x10000}], 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000100)=0x778, 0x4) 17:18:36 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) 17:18:36 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r3, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:36 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf220e206f47803371be231dbf3", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:18:36 executing program 2: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) dup(0xffffffffffffffff) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf220e206f47803371be231dbf3", 0xca, 0x10000}], 0x0, 0x0) [ 315.331128] print_req_error: I/O error, dev loop0, sector 128 [ 315.349352] BTRFS error (device loop1): unsupported checksum algorithm 6967 17:18:36 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) pipe(&(0x7f0000000040)) r5 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r5, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 315.396669] BTRFS error (device loop1): superblock checksum mismatch [ 315.580729] BTRFS error (device loop1): open_ctree failed [ 315.589055] BTRFS error (device loop2): unsupported checksum algorithm 6967 [ 315.597312] BTRFS error (device loop2): superblock checksum mismatch [ 315.640314] BTRFS error (device loop2): open_ctree failed 17:18:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf220e206f47803371be231dbf3", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:37 executing program 1: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf220e206f47803371be231dbf3", 0xca, 0x10000}], 0x0, 0x0) [ 315.822563] BTRFS error (device loop2): unsupported checksum algorithm 6967 [ 315.840760] BTRFS error (device loop2): superblock checksum mismatch [ 315.880672] BTRFS error (device loop2): open_ctree failed [ 315.888854] BTRFS error (device loop2): unsupported checksum algorithm 6967 [ 315.896333] BTRFS error (device loop2): superblock checksum mismatch 17:18:37 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) pipe(&(0x7f0000000040)) socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r5, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 315.945335] BTRFS error (device loop2): open_ctree failed 17:18:37 executing program 1: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf220e206f47803371be231dbf3", 0xca, 0x10000}], 0x0, 0x0) 17:18:37 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r3, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:37 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) pipe(&(0x7f0000000040)) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r6, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r6, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 316.058345] BTRFS error (device loop1): unsupported checksum algorithm 6967 17:18:37 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) [ 316.109999] BTRFS error (device loop1): superblock checksum mismatch [ 316.240770] BTRFS error (device loop1): open_ctree failed 17:18:37 executing program 1: openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf220e206f47803371be231dbf3", 0xca, 0x10000}], 0x0, 0x0) 17:18:37 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) pipe(&(0x7f0000000040)) r5 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r5, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r5, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) [ 316.428713] BTRFS error (device loop1): unsupported checksum algorithm 6967 [ 316.445272] BTRFS error (device loop1): superblock checksum mismatch 17:18:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) [ 316.490585] BTRFS error (device loop1): open_ctree failed 17:18:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf220e206f47803371be2", 0xc7, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:38 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) splice(r5, 0x0, r6, 0x0, 0x19404, 0x0) r7 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r7, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r7, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:18:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df8", 0x49, 0x10000}], 0x0, 0x0) 17:18:38 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r2, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:38 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) splice(r5, 0x0, r6, 0x0, 0x19404, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) r7 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r7, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r7, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:18:38 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:38 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x19404, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f00000003c0)=0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x9, 0x4e20, 0x3, 0xa, 0x20, 0xc0, 0x89, r8, r9}, {0x401, 0xb7b, 0x9, 0xf5, 0x8, 0x69, 0xfffffffffffffffa, 0xffffffffffffb014}, {0x9e, 0x6, 0x726e, 0x9b}, 0x8000, 0x0, 0x0, 0x0, 0x7}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d2, 0xa0}, 0x5, @in6=@ipv4={[], [], @rand_addr=0xffff}, 0x3505, 0x3647b7c7c6505389, 0x0, 0x0, 0x200, 0x4, 0x3}}, 0xe8) getgroups(0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xee00]) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000300)={0xa0, 0x0, 0x3, {{0x5, 0x3, 0x5, 0x1000, 0x3, 0x1b4, {0x4, 0xc14, 0x6, 0x3, 0x4, 0x3, 0xfffffffc, 0x9, 0x8edf, 0x8, 0xff, r9, r10, 0x1, 0x2}}}}, 0xa0) r11 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r11, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r11, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf2", 0xbe, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf2", 0xbe, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf2", 0xbe, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:39 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) splice(r5, 0x0, r6, 0x0, 0x19404, 0x0) r7 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r7, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r7, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:18:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf2", 0xbe, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) 17:18:39 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r2, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf2", 0xbe, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) 17:18:39 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x19404, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f00000003c0)) r8 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r8, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r8, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:18:39 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff6000000", 0x40, 0x10000}], 0x0, 0x0) 17:18:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf2", 0xbe, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) 17:18:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff6000000", 0x40, 0x10000}], 0x0, 0x0) 17:18:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf2", 0xbe, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 17:18:39 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x19404, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f00000003c0)=0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x9, 0x4e20, 0x3, 0xa, 0x20, 0xc0, 0x89, r8, r9}, {0x401, 0xb7b, 0x9, 0xf5, 0x8, 0x69, 0xfffffffffffffffa, 0xffffffffffffb014}, {0x9e, 0x6, 0x726e, 0x9b}, 0x8000, 0x0, 0x0, 0x0, 0x7}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d2, 0xa0}, 0x5, @in6=@ipv4={[], [], @rand_addr=0xffff}, 0x3505, 0x3647b7c7c6505389, 0x0, 0x0, 0x200, 0x4, 0x3}}, 0xe8) r10 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r10, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r10, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:18:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf2", 0xbe, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 17:18:40 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x19404, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f00000003c0)=0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x9, 0x4e20, 0x3, 0xa, 0x20, 0xc0, 0x89, r8, r9}, {0x401, 0xb7b, 0x9, 0xf5, 0x8, 0x69, 0xfffffffffffffffa, 0xffffffffffffb014}, {0x9e, 0x6, 0x726e, 0x9b}, 0x8000, 0x0, 0x0, 0x0, 0x7}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d2, 0xa0}, 0x5, @in6=@ipv4={[], [], @rand_addr=0xffff}, 0x3505, 0x3647b7c7c6505389, 0x0, 0x0, 0x200, 0x4, 0x3}}, 0xe8) r10 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r10, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r10, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:18:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf2", 0xbe, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 318.560122] net_ratelimit: 20 callbacks suppressed [ 318.560128] protocol 88fb is buggy, dev hsr_slave_0 [ 318.570258] protocol 88fb is buggy, dev hsr_slave_1 17:18:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf2", 0xbe, 0x10000}], 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:18:40 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r1, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:40 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r1, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:40 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:40 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf2", 0xbe, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 17:18:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf2", 0xbe, 0x10000}], 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:18:40 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r1, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:40 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r1, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80", 0x4c, 0x10000}], 0x0, 0x0) 17:18:40 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf220e206f47803371be231dbf3", 0xca, 0x10000}], 0x0, 0x0) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000240)={0xfffffffb, {{0xa, 0x4e23, 0x0, @ipv4={[], [], @rand_addr=0x4}, 0x9}}, 0x1, 0x3, [{{0xa, 0x4e24, 0x101, @empty, 0xcc0}}, {{0xa, 0x4e24, 0x6, @empty, 0x7}}, {{0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x2a}, 0x7}}]}, 0x210) 17:18:40 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x19404, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f00000003c0)=0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x9, 0x4e20, 0x3, 0xa, 0x20, 0xc0, 0x89, r8, r9}, {0x401, 0xb7b, 0x9, 0xf5, 0x8, 0x69, 0xfffffffffffffffa, 0xffffffffffffb014}, {0x9e, 0x6, 0x726e, 0x9b}, 0x8000, 0x0, 0x0, 0x0, 0x7}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d2, 0xa0}, 0x5, @in6=@ipv4={[], [], @rand_addr=0xffff}, 0x3505, 0x3647b7c7c6505389, 0x0, 0x0, 0x200, 0x4, 0x3}}, 0xe8) getgroups(0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xee00]) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000300)={0xa0, 0x0, 0x3, {{0x5, 0x3, 0x5, 0x1000, 0x3, 0x1b4, {0x4, 0xc14, 0x6, 0x3, 0x4, 0x3, 0xfffffffc, 0x9, 0x8edf, 0x8, 0xff, r9, r10, 0x1, 0x2}}}}, 0xa0) read$rfkill(r2, &(0x7f0000000180), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0xc0, 0x1) r11 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r11, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r11, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:40 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf2", 0xbe, 0x10000}], 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:18:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550", 0x65, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 319.290204] protocol 88fb is buggy, dev hsr_slave_0 [ 319.295391] protocol 88fb is buggy, dev hsr_slave_1 [ 319.300511] protocol 88fb is buggy, dev hsr_slave_0 [ 319.305559] protocol 88fb is buggy, dev hsr_slave_1 [ 319.381672] BTRFS error (device loop3): superblock checksum mismatch [ 319.440135] protocol 88fb is buggy, dev hsr_slave_0 [ 319.445250] protocol 88fb is buggy, dev hsr_slave_1 [ 319.460526] BTRFS error (device loop3): open_ctree failed [ 319.520123] protocol 88fb is buggy, dev hsr_slave_0 [ 319.525292] protocol 88fb is buggy, dev hsr_slave_1 17:18:41 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:41 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:41 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf2", 0xbe, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:41 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x19404, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f00000003c0)=0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x9, 0x4e20, 0x3, 0xa, 0x20, 0xc0, 0x89, r8, r9}, {0x401, 0xb7b, 0x9, 0xf5, 0x8, 0x69, 0xfffffffffffffffa, 0xffffffffffffb014}, {0x9e, 0x6, 0x726e, 0x9b}, 0x8000, 0x0, 0x0, 0x0, 0x7}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d2, 0xa0}, 0x5, @in6=@ipv4={[], [], @rand_addr=0xffff}, 0x3505, 0x3647b7c7c6505389, 0x0, 0x0, 0x200, 0x4, 0x3}}, 0xe8) getgroups(0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xee00]) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000300)={0xa0, 0x0, 0x3, {{0x5, 0x3, 0x5, 0x1000, 0x3, 0x1b4, {0x4, 0xc14, 0x6, 0x3, 0x4, 0x3, 0xfffffffc, 0x9, 0x8edf, 0x8, 0xff, r9, r10, 0x1, 0x2}}}}, 0xa0) read$rfkill(r2, &(0x7f0000000180), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0xc0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, &(0x7f0000000580)=0x80) socket$inet6_udp(0xa, 0x2, 0x0) r11 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r11, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r11, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:41 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x19404, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f00000003c0)=0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x9, 0x4e20, 0x3, 0xa, 0x20, 0xc0, 0x89, r8, r9}, {0x401, 0xb7b, 0x9, 0xf5, 0x8, 0x69, 0xfffffffffffffffa, 0xffffffffffffb014}, {0x9e, 0x6, 0x726e, 0x9b}, 0x8000, 0x0, 0x0, 0x0, 0x7}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d2, 0xa0}, 0x5, @in6=@ipv4={[], [], @rand_addr=0xffff}, 0x3505, 0x3647b7c7c6505389, 0x0, 0x0, 0x200, 0x4, 0x3}}, 0xe8) getgroups(0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xee00]) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000300)={0xa0, 0x0, 0x3, {{0x5, 0x3, 0x5, 0x1000, 0x3, 0x1b4, {0x4, 0xc14, 0x6, 0x3, 0x4, 0x3, 0xfffffffc, 0x9, 0x8edf, 0x8, 0xff, r9, r10, 0x1, 0x2}}}}, 0xa0) read$rfkill(r2, &(0x7f0000000180), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0xc0, 0x1) r11 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r11, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r11, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:18:41 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:41 executing program 4: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:41 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf2", 0xbe, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:41 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf2", 0xbe, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:41 executing program 4: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair(0x192f2f74a510fd81, 0x6, 0x80, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000380)=@security={'security\x00', 0xe, 0x4, 0x4e8, 0x138, 0x328, 0x328, 0x328, 0x138, 0x418, 0x418, 0x418, 0x418, 0x418, 0x4, &(0x7f0000000340), {[{{@ipv6={@mcast2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, [0x0, 0xff000000, 0x0, 0xffff80], [0x0, 0x0, 0xe858117962e52cf5, 0xffffffff], 'vlan0\x00', 'irlan0\x00', {0xff}, {}, 0x1, 0x6, 0xe572386a91a48091, 0x1}, 0x0, 0xf8, 0x138, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0x0, 0x1f, 0x24, 0x7f, 0x0, 0x100}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x8, 0x20, "6dc26e6b3eb16aa6759b1b42db40a1cb67293ba303b3f68f335c8c93384f"}}}, {{@ipv6={@empty, @dev={0xfe, 0x80, [], 0xc}, [0x0, 0xffffff00, 0xff, 0xff], [0xff000000, 0xffffffff, 0xffffffff, 0x7f000000], 'caif0\x00', 'rose0\x00', {}, {0xff}, 0x87, 0x36, 0xed4c7bda84e5d6cd, 0x10}, 0x0, 0xc8, 0x1f0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x6, 'system_u:object_r:mail_spool_t:s0\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @rand_addr="08dc1d678fb0da1c6f2708c0a4e00eef", [0xffffffff, 0xff], [0xffffffff, 0xffffff00, 0xff, 0xb56c3ac2647e4981], 'sit0\x00', 'ip6gretap0\x00', {}, {}, 0x62, 0x3f, 0x6, 0x10}, 0x0, 0xc8, 0xf0}, @common=@unspec=@CLASSIFY={0x28, 'CLASSIFY\x00', 0x0, {0x80000000}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x548) r1 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video2\x00', 0x2, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x48500, 0x0) ioctl$USBDEVFS_SETINTERFACE(r2, 0x80085504, &(0x7f0000000280)={0x4, 0x47}) ioctl$VIDIOC_DQEVENT(r1, 0x80885659, &(0x7f00000001c0)={0x0, @frame_sync}) 17:18:41 executing program 4: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:42 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf2", 0xbe, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:42 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:42 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x19404, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f00000003c0)=0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x9, 0x4e20, 0x3, 0xa, 0x20, 0xc0, 0x89, r8, r9}, {0x401, 0xb7b, 0x9, 0xf5, 0x8, 0x69, 0xfffffffffffffffa, 0xffffffffffffb014}, {0x9e, 0x6, 0x726e, 0x9b}, 0x8000, 0x0, 0x0, 0x0, 0x7}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d2, 0xa0}, 0x5, @in6=@ipv4={[], [], @rand_addr=0xffff}, 0x3505, 0x3647b7c7c6505389, 0x0, 0x0, 0x200, 0x4, 0x3}}, 0xe8) getgroups(0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xee00]) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000300)={0xa0, 0x0, 0x3, {{0x5, 0x3, 0x5, 0x1000, 0x3, 0x1b4, {0x4, 0xc14, 0x6, 0x3, 0x4, 0x3, 0xfffffffc, 0x9, 0x8edf, 0x8, 0xff, r9, r10, 0x1, 0x2}}}}, 0xa0) read$rfkill(r2, &(0x7f0000000180), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0xc0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r11 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r11, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r11, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:18:42 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x19404, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f00000003c0)=0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x9, 0x4e20, 0x3, 0xa, 0x20, 0xc0, 0x89, r8, r9}, {0x401, 0xb7b, 0x9, 0xf5, 0x8, 0x69, 0xfffffffffffffffa, 0xffffffffffffb014}, {0x9e, 0x6, 0x726e, 0x9b}, 0x8000, 0x0, 0x0, 0x0, 0x7}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d2, 0xa0}, 0x5, @in6=@ipv4={[], [], @rand_addr=0xffff}, 0x3505, 0x3647b7c7c6505389, 0x0, 0x0, 0x200, 0x4, 0x3}}, 0xe8) getgroups(0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xee00]) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000300)={0xa0, 0x0, 0x3, {{0x5, 0x3, 0x5, 0x1000, 0x3, 0x1b4, {0x4, 0xc14, 0x6, 0x3, 0x4, 0x3, 0xfffffffc, 0x9, 0x8edf, 0x8, 0xff, r9, r10, 0x1, 0x2}}}}, 0xa0) read$rfkill(r2, &(0x7f0000000180), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0xc0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r11 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r11, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r11, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:18:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:42 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:42 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf2", 0xbe, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x3d6, 0x10000}], 0x0, 0x0) 17:18:42 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:42 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:42 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf2", 0xbe, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf220e206f47803371be231dbf3", 0xca, 0x10000}], 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10601, 0x0) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f00000000c0)={0x0, 0x9}) 17:18:42 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:42 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x10, &(0x7f00000000c0)={0x80000001}) r1 = getpid() sched_setattr(r1, 0x0, 0x0) syz_open_procfs$namespace(r1, &(0x7f0000000cc0)='ns/net\x00') sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000c00)=[{{&(0x7f00000001c0)=@can, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000240)="c3c4e149d9ed0b01c576505be65fe6d1a6fe6c99fbb5816cf0691db5f20c0decc26ee076a8ae307576f0f72507552f77bc22cde313bba75ba6aa29ab7c88d41000c843b7", 0x44}], 0x1, &(0x7f0000000300)=[@txtime={{0x18, 0x1, 0x3d, 0xf66}}, @txtime={{0x18, 0x1, 0x3d, 0x800}}], 0x30}}, {{&(0x7f0000000340)=@x25={0x9, @remote={[], 0x3}}, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="f68fe98375b2549a03689f99090ac726dfa6c47354464c516a0a6b610c3c351ddea345", 0x23}], 0x1, &(0x7f0000000440)=[@txtime={{0x18, 0x1, 0x3d, 0x8001}}, @txtime={{0x18, 0x1, 0x3d, 0x400}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}], 0x48}}, {{0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f00000004c0)="aa01f18e81b603dfdf9583ecc5851aec30c04c6614e0f8f66dfe492652737df72952d70beac31da56d66dfde818f91935187d8e83dab6a49b47fd6b470c0034379574c054c6b82ab9d2d48eb740c0d4a028d92f4a064593a301a2f4ae06e0c4af3ce0e2101a34ade48fdc1176ff5497e9afd02ea061e4dd9a935c7a16ef1dd034389909dc2299a6cc570f1b98a8787348910a26fad4109395701c0bdc4fb16632562fef1a117281ddf532324bc346d2213373e690f962153589ba5c43c3a4afdc1d5a8b4dc19c0737088af324a14fea2000ee5775daa70c9d964d6d2c85cf38381fe238ad9447f", 0xe7}, {&(0x7f00000005c0)="314b662990d2152afd3a0b4ea29f7d289fceb9fe2f5dfe00b8a90f87cd3f2e95ce34dd09682a486f5fadaf00b69817f2d707a5f82486ec4d6ede8ff6a6baf51b7269aaa6b9855ebb4106e2a09b1ac49a6b3112921ae3baa9833eb7c3d929d9644685eaf6d74ec031106d2a35bc1333ad79bc52b8449b3f3ccf82cb4ddc556f0a2a4e8a96066c19c5856bdc560d99a7f87e1c353d63fb8adc2735a3c0", 0x9c}, {&(0x7f0000000680)="2330abd54af840d5b04a19690c3568bf7dcaf5b11b57e35141cb4f56df006f0a20843af600d5149df68a513f76904469ab31ceb700f832045c112b75105b98a4b38105ab0de0486a5ad15e35480a2991267abc4036d66c8376b693a8d32161c0ff6b2b01401916506512df3134eb293b5c18ba20762a58", 0x77}, {&(0x7f0000000700)="c18dfd5593e311fd12d01e7271e00c697939b8667909ce2cb4e244208b21d859e2220d92d2824f9b73a4c5cb2c6254519b8091", 0x33}, {&(0x7f0000000740)="0087d376e7dcd7640201ba18743e6c333561b22f96838a8c5a492d0883c2bd73e206ca5668", 0x25}, {&(0x7f0000000780)="b2bf91232e149ba8b69a3f416ca4755c8ba2e363c3444954b9307cc2088d30bff1d06f2ff9fb7aff86d7ffabc7d1b58262c565e00d0917674ed8a16bd98e729821b59684ebb7d29607683e02be665a71", 0xffffffb3}, {&(0x7f0000000800)="b4af1a3089396b65a9034bc9e3ab178bf58a55d9412bc2a0c4007e922f0747174ac3ea05ce6b54f0f6891124d1fbf79388d0b5cf9a82df0543c76b607d25e664d5b10c786280bd302718a33e784f57b3f65a51ca7d5f80d4ee8d983d9054364258af50ad2e88d6394c1a1c33", 0x6c}, {&(0x7f0000000880)="4593f92fd702b80176c8e1e7209a0650b68c932b2eb572525ace0433414a8a1deb26b2e7f394574cedfd06b9f101613c0c09ba13bc95d3041bb15ff4828b450359b5d5c3f1534217e3d4be9327f1af5f6e92dac62b8d80be403766f391c2cb6932da097e3a65c622da227b8debeb00f7b210ca13bf156bb8ea92c6ab8c5e06a17c29b937e27baed3c29743274ea3a88edfcc41feea800fc3bbf6475aa596416701b990058a3ab488f5fbb070648e6816f3e20323fcd1bf47f8de27fc086f573ceb", 0xc1}, {&(0x7f0000000980)="6129fe162a3aefcae6d41c14619fbd39744d647890209babbda248753d44d5211698e7bbb330fc2c403403a0972a869ebb75ae2d38d4e6bf9c9aa180ac53b447f461b08e81472c63868d18e7f78d9e23c1fe7c7442ad9e4e6a97519af889adf4eb2d209d539be71a84a75c6a4f1f11dc2350ac116d64275fd0bd3523c9095e4ef7cd92e5d43923d0d58ff4bf3d151c4fccc080f6fa27f54ab4ff4a9182d1e72b62ac1ff2cff0f6b25a24d4", 0xab}, {&(0x7f0000000a40)="1c01a33aed9a99", 0x7}], 0xa, &(0x7f0000000b40)=[@txtime={{0x18, 0x1, 0x3d, 0xbe}}, @timestamping={{0x14, 0x1, 0x25, 0xfb}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0xffff}}], 0x90}}], 0x3, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x19, 0x0, &(0x7f0000000040)) recvfrom(r2, &(0x7f0000000d40)=""/234, 0xea, 0x8081, &(0x7f0000000e40)=@sco={0x1f, {0x40, 0x0, 0x0, 0x3, 0xff, 0x7}}, 0x80) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/relabel\x00', 0x2, 0x0) 17:18:42 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x19404, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f00000003c0)=0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x9, 0x4e20, 0x3, 0xa, 0x20, 0xc0, 0x89, r8, r9}, {0x401, 0xb7b, 0x9, 0xf5, 0x8, 0x69, 0xfffffffffffffffa, 0xffffffffffffb014}, {0x9e, 0x6, 0x726e, 0x9b}, 0x8000, 0x0, 0x0, 0x0, 0x7}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d2, 0xa0}, 0x5, @in6=@ipv4={[], [], @rand_addr=0xffff}, 0x3505, 0x3647b7c7c6505389, 0x0, 0x0, 0x200, 0x4, 0x3}}, 0xe8) getgroups(0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xee00]) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000300)={0xa0, 0x0, 0x3, {{0x5, 0x3, 0x5, 0x1000, 0x3, 0x1b4, {0x4, 0xc14, 0x6, 0x3, 0x4, 0x3, 0xfffffffc, 0x9, 0x8edf, 0x8, 0xff, r9, r10, 0x1, 0x2}}}}, 0xa0) read$rfkill(r2, &(0x7f0000000180), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0xc0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, &(0x7f0000000580)=0x80) socket$inet6_udp(0xa, 0x2, 0x0) r11 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r11, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r11, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:18:43 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, 0x0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) [ 321.504777] BTRFS error (device loop2): unsupported checksum algorithm 6967 17:18:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:43 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, 0x0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) [ 321.556014] BTRFS error (device loop2): superblock checksum mismatch 17:18:43 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, 0x0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) [ 321.650379] BTRFS error (device loop2): open_ctree failed 17:18:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:43 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:43 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:43 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x19404, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f00000003c0)=0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x9, 0x4e20, 0x3, 0xa, 0x20, 0xc0, 0x89, r8, r9}, {0x401, 0xb7b, 0x9, 0xf5, 0x8, 0x69, 0xfffffffffffffffa, 0xffffffffffffb014}, {0x9e, 0x6, 0x726e, 0x9b}, 0x8000, 0x0, 0x0, 0x0, 0x7}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d2, 0xa0}, 0x5, @in6=@ipv4={[], [], @rand_addr=0xffff}, 0x3505, 0x3647b7c7c6505389, 0x0, 0x0, 0x200, 0x4, 0x3}}, 0xe8) getgroups(0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xee00]) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000300)={0xa0, 0x0, 0x3, {{0x5, 0x3, 0x5, 0x1000, 0x3, 0x1b4, {0x4, 0xc14, 0x6, 0x3, 0x4, 0x3, 0xfffffffc, 0x9, 0x8edf, 0x8, 0xff, r9, r10, 0x1, 0x2}}}}, 0xa0) read$rfkill(r2, &(0x7f0000000180), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0xc0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, &(0x7f0000000580)=0x80) socket$inet6_udp(0xa, 0x2, 0x0) r11 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r11, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r11, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:18:43 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:43 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x19404, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f00000003c0)=0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x9, 0x4e20, 0x3, 0xa, 0x20, 0xc0, 0x89, r8, r9}, {0x401, 0xb7b, 0x9, 0xf5, 0x8, 0x69, 0xfffffffffffffffa, 0xffffffffffffb014}, {0x9e, 0x6, 0x726e, 0x9b}, 0x8000, 0x0, 0x0, 0x0, 0x7}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d2, 0xa0}, 0x5, @in6=@ipv4={[], [], @rand_addr=0xffff}, 0x3505, 0x3647b7c7c6505389, 0x0, 0x0, 0x200, 0x4, 0x3}}, 0xe8) getgroups(0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xee00]) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000300)={0xa0, 0x0, 0x3, {{0x5, 0x3, 0x5, 0x1000, 0x3, 0x1b4, {0x4, 0xc14, 0x6, 0x3, 0x4, 0x3, 0xfffffffc, 0x9, 0x8edf, 0x8, 0xff, r9, r10, 0x1, 0x2}}}}, 0xa0) read$rfkill(r2, &(0x7f0000000180), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0xc0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, &(0x7f0000000580)=0x80) socket$inet6_udp(0xa, 0x2, 0x0) r11 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r11, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r11, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:18:43 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x19404, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f00000003c0)=0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x9, 0x4e20, 0x3, 0xa, 0x20, 0xc0, 0x89, r8, r9}, {0x401, 0xb7b, 0x9, 0xf5, 0x8, 0x69, 0xfffffffffffffffa, 0xffffffffffffb014}, {0x9e, 0x6, 0x726e, 0x9b}, 0x8000, 0x0, 0x0, 0x0, 0x7}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d2, 0xa0}, 0x5, @in6=@ipv4={[], [], @rand_addr=0xffff}, 0x3505, 0x3647b7c7c6505389, 0x0, 0x0, 0x200, 0x4, 0x3}}, 0xe8) getgroups(0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xee00]) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000300)={0xa0, 0x0, 0x3, {{0x5, 0x3, 0x5, 0x1000, 0x3, 0x1b4, {0x4, 0xc14, 0x6, 0x3, 0x4, 0x3, 0xfffffffc, 0x9, 0x8edf, 0x8, 0xff, r9, r10, 0x1, 0x2}}}}, 0xa0) read$rfkill(r2, &(0x7f0000000180), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0xc0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, &(0x7f0000000580)=0x80) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r11, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r11, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:18:43 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:43 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:44 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:44 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:44 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:44 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, 0x0, 0x0) 17:18:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:44 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x19404, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f00000003c0)=0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x9, 0x4e20, 0x3, 0xa, 0x20, 0xc0, 0x89, r8, r9}, {0x401, 0xb7b, 0x9, 0xf5, 0x8, 0x69, 0xfffffffffffffffa, 0xffffffffffffb014}, {0x9e, 0x6, 0x726e, 0x9b}, 0x8000, 0x0, 0x0, 0x0, 0x7}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d2, 0xa0}, 0x5, @in6=@ipv4={[], [], @rand_addr=0xffff}, 0x3505, 0x3647b7c7c6505389, 0x0, 0x0, 0x200, 0x4, 0x3}}, 0xe8) getgroups(0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xee00]) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000300)={0xa0, 0x0, 0x3, {{0x5, 0x3, 0x5, 0x1000, 0x3, 0x1b4, {0x4, 0xc14, 0x6, 0x3, 0x4, 0x3, 0xfffffffc, 0x9, 0x8edf, 0x8, 0xff, r9, r10, 0x1, 0x2}}}}, 0xa0) read$rfkill(r2, &(0x7f0000000180), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0xc0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, &(0x7f0000000580)=0x80) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r11, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r11, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:18:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'bond_slave_0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="37000000000000001f0000000800000003742fb0852b3a8597ac60c55dbc207fff9438124284b9329f6c001cae9128e1c6c2ffae7320845345086792ee2fd6b6d7fc1e2c055133118b512657fc66cf862ebf8fafc6ae3585174b7cb8b92025e8509087104c736744378ef43942f0d6ac78fc35d90f1f3fb5975fced1b65dba556a4ec8b0805a1dce6db20c422a32b8b9439a9d79fa"]}) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000080)={0x9, 0x2, 0x3}) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, &(0x7f00000001c0)=""/212, &(0x7f00000002c0)=0xd4) openat$selinux_create(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/create\x00', 0x2, 0x0) 17:18:44 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x19404, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f00000003c0)=0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x9, 0x4e20, 0x3, 0xa, 0x20, 0xc0, 0x89, r8, r9}, {0x401, 0xb7b, 0x9, 0xf5, 0x8, 0x69, 0xfffffffffffffffa, 0xffffffffffffb014}, {0x9e, 0x6, 0x726e, 0x9b}, 0x8000, 0x0, 0x0, 0x0, 0x7}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d2, 0xa0}, 0x5, @in6=@ipv4={[], [], @rand_addr=0xffff}, 0x3505, 0x3647b7c7c6505389, 0x0, 0x0, 0x200, 0x4, 0x3}}, 0xe8) getgroups(0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xee00]) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000300)={0xa0, 0x0, 0x3, {{0x5, 0x3, 0x5, 0x1000, 0x3, 0x1b4, {0x4, 0xc14, 0x6, 0x3, 0x4, 0x3, 0xfffffffc, 0x9, 0x8edf, 0x8, 0xff, r9, r10, 0x1, 0x2}}}}, 0xa0) read$rfkill(r2, &(0x7f0000000180), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0xc0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, &(0x7f0000000580)=0x80) r11 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r11, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r12 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r12, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:44 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, 0x0, 0x0) 17:18:44 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, 0x0, 0x0) 17:18:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:44 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf220e206f47803371be231dbf3", 0xca, 0x10000}], 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:18:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 323.600106] net_ratelimit: 20 callbacks suppressed [ 323.600111] protocol 88fb is buggy, dev hsr_slave_0 [ 323.610208] protocol 88fb is buggy, dev hsr_slave_1 [ 323.652412] BTRFS error (device loop4): unsupported checksum algorithm 6967 [ 323.664530] BTRFS error (device loop4): superblock checksum mismatch [ 323.680131] protocol 88fb is buggy, dev hsr_slave_0 [ 323.685294] protocol 88fb is buggy, dev hsr_slave_1 [ 323.730353] BTRFS error (device loop4): open_ctree failed 17:18:45 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:45 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x19404, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f00000003c0)=0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x9, 0x4e20, 0x3, 0xa, 0x20, 0xc0, 0x89, r8, r9}, {0x401, 0xb7b, 0x9, 0xf5, 0x8, 0x69, 0xfffffffffffffffa, 0xffffffffffffb014}, {0x9e, 0x6, 0x726e, 0x9b}, 0x8000, 0x0, 0x0, 0x0, 0x7}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d2, 0xa0}, 0x5, @in6=@ipv4={[], [], @rand_addr=0xffff}, 0x3505, 0x3647b7c7c6505389, 0x0, 0x0, 0x200, 0x4, 0x3}}, 0xe8) getgroups(0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xee00]) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000300)={0xa0, 0x0, 0x3, {{0x5, 0x3, 0x5, 0x1000, 0x3, 0x1b4, {0x4, 0xc14, 0x6, 0x3, 0x4, 0x3, 0xfffffffc, 0x9, 0x8edf, 0x8, 0xff, r9, r10, 0x1, 0x2}}}}, 0xa0) read$rfkill(r2, &(0x7f0000000180), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0xc0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, &(0x7f0000000580)=0x80) r11 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r11, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:18:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf220e206f47803371be231dbf3", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 17:18:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf220e206f47803371be231dbf3", 0xca, 0x10000}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000080)='bfs\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x2, &(0x7f00000003c0)=[{&(0x7f0000000240)="55a06da4bdb07c7b7b17cf209eca15e9faa966e63c1bc0fe21fd32da36c3f84a684316e01bf5772ce946592a01351d122e894d595faee9e04796b8086696d776887c47f0a14d783c2d", 0x49, 0x200}, {&(0x7f00000002c0)="97dd598e78e1baf4f844e5ddceb4330fced6c98f7678201b43469449db0be3202f5029d5219486c089b77c3a1eceeb5af7544e92e06f95da7b7f5c4a370ea5ccdb82132463cd80bfe20ecd1bd3179016141041cfc08a3d7a841a15491c85226d6b939128b93f61f57d73b9b9880a32bbe0c65279a3b23145f9366b8d0a69c4c0906ccd6eca9ad91b70221b3a55f3c6a60aba2e89289f48010d6d0e5b167dac9668218de2f2db4bd66654d52f661c52d6ceb155ee9c1647ac15d9573151437ae0c45a95032502c674c6cdf026a7d3ffd71d9f61", 0xd3, 0x1}], 0x24c0, 0x0) [ 324.134567] BTRFS error (device loop2): unsupported checksum algorithm 6967 [ 324.147692] BTRFS error (device loop2): superblock checksum mismatch 17:18:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 324.190612] BTRFS error (device loop2): open_ctree failed [ 324.209516] BTRFS error (device loop2): unsupported checksum algorithm 6967 17:18:45 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x19404, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f00000003c0)=0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x9, 0x4e20, 0x3, 0xa, 0x20, 0xc0, 0x89, r8, r9}, {0x401, 0xb7b, 0x9, 0xf5, 0x8, 0x69, 0xfffffffffffffffa, 0xffffffffffffb014}, {0x9e, 0x6, 0x726e, 0x9b}, 0x8000, 0x0, 0x0, 0x0, 0x7}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d2, 0xa0}, 0x5, @in6=@ipv4={[], [], @rand_addr=0xffff}, 0x3505, 0x3647b7c7c6505389, 0x0, 0x0, 0x200, 0x4, 0x3}}, 0xe8) getgroups(0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xee00]) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000300)={0xa0, 0x0, 0x3, {{0x5, 0x3, 0x5, 0x1000, 0x3, 0x1b4, {0x4, 0xc14, 0x6, 0x3, 0x4, 0x3, 0xfffffffc, 0x9, 0x8edf, 0x8, 0xff, r9, r10, 0x1, 0x2}}}}, 0xa0) read$rfkill(r2, &(0x7f0000000180), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0xc0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, &(0x7f0000000580)=0x80) r11 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r11, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r12 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r12, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) [ 324.237162] BTRFS error (device loop2): superblock checksum mismatch [ 324.243955] protocol 88fb is buggy, dev hsr_slave_0 [ 324.244005] protocol 88fb is buggy, dev hsr_slave_1 [ 324.341694] BTRFS error (device loop2): open_ctree failed 17:18:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:45 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:18:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf220e206f47803371be231dbf3", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) [ 324.800120] protocol 88fb is buggy, dev hsr_slave_0 [ 324.805286] protocol 88fb is buggy, dev hsr_slave_1 [ 324.823565] BTRFS error (device loop3): unsupported checksum algorithm 6967 [ 324.830898] BTRFS error (device loop3): superblock checksum mismatch [ 324.871209] BTRFS error (device loop3): open_ctree failed 17:18:46 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076a", 0x5f, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:46 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x19404, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f00000003c0)=0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x9, 0x4e20, 0x3, 0xa, 0x20, 0xc0, 0x89, r8, r9}, {0x401, 0xb7b, 0x9, 0xf5, 0x8, 0x69, 0xfffffffffffffffa, 0xffffffffffffb014}, {0x9e, 0x6, 0x726e, 0x9b}, 0x8000, 0x0, 0x0, 0x0, 0x7}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d2, 0xa0}, 0x5, @in6=@ipv4={[], [], @rand_addr=0xffff}, 0x3505, 0x3647b7c7c6505389, 0x0, 0x0, 0x200, 0x4, 0x3}}, 0xe8) getgroups(0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xee00]) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000300)={0xa0, 0x0, 0x3, {{0x5, 0x3, 0x5, 0x1000, 0x3, 0x1b4, {0x4, 0xc14, 0x6, 0x3, 0x4, 0x3, 0xfffffffc, 0x9, 0x8edf, 0x8, 0xff, r9, r10, 0x1, 0x2}}}}, 0xa0) read$rfkill(r2, &(0x7f0000000180), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0xc0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, &(0x7f0000000580)=0x80) r11 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r11, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r12 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r12, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:18:46 executing program 4: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x19404, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f00000003c0)=0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x9, 0x4e20, 0x3, 0xa, 0x20, 0xc0, 0x89, r8, r9}, {0x401, 0xb7b, 0x9, 0xf5, 0x8, 0x69, 0xfffffffffffffffa, 0xffffffffffffb014}, {0x9e, 0x6, 0x726e, 0x9b}, 0x8000, 0x0, 0x0, 0x0, 0x7}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d2, 0xa0}, 0x5, @in6=@ipv4={[], [], @rand_addr=0xffff}, 0x3505, 0x3647b7c7c6505389, 0x0, 0x0, 0x200, 0x4, 0x3}}, 0xe8) getgroups(0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xee00]) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000300)={0xa0, 0x0, 0x3, {{0x5, 0x3, 0x5, 0x1000, 0x3, 0x1b4, {0x4, 0xc14, 0x6, 0x3, 0x4, 0x3, 0xfffffffc, 0x9, 0x8edf, 0x8, 0xff, r9, r10, 0x1, 0x2}}}}, 0xa0) read$rfkill(r2, &(0x7f0000000180), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0xc0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, &(0x7f0000000580)=0x80) r11 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r11, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000acc000)={@multicast2, @multicast1, 0x2}, 0xc) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 17:18:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:46 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="b6", 0x1) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x600) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) splice(r6, 0x0, r7, 0x0, 0x19404, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f00000003c0)=0x0) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x9, 0x4e20, 0x3, 0xa, 0x20, 0xc0, 0x89, r8, r9}, {0x401, 0xb7b, 0x9, 0xf5, 0x8, 0x69, 0xfffffffffffffffa, 0xffffffffffffb014}, {0x9e, 0x6, 0x726e, 0x9b}, 0x8000, 0x0, 0x0, 0x0, 0x7}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d2, 0xa0}, 0x5, @in6=@ipv4={[], [], @rand_addr=0xffff}, 0x3505, 0x3647b7c7c6505389, 0x0, 0x0, 0x200, 0x4, 0x3}}, 0xe8) getgroups(0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xee00]) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000300)={0xa0, 0x0, 0x3, {{0x5, 0x3, 0x5, 0x1000, 0x3, 0x1b4, {0x4, 0xc14, 0x6, 0x3, 0x4, 0x3, 0xfffffffc, 0x9, 0x8edf, 0x8, 0xff, r9, r10, 0x1, 0x2}}}}, 0xa0) read$rfkill(r2, &(0x7f0000000180), 0x8) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0xc0, 0x1) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, &(0x7f0000000580)=0x80) r11 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r11, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r12 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r12, 0x0, 0x24, &(0x7f0000000000)={@multicast2, @multicast1, @multicast1}, 0x9) 17:18:46 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a", 0x30, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a", 0x30, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 325.520151] protocol 88fb is buggy, dev hsr_slave_0 [ 325.525301] protocol 88fb is buggy, dev hsr_slave_1 17:18:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a", 0x30, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:47 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc822, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000580)={{&(0x7f0000e00000/0x200000)=nil, 0x200000}, 0x2}) ioctl$sock_ifreq(r0, 0x8991, 0x0) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x4191af8e) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) 17:18:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f00000000c0), 0x4) 17:18:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 325.935653] bond0: Error: Device is in use and cannot be enslaved 17:18:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f00000000c0), 0x4) 17:18:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x8, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x19, 0x0, &(0x7f0000000040)) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x41, &(0x7f0000000200)=0x1a00, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={'veth1_to_bond\x00', 0x2000}) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_DROP_MASTER(r4, 0x641f) 17:18:47 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) 17:18:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r1) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f0000000100)={0x20000, 0x0, [0x2, 0x4, 0xbe, 0x7fffffff, 0x0, 0x797, 0x2e, 0x4]}) r4 = socket$inet6(0xa, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000005cc0)=ANY=[@ANYBLOB="370065f05d5aa79ff458a2e06ceb00"/28]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000640)={0x0, 0x0}) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0xffffffffffffffff, r9) r10 = getgid() r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r11, 0x0, 0x19, 0x0, &(0x7f0000000040)) r12 = getpid() sched_setattr(r12, 0x0, 0x0) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r13, 0x0, 0x19, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0}, &(0x7f0000000700)=0xc) r15 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r15, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r16) r17 = accept4$alg(r3, 0x0, 0x0, 0x800) r18 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r18, 0x0, 0x19, 0x0, &(0x7f0000000040)) r19 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r19, 0x0, 0x19, 0x0, &(0x7f0000000040)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000740)={0x0, 0x0}) r21 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r21, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet6_IPV6_IPSEC_POLICY(r21, 0x29, 0x22, &(0x7f0000000780)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000880)=0xe8) r23 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r23, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r24) r25 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r25, 0x0, 0x19, 0x0, &(0x7f0000000040)) r26 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r26, 0x0, 0x19, 0x0, &(0x7f0000000040)) r27 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r27, 0x0, 0x19, 0x0, &(0x7f0000000040)) r28 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r28, 0x0, 0x19, 0x0, &(0x7f0000000040)) r29 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r29, 0x0, 0x19, 0x0, &(0x7f0000000040)) r30 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r30, 0x0, 0x19, 0x0, &(0x7f0000000040)) r31 = socket$packet(0x11, 0x2, 0x300) r32 = socket$nl_generic(0x10, 0x3, 0x10) r33 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r33, 0x0, 0x19, 0x0, &(0x7f0000000040)) r34 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r34, 0x0, 0x19, 0x0, &(0x7f0000000040)) r35 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r35, 0x0, 0x19, 0x0, &(0x7f0000000040)) r36 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r36, 0x0, 0x19, 0x0, &(0x7f0000000040)) r37 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r37, 0x0, 0x19, 0x0, &(0x7f0000000040)) r38 = socket$inet6_dccp(0xa, 0x6, 0x0) r39 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r39, 0x0, 0x19, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r41 = dup(r40) ioctl$PERF_EVENT_IOC_ENABLE(r41, 0x8912, 0x400200) r42 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000004440)={&(0x7f0000004400)='ip_vti0\x00', r41}, 0x10) r43 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r43, 0x0, 0x19, 0x0, &(0x7f0000000040)) r44 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r44, 0x0, 0x19, 0x0, &(0x7f0000000040)) r45 = getpid() sched_setattr(r45, 0x0, 0x0) r46 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r46, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0xffffffffffffffff, r47) r48 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r48, 0x0, 0x19, 0x0, &(0x7f0000000040)) r49 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r49, 0x0, 0x19, 0x0, &(0x7f0000000040)) r50 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r50, 0x0, 0x19, 0x0, &(0x7f0000000040)) r51 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r51, 0x0, 0x19, 0x0, &(0x7f0000000040)) r52 = socket$caif_seqpacket(0x25, 0x5, 0x1) r53 = getpid() sched_setattr(r53, 0x0, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000005040)={0x0, 0x0, 0x0}, &(0x7f0000005080)=0xc) r55 = getpid() sched_setattr(r55, 0x0, 0x0) r56 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r56, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0xffffffffffffffff, r57) stat(&(0x7f00000050c0)='./file0\x00', &(0x7f0000005100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r59 = getpid() r60 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r60, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0xffffffffffffffff, r61) lstat(&(0x7f0000005180)='./file0\x00', &(0x7f00000051c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r63 = getpid() sched_setattr(r63, 0x0, 0x0) getresuid(&(0x7f0000005680), &(0x7f00000056c0)=0x0, &(0x7f0000005700)) r65 = socket$inet6(0xa, 0x2, 0x0) r66 = dup(r65) ioctl$sock_SIOCETHTOOL(r66, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r66, 0xc0502100, &(0x7f0000005740)={0x0, 0x0}) getresgid(&(0x7f00000057c0)=0x0, &(0x7f0000005800), &(0x7f0000005840)) r69 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r69, 0x0, 0x19, 0x0, &(0x7f0000000040)) r70 = gettid() r71 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r71, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0xffffffffffffffff, r72) r73 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r73, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r74) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000005880)=0x0) r76 = geteuid() stat(&(0x7f00000058c0)='./file0\x00', &(0x7f0000005900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r78 = openat$uinput(0xffffffffffffff9c, &(0x7f0000005980)='/dev/uinput\x00', 0x802, 0x0) r79 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r79, 0x0, 0x19, 0x0, &(0x7f0000000040)) r80 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r80, 0x0, 0x19, 0x0, &(0x7f0000000040)) r81 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r81, 0x0, 0x19, 0x0, &(0x7f0000000040)) ioctl$TIOCGSID(r3, 0x5429, &(0x7f00000059c0)=0x0) r83 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r83, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0xffffffffffffffff, r84) r85 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r85, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r86) sendmmsg$unix(r6, &(0x7f0000005b00)=[{&(0x7f0000000240)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f00000005c0)=[{&(0x7f00000002c0)="8a6f61c9648a8cbce8b3b376604236c590734368c82d8fe38b78a730d9e4cd682afa0b81c6953121aad2153919e6a6934f3117123b432202f6ecbfaae8f0bde3486dd1d1ab8f48e59b98080b672278c3a323884777c0068dee26e49b69413ac5c8fba199ab60f71b980629357bd04d6fc4d4b82e6a42982f3aa99c6fe81385758320be131a4901ae3cc87a29159fb188efde48794096e746d1296f5d7efed51c0822655c90d3e315844f6f", 0xab}, {&(0x7f0000000380)="a9a8d31a5112132efa11dc98b958929415a1fab8e08a4e83768826cbf52beef467213d7c348671f180108d91f6c2200f3a466941d0c7ee0bb495243a3e929b0ad5c684a1b63354e9f2fb28d74e7a758042298cc9751157958c26c297ab3a382158aa7cf5a225e75fc3950daf28c7", 0x6e}, {&(0x7f0000000400)="b28b703a00c457621ae242ab71803a7ef956df45b28d3176ccdacf26f103ff716020036e7527a2b720b11b07f49a0af4412e6e755691fa0c0b8e81a7bb17b5b01f218d273f94a9098662e3ff337f6c034e025a7d057a3731051658f7cca69e8cc3595deb904a63b0773d437df2b23b08c10ec608c4ead1d0ce", 0x79}, {&(0x7f0000000480)="d58e923392df39bb0d8c6a2f96fa6eca4617bc0fdcc08904406067226ca90b4a243a93eae6e10ad8dd11ffaabc7157d182fd8c8869c265f2b82b3c4e73216f008058748468b78e486d6a5f731265c0ebea2f272361254c18d52db41b739ddaa5728ecb8efddac3265dcdfeac7528d749c92537d627dd7924e9791171711ab2e1e88503715bfddc24de515bd810059f0ea9f04b73c5665b186cfffa48efdd4182546b32c7043b887ebec3adc51ca66000e6a517fa4b8a48eba04c680600320042eb3a0bb57eb08f38dae01eb7f5be41f807fd4d7a409365f5ef6c248c", 0xdc}, {&(0x7f0000000580)="13d8174dd42d490edb44", 0xa}], 0x5, &(0x7f00000008c0)=[@cred={{0x1c, 0x1, 0x2, {r7, r9, r10}}}, @rights={{0x20, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, r11]}}, @cred={{0x1c, 0x1, 0x2, {r12, r14, r16}}}, @rights={{0x28, 0x1, 0x1, [r17, r18, 0xffffffffffffffff, r19, r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {r20, r22, r24}}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, r25, r26, r2, r27, r28, 0xffffffffffffffff, 0xffffffffffffffff, r29]}}, @rights={{0x28, 0x1, 0x1, [r30, r31, r32, r33, r34, r35]}}], 0x108, 0x10}, {&(0x7f0000000a00)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000b00)=[{&(0x7f0000000a80)="e5f27081fdb366b67302ec12db57ace5d132badf020438cbda89962ae16600f5d93e89a737d84b3fece0dc956a8764f6bea0f83b8135913ccce298e365be946044dab8706d691ca131e1", 0x4a}], 0x1, &(0x7f0000000b40)=[@rights={{0x14, 0x1, 0x1, [r4]}}, @rights={{0x18, 0x1, 0x1, [r36, r2]}}], 0x30, 0xffaade0dcc27e3b2}, {&(0x7f0000000b80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002100)=[{&(0x7f0000000c00)="3317609efa858b", 0x7}, {&(0x7f0000000c40)="0f432dfd9dced60aeebd5b462f1891857a07adeb4caadaabe74460462ca8fcc8696eab34323c6b5f10a7a25a65ceede449cf3c5aeab9ef0ce6b64ab22cd3af24e0cb601e5cf2dea29b7f4c55bf43353434a314bf49b9be53494fa0cf9a76c096", 0x60}, {&(0x7f0000000cc0)="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", 0x1000}, {&(0x7f0000001cc0)="c8834df9117a85545867636b58f06f07e8e070e5ce8ddee62d8da16579da7bfc132c6c809b2852b8cd5d189578839a0692edf3a99348aadac4bf9b48de8b6210763504418e434c8882bc6b55148461660c72dd084383b521eafa4b7c5101b7e491500659ed6c520c25675a7c28d435902aa512e1522a17064e310b3b9f3305e7a5111f6834429ecaaccf27f8bcbee019f03f3ab5524aeb0df3458d7359d61ea0de4cda54c96b0074cad692c3c7c7372fa9eb87ac618768c51729b7", 0xbb}, {&(0x7f0000001d80)="5e3367dd49e781bf1267afddf333f02f3d895086a937b10f1eb9df9c104a1100a00133848ebd04100c620e1c6c5b1cf480fd67e19157a021fb856c61228c17ac17ca7d7cfae7c5f6edb9cc2e94f7d9a7b4ab6e2a0928901184093c64adf55defbe3f57e0812caa322e4f6dd95bdff52611719439a9165c12af80deb796479efb100e46d83e6b61b0a6f9e98d1d45c516aa53", 0x92}, {&(0x7f0000001e40)="a1e4547eaa5b9e95909c552b9c481c4326bb0ffb7a6cef852355cc780b6db4d29caa8e910b0095bdc13a80a9048e8b21f00a30f4f98f4fc4e2dadeba08986df2ed983cee38c037a2edbc9225fb09fb150655d853eac81084d9cabd0c6885e82fe715fc28a9e3d99cd4512eed66cdf86ec6da12d0a0790597a032e71c45aa4b513abbc5c70ffaf77e7129256b7c55aeb1be68137225ceec3915bda4ae0a169783", 0xa0}, {&(0x7f0000001f00)="048d44e1686a9dccaf762ad9a63d1c1b9f10b9cfe48d25213268954cae64a994125ca21f7610307661dfb8d58cddd63c28c46d11101e52c4b6f99be0c6f6334d46f1a5a0ca3e9d14d08230b9547974ef829965", 0x53}, {&(0x7f0000001f80)="0ac406c8337cf572c6d6d2ff6fadd02abd6bd273d7a9f3b11b", 0x19}, {&(0x7f0000001fc0)="12be09ee810b5d147cb80212b49af628070e54fffed1c98c37da346ec4fc475f69182a3645d4873cf18234b538b50bb9b92a97a26e3def313e9dae8030e5c470f42b8cb6721df9326de703588a0afa3de5138cd6db82a19eb88c421c5368094e103d56c4a887bf170bdfdac1f1f1191ed1844036d438cec156cab3857d598f73df21ef3b2f0a3e5bbb906303085320656b5c6093ebdc458c56f0eb4c03e3c7ce64d6a42f31d5fb5962b18608c584e0b63a7169382083549946de332f24bcfcc139955366406dffb265620c3eedf4f608607e5b221ef3c6", 0xd7}, {&(0x7f00000020c0)="9eca063faf550d11fbe6331e113763c110f59b7074effa88ce85c6218e83452d64ba68b3909e2d03a5a9", 0x2a}], 0xa, 0x0, 0x0, 0x40000}, {&(0x7f00000021c0)=@file={0x2, './file0\x00'}, 0x6e, &(0x7f00000043c0)=[{&(0x7f0000002240)="e3e9640262ed4a250f435ec6e1f19181737c2617ff5fc93256e2cd142fed9566deaff546d6705db919904a2ade3e93d5af901f0e89bc280c9dba414fb10ebe678584662c", 0x44}, {&(0x7f00000022c0)="a2548d0f528b28ecabe57409e3ceff9044518b4da22dcfe5f1e5eba96e95671b158f41672e48b74cc16b914fab810faccd55054856d196b8dc5b3ee976ef362a50f844cb7586d801492c8caaa800aaf65e1e3bc951d078601b952459bcd1119c1f3cc8fee59718eff5ebcbf7b9b8077c8cacea5561172075525f1ac4f59a9319c6cdfedc8001c2811d0accf336767b98b3e2943c110afe2c113b812ebedf15f3a6f98923cff3920d4f7a1032bea414d5203350cf162abea8c0ec64e1f64cde062a933ae695bbf317f98bd48e04cca18b5ef69173171b5a6580030de2678519698d38", 0xe2}, {&(0x7f00000023c0)="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", 0x1000}, {&(0x7f00000033c0)="1548341207b58f49baf66fe294bc86d086eb754f8b51f7515b0d5370d4f3150fcbca137bebdaf2cc10934fc6950d76cc61bbf09aa5f2f3d0e7cdcfd515af22a5a3e08bf8bd7e59dc181972130b6268bd58f9bcde4de567f249b005f38b670c70c17483b59f83ea31f4a0d60f9f8c8c2f55172ff6ac74397b4d243f3114ec68ff41ab167a6f37c94a164564aa810f314ea837de73e6ad20e82f382601aab898b39b5198b5ef1013381e41a96b41d57a2b5fe24e09c414447228394ae873df67690c4699c563ead2ce5e8fd0c4f67c057191135fe63d3c261d6e4711afaa0f95302d78aa55d933b72ac032b96646d38c01f0bcb8fd749c036e7b4f0f1487710a392f70f1edd09fd2ff9e14a0e0da03119828359ec1767d986010f4c16eb7d67236e27c3d0235c656a939ce913160706081ef01719db1657124646b7781bfdde765dab441173ec8679f2f1b6497e91094083749bbdd975a3400eba070aea8210e76765215ae2ce0089d3ad7f00012a4f4b15e9cdcb6a36cc23a0ab5d3bab267f8ac2ccacfba7e189e1099b6abea522a1f625692097fdfc62aa79c5b4d616f31267bf97d3f2f2a218c8cd1ade4298632290a8cdb0fc5f4e79ebff58a200007496b2fd78994ab263a09d7333a9c645006ef58cfe7e2030992b6ed35e5bb9f8b156054a32c753695e9777ad0209e09ada0bd3a31249ee5c5d4cd6abc4d3e0a614bbb43957f7e89be4bd15400d90b89e61921b4fc115c56fbce04f481cc20f04eaf23c199c7a9e57b458504884a969eda76eb0c7906ced5fd30a405ca2f657bd5c6919799d3157a3ff8493ed2553e0b86eae0138baa414b221437a276180e8eca9078a9516b5cc39326a3eef65b83046b2ff19561eba1a100233164ab8e47c5f327b4bf7c7218c7919638d2cd5a7c69c7293459681d6474ac71e886de688bc09975cfc242e18ac7fd38a242c10f6f59c4d7ef7f74b55c8c159213d53dd7a0709192a3ea7e0f90af48df199360cc9ac08d9379c0470780411f60b656fc726cb051b8063103e561513ad2ddcd329a8f3cafbd63088c829f5ce4b5d2a6b3f62149c14654588cc9da8ef6d80cecac65b980e0db761a25e488429d03befa8e4bc27f684d822dfa95d6c041cd9c63845190176d5420b5d5f9aee621a263f34c9af941ad6fa71984235ca709b55b65378496ac4e61c8825451d189164367c48ee169c67c912310847c9711ebf514d5b716f9e992db29a1dfef2dd2402c86b3e3b8c93adbdd66d4129eeed76856cc6b323cbfa83553a8a3c1ed0fc92d02ba9d3e44dc3b46af8e0f0da935a33d141118a142ff75d12e7d060cfebf212132388ee231be187ad34d66d18a64886d1d304eac2dd7b214854402875bc6341c0a19234833874d278640a68b17c1fe5abe704f0ca75cbeda701b5cc30d654017647a7a2880fbfe6ed5385d86ccb2ca7d7042a4549820a87bea50e0349c8fcf7694980277cc66c1c94c0b4ea4ba90ae7da7daf2342ab0128558a55214dd99e053f7bad2483ff11c2ccda9c4e14b2f43d0991d3313eaa3a7e26baad83e2309217bd61f18b3768ff7f809a55d01d3da8fd5e798689e9a6b50df9d462021e1d392e0efea95a1d8074798b69dc36988d5a818c5310efe7956a3b1c7e9e0dae074eb070c5c979a98b8946ec7eb4276d6684fc276408cf37d50622526c219b94ff558b774b68731b0d0c9064ad8ce7268c15348c4202ee9663629486c68ae51732c64ab9f82dbdcf4f3cbdac845c074a02257ca55dde67dc49d4e765bdfa8c3f08b6e7042444eb89868f634aa325e3e4ed56378baa73b8998d9bfd65e54ad12e259c85c91467f7bf408b23b1ed5cff0c44bd7ae8f28f8ce118cf454430d525524fbb00f34fed764a1da01cb8c8aa937762ed3b330c4ed6cd87ca0da90d5364781a714f9a240d02a353364ed36c336a218b2fffa88c2cc7e6cf670d36f24cb418916789393e126b46019d49e62cb40b6f8a114607c536ee632ef749cb96b72bc186ef74b7bb97da8f8bb031359e16e0337887da06372941b304506f537493f93475f7e92293bcf6e5d43ccf4493746965060e04dcb496e9e2a9962a52fecb7be9f3b027fce7804e7b3a01207ae407a4d404a94bb770ab4189b9c281f836b06ae846a4f5a84f21b2b5900e3fe046bed51f993c882815be591b70d3924b2b03f5dfe70f795b149896d47b0549223c42637776ac6e68cdff3ad52a71c377f205d2ab7f968e2c7b2712b555fb47a95e9986a1722556e7f840a7ec160b571e7e84eb79db746382daaed6d67d7eb7612ed5b02fa4c25843b4694694bdeaf4f3d17f8d231e72894928a3a99e52ec0bcdebdc985d138931f6e85165064739f2d44b4e01e4fd8f50b1a4e9baed74e1c41457d4cbdec5b3e9068afcc674b9f9d6ebd321f910d590454c07c250aaa283d109b944a126ed735662b91d969daad236a3a69582769e341d03860eb46a672321842f2553f944854c8b0dd767e3d5652d9f18e1b5bc12b52a1170ea54dd0300bf00ac5e2dc16d42cc69b11e6987bbc260ac01e243c46514a3d39098d9661811384fc8123a71f51b8bbb6e032f0a471f8c0fbd2169964db15656868bce8a01e81e47d4095fd4d0ec3bdbfae3036c8a4d5105a3dad89f5869398b2ce3ca3e7b8945fa445279c8c003000df6934854727ad49cac0003e5cc2a8b7cbbbc18972fd19cd250d08bd1e0996b7bc8b594c26d98303c93113ed818147c81e45eab72b653e2bb8edec564c228b26d008ba732b7829ac177bc5ce650055e1d139da029bb08cd332f4d537440c538c178dfa92001afbac3566d6d428e66bc84851453a83af4b86367b2050c97d43bd23a7471d351a0eeb84b5ae6dad8b94d0812e856e39416aabba5f9252e33eccb513ab29d592d72642394a582a3c956755016a8043dc48b1704107b4759d269f1686a7a8b72fc4264370b43fc2e322d18634bac7e591b678a700761f56e3f8978d701c815884c93d055083ee19679d6947afdbda8936aca2da7b488ea61cbe0815f4985ff4b121dc4710e3a3250c8396e24969d67c359bbad00df1f877a823a83597be6814308e3598ee8237bfb686eb5e6a2eb7aeabdb5418ec629b2b10d7f0c74c28c4ac18e1d7251406a58a0e935ab8d0bd76224b16ee3b9a737ebf1a8b85912765a325e04affcaeb2bc6071f6ca0e6175126dfc0c1d7d96afeeca80cbc06d94e5ea2a9ad22dd8f3a16996f29bf895e0cbe551e6c515c5369d0739bc9ec1cfc7f4e96d10ed6b027ded9f19fabe8938d3138b5d4fdd0e7c1d7845dc70271fb92e7dbd35af0ffb3ebda9a2f1d59def7d77771ed4e2962dd6936c6f3d30b37eb8164ab38053ce3906a361bd2e1823599af9b156a528890b947ca326005ee93630459957455465db663f8a084d5f867fb421f812ec175c5a5d9c8338bc276c43f4cc27c597aed2e5bb6a3238a5c53be88109e53a60832b273b2d9848084cd7943ab0c9a64805380ebae559aeb91b1a370a29689ccab64ac417b6b3ba2318a3f933a220542bd4af860b9fc9ab1db82c342504ce9ef1522f91825d7f3e8e510b5235d71709d4db943c4a00a7eeb6d295385241e3916ce0feb4e957d276de692b4e55966c732819795fe74cf2e9fd99b1fceed365a5031819aaae31bb31135acff74aa1a2ccab6eef97d1c27ad5886ad6d3a43e32d15570a3c85e967faebf99b9c9c1a7ebe8f2369384d611fe434a15f9f076cb0e91a7147a68f4bc9c86eb6204febad5ac5ebfc29aed3f391235c9c9a55e9656ed9d9509ef7cdf86bac1522fb987d82eac7395e869c08158d07f66ee4474b74068a62ea3166d55b2dc27a6e54eb4bf82d20ab2bd26fb7c435c89de82236c1f387e6249b2cf65b67f7e441074fbab8653af67d7dcc41f3515e0e60aeb52121dda3f981775904c96daaf4125afe2af9d90fb4fe1fa4589207a80fb29e6bfb148e8b291f48280d5bb103a6aafb45191bd14de3e52eafe611629b22b17c79ed6db616dde97d9785d198e74eeeba6420b0f552d97f317b8165950ee2ba30a14ce58bfb410b8b78c5d2e81a13556542b44689a286d7c279e7ccc000006a14b824fba8d9d4ddfb75c68cb6329280fd8e7b9c87bb46bb2847f8ce6d24bb67199eb3dc1de61099e8cd1170aa78eeea5e0e96e7d0404233ca5051e3a7929bca6e01f270f4f4d81663c064063edc81db02a6cfc9af1f3f909ecec1d00b77ffa3fca3ee9ae60e977234bc8cb782f795cd8b7c853b1a89fb3c6bf8e35a53077cb9396f4bfdd7e769b7f242711bbc85ead1d773f56ee35afc746fa6b4bb6c9134506518863b972cb6bd30d2170a6b8b28948018afa72129f0a972c914bcb14cee375c9eb6bcb15a198e49dbf0627d9d3e543cbb0d278fbb589a3376f83ecd339929707da671fcdf41efa22a94a73d89f7c7cbe6c5aa57fc988ec4ce3d66dd6606817fb9c7d965c2b854e6aec77d49e86de6fcc99e7e62700c567491743a5ce5d26b1b1d5c68d3e20c773dc3f1dbe92136f11318135df749b1c788e24a2e9758d17498cc49d9cbfe56993e06d63b4aa27e95660b9e0defb383fc809b0ec6252310223aa1ae3c799939b0d7445d0c9ad4e5b5c44b8f9bf4acf9949ce38f7f49a6533268e165eaaaf4624cda62c6dcc5001d9eb5d2eccee79f20c83e8f4b87a8c37b59b51fbe69746ebce7a5d57c10e82f0ba2a550647f68b7d8e28fa08adc3f342911b6b7daa22e074e8bd668247bb3958df68716571bf7a7d8975b8bcf42c08cfeed0a5ddcebca893cd0f3383f65e8c245f3289a767f80b0dd6193fabd9b4f4c3c9633c6fa5436811be1b7d22aee69831101c799d4992748a7e704cdc02a196c99ea60ea3654943f5989eef9630c22aad38cd03bcd52bbad613df3bf2887eaccdb669260fe9f5839553c3f4eb43248abad36b74d12d27c51d5181326d2973b4a0c924e8b0747e6c3907f714728c4f8b8a30eb0b53e36f8bf5461f8cf12cb31553cff547728ac810545e261ae533af83890b241fec8362bec282c9d2b456e6f61ca8ca0a842e1c2c0b58488a29589632a9f7dff85e86d88b4fe5ab567a68788e8d3084694ea4b8e002a0d9f1b580cd3d501b58d3bf2f52b2a44b984b9c278832f4ec765d2132e02605fcbd9cda68bc7aa5dd66000cbbf45c7fdac77a8f4acf71d13aa0cafd50eac376d0e34ab04292678e0bcafe26e1b7d262a8dabcb8fdb3a57bb6da07d5586f440d7f1c3f52f3dc857c1d6a56d12c60fedda8d00e638313fbcd4430976acc931fc9c046887666510e194a64d580b569bf1c8190b7cb492994f2d2cf07f26789435a6bbc7dba31c7fa931095bec096ab7f21a0411e58184aaca24be2b0d1e111804379225eaabfced6746501767d41ff632cccdc4acdceb92c9ad297f8ad893348186663373669010edf630983eb5319446bc36209668bbad734dda1faec26206c265d69f1373405c6d9e9753d62fdff78794c7f02e9ba2b327076996f3269de98e771e1c4a958878a1ce039952a1fbcd23289e5a24554f4f430312f51e69402d01aea282f3b9dddb02c0b8fb712f3ec58519fcafbe87445d5089967489859d23ccb100f6cf474370c84e4283f7994c2eccd8337c9237efc9c644cb338158dd4f4cbecec6404b21f384b0fdde80f62d7a0e5e30ff2623b5b24c78c76d47ad41d8b6d27fec356b1e16aa50f4c5c5194dc03c1caa888705bc89189391f492409ea9107c08fd74f2a42f7d57f4faf85fd9be7a422b514d7195c9c9ced9b116062d594b6f0c1b79de25963f0065", 0x1000}], 0x4, &(0x7f0000004480)=[@rights={{0x14, 0x1, 0x1, [r37]}}, @rights={{0x34, 0x1, 0x1, [r3, r38, r1, r39, r42, r43, r1, r1, 0xffffffffffffffff]}}], 0x50, 0x20000000}, {&(0x7f0000004500)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000004680)=[{&(0x7f0000004580)}, {&(0x7f00000045c0)="fb0abc7a5ba5bf3c2f4df3c0dcee4b512a8e9f9d1425b9bd87116eeab353cb71d3dc090c21184c25f948208a5d306e2d6522cc1bde3dbbf4acf0441057611a0776b351871a12f4384eb21cd1dc08d85ec579ddf6805ebf40b3a7a6d66a65c8e8d15de300f33dd9cc838599e686c62882df7f8293eea569cf6baf324834b8f66ad39a51ec26dd3eae21632a0128120c7b2522ec67ba6e686d06baabe6ef5986c343947b4e5590", 0xa6}], 0x2, &(0x7f00000046c0)=[@rights={{0x1c, 0x1, 0x1, [r1, r44, r0]}}, @cred={{0x1c, 0x1, 0x2, {r45, r47, 0xffffffffffffffff}}}], 0x40, 0x8000}, {&(0x7f0000004700)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000004880)=[{&(0x7f0000004780)="cb093516dca4d530bc6287281342997119600e4e846de1dc6fa0bb40a834e873aec8e5558978ec7cf4de6eeb8dd1e359ea6948af4b2fd2fec99c89a202a3e170e698aff9138b53aa96c6ea8d33b87b500340b3df3ffde0cc0881a9f2bd7eec91fc86f149df0233c70653b4ccde71a288bc8ef8cec2b1d5960db3738a11e03dd2327e029453082602dd951c825ce569ddfb0aebd67942222766d1167fd591ccbb490b639ca0b7c20bde9ed3d28a8c12d782d723c9e8f687eae63cf76b24eb1f93aa641f50208b1ec50d2779a06724114ca55cff5ccb6771874885fdd5a85a9ac3eb112818", 0xe4}], 0x1, 0x0, 0x0, 0x4000000}, {&(0x7f00000048c0)=@abs={0x1, 0x0, 0x37}, 0x6e, &(0x7f0000004f80)=[{&(0x7f0000004940)="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", 0xfe}, {&(0x7f0000004a40)="b9e4ffaff911df3492", 0x9}, {&(0x7f0000004a80)="9a354b9cff8f46218a37b865b83ce7c97e265d5af25614aec2b44e12e4ce22a44fe03f209a50b3aa97ad93d2bf257c65e43cccc482ca1b7b1f1c1873fc83acf4819379d770ddfe9e86aea9e35050abcc9d712f5e", 0x54}, {&(0x7f0000004b00)="b4c481476a9cbc144eca36fd0e12d67f", 0x10}, {&(0x7f0000004b40)="f9d54578", 0x4}, {&(0x7f0000004b80)="5c80598b1fdaa2ec172d686569bdb46a94a30e5ebae0c21d9552ca9e2f16be6b07e621f39afc60762882bbdb95434ca6872b6327880da05efa74372a90f1289bde7c770601d3456d3fdfb6d94d5edd6c74df", 0x52}, {&(0x7f0000004c00)="ff64607f8c09f28fbfac4a0bf6193771bfbe378ada2886e934a7718f9499941e2d27203d202e077bc9ceccd4b46274e21553c6b4ea8d07f6553f91c7bc23f5d878a914196200bfb0a6537c14d5b3c010dceb7e899384cd2ac4304e7bfc06b48c1900c0eaccb60b61c08a099fe0636afa67d6ba07b40bf5f222958cf7d2f1ad763ed919ca4d7f8dcdfe92008017dd8096a226fb454d4d0dac0301f7fe73c3bb03d3aabe9eebae2fbee2331a26df", 0xad}, {&(0x7f0000004cc0)="ab47ea5af28601f1c05bce7f9758c338d1f7556e38a7b9869fd7c7e303402830375a562341cd45ae6b01c4b66f8fbf8efe6f5a5c565df3bbbfbe090c65196fd7e02c45aac7005b5504dfbd6897b8f8be85a3c38a757676c31c6ade782eb8db8932e5be189369751a34dc06384614c594a73461b3688f9fca0e12df17382f1538f5365277657d5829c4f27e646913adfdc15c64badb6256d6ae5695eb942d5027baf6a1ca04cbbd8f6595c63a66dd94833d7aef2cce5b910dcb3e44137e4e7892a2f3844d3b8474fb8fc26ce187b0a13ce9f8f75f1923764e47f2e78b008cd6ad", 0xe0}, {&(0x7f0000004dc0)="f9ffe060d32299c84c1c166dc6b72c5eb3ab0689f576812755596619d0b2965e0db0cf7d5163321459477929e58b42f47e2cb2ac7d57a4979a441a22deb3f0136de2352a657a206a41bb731e26cebe080007911ef07b0973f31419d1d043c2f0a1c7f21a070a89f4061a78efef36ff313f7f0d78fb73573b3ec122d7d26072bbf0f3dbe0347786ff81878c73bc4c4f7b10e231998cd8a0e4ed5a3aaec2f51d5de46f4424e317b4990b7b5fb822d95331c7af900d4a5160d0fadc6f1581432f9c4371b5b0b5b41bca755542db508c1a752dd3f75a7c3cb0a0bc549e4f53427404ca555545c6b43dcdd8ac13", 0xeb}, {&(0x7f0000004ec0)="c230a47c43003dc95c962044fc93b790b0ace2ed2019cb8dd9b9a4aff6644f563b524dfabf9006269fad9dffdd2749b135b6f23778314e25c5fd245c0ef333d072812ac3bc313ddc6cd1f5bdb27390bb464aa98922a5ce13e39b6a8cf29161b7cdbb61ed700229f87ba1811f3b09c04cc904564d143e21f17207e6b7cf1da57a0161dc50f6b1fc3b24afd3df4d589a36215a23c681ff395642d7d396845aa9cab6e1f397ac617f0b3f6902c1afbdab16a273bcde27e0048d9d", 0xb9}], 0xa, &(0x7f0000005240)=[@rights={{0x30, 0x1, 0x1, [r48, r4, r49, 0xffffffffffffffff, r50, r2, r51, r52]}}, @cred={{0x1c, 0x1, 0x2, {r53, 0xee00, r54}}}, @cred={{0x1c, 0x1, 0x2, {r55, r57, r58}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r59, r61, r62}}}], 0xb0}, {&(0x7f0000005300)=@abs={0x3, 0x0, 0x4e22}, 0x6e, &(0x7f0000005640)=[{&(0x7f0000005380)="d0b8a90c32e43ad882ea0cf5281ad3036e19249c95df034ab704b8724cbe5a34eb5f5ba591902278c71433139136014f243e25a48417b8b4cff9426c931679931bf0d727ccc69b624d4a3eacbcd53a5f6715b9b1b5ac112a31f69516a0386862ffb58aeb4b4660b2d968a7e01801a38b2a3b2ffcd60bbf9896891ee88f625f4b435c87d2180bf2aea373ce59fd3d13d8c8ef5168de89c83b59903206916d864a88", 0xa1}, {&(0x7f0000005440)="654513abe748f77737248425d3068605339f8e8f9fd6b8cbb867c801996955b9ca3ee322fbdcdc1735b2d06b27cc8fc0bccdcfad8a7b6a4cfa91fa5c8af490221e77eafaa47b47865350c54219480a2edc2805e74c2e41aaa3e2198b3bfa92bf1fa183254e664b627d7542c8738a2b0a7a42a65b497a1cd4f1c7f499c7a86ce9e94c9d92af07a07fc29a3c4e70bb6c1985be8cc0e27eb8d08be3114939830bb0d5627c3c71ecb301bb0225cc722b5ef64f66b448e8e3c781e008300c6a3eceb88ec113ebd7f8e158acecad5919c6b42cfb0d2d141097d3dd6f4c9c4050bb7a4194865d71ea4596cf019d72d2b1", 0xed}, {&(0x7f0000005540)="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", 0xfa}], 0x3, &(0x7f0000005a00)=[@cred={{0x1c, 0x1, 0x2, {r63, r64, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r67, 0xffffffffffffffff, r68}}}, @rights={{0x14, 0x1, 0x1, [r69]}}, @cred={{0x1c, 0x1, 0x2, {r70, r72, r74}}}, @cred={{0x1c, 0x1, 0x2, {r75, r76, r77}}}, @rights={{0x2c, 0x1, 0x1, [r4, r78, r2, r79, r80, 0xffffffffffffffff, r81]}}, @cred={{0x1c, 0x1, 0x2, {r82, r84, r86}}}], 0xe8, 0x34000069}], 0x8, 0x20000000) r87 = dup(r4) ioctl$sock_SIOCETHTOOL(r87, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) connect$netrom(r87, &(0x7f00000001c0)={{0x3, @null, 0x7}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @default, @null, @bcast, @null]}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r3, 0x12, 0x2, &(0x7f0000004580)=""/6, &(0x7f00000000c0)=0xffffffffffffffa1) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002d00810065160b00000040d880ffffff0ef430f799ffffffff0000000100000009ff55789ab91a457244", 0x2e}], 0x1}, 0x0) 17:18:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f00000000c0), 0x4) 17:18:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc", 0x54, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 326.442060] print_req_error: I/O error, dev loop3, sector 128 17:18:48 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB='7\x00'/16]}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1600}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0x100, 0x70bd2a, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x84001) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x40000, 0x0) 17:18:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8dc7d42c72ed0200000000000001cd0cc74312571977000000007a000007000000f6f2a2299748aeb81e1b00920efd9a000001000000000001fbfffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:18:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc", 0x54, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 326.779222] BTRFS: device fsid 00f6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop2 17:18:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8dc7d42c72ed0200000000000001cd0cc74312571977000000007a000007000000f6f2a2299748aeb81e1b00920efd9a000001000000000001fbfffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:18:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) 17:18:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc", 0x54, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:48 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) 17:18:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB='7\x00'/16]}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1600}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0x100, 0x70bd2a, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x84001) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x40000, 0x0) 17:18:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) 17:18:49 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(0xffffffffffffffff, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df8", 0x49, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB='7\x00'/16]}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1600}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0x100, 0x70bd2a, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x84001) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x40000, 0x0) 17:18:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) 17:18:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 17:18:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df8", 0x49, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:49 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) 17:18:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB='7\x00'/16]}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1600}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0x100, 0x70bd2a, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x84001) 17:18:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 17:18:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x19, 0x0, &(0x7f0000000040)) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000080)={0x7fff, 0xf4, 0x1000, 0x9, 0x0, 0x1c00000}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf220e206f47803371be231dbf3", 0xca, 0x10000}], 0x0, 0x0) [ 328.063357] BTRFS error (device loop2): unsupported checksum algorithm 6967 [ 328.094602] BTRFS error (device loop2): superblock checksum mismatch [ 328.152966] BTRFS error (device loop2): open_ctree failed [ 328.176910] BTRFS error (device loop2): unsupported checksum algorithm 6967 [ 328.186246] BTRFS error (device loop2): superblock checksum mismatch [ 328.340437] BTRFS error (device loop2): open_ctree failed 17:18:49 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(0xffffffffffffffff, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df8", 0x49, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 17:18:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc822, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000580)={{&(0x7f0000e00000/0x200000)=nil, 0x200000}}) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x4191af8e) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) 17:18:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB='7\x00'/16]}) syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') [ 328.509041] bond0: Releasing backup interface bond_slave_1 17:18:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15", 0x4f, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf220e206f47803371be231dbf3", 0xca, 0x10000}], 0x0, 0x0) iopl(0x8) 17:18:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB='7\x00'/16]}) [ 328.678066] BTRFS error (device loop2): unsupported checksum algorithm 6967 [ 328.695965] BTRFS error (device loop2): superblock checksum mismatch [ 328.753863] BTRFS error (device loop2): open_ctree failed [ 328.763165] BTRFS error (device loop2): unsupported checksum algorithm 6967 [ 328.775619] BTRFS error (device loop2): superblock checksum mismatch [ 328.822716] BTRFS error (device loop2): open_ctree failed [ 328.831718] BTRFS error (device loop2): unsupported checksum algorithm 6967 [ 328.839220] BTRFS error (device loop2): superblock checksum mismatch 17:18:50 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:18:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x200, 0x0) 17:18:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) dup(r0) [ 328.932705] BTRFS error (device loop2): open_ctree failed [ 328.960122] net_ratelimit: 20 callbacks suppressed [ 328.960128] protocol 88fb is buggy, dev hsr_slave_0 [ 328.970259] protocol 88fb is buggy, dev hsr_slave_1 17:18:50 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(0xffffffffffffffff, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15", 0x4f, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) 17:18:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:18:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:18:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:18:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:18:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15", 0x4f, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 329.540292] print_req_error: I/O error, dev loop2, sector 128 [ 329.680125] protocol 88fb is buggy, dev hsr_slave_0 [ 329.685283] protocol 88fb is buggy, dev hsr_slave_1 [ 329.690438] protocol 88fb is buggy, dev hsr_slave_0 [ 329.695484] protocol 88fb is buggy, dev hsr_slave_1 17:18:51 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:18:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:18:51 executing program 3: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 329.840141] protocol 88fb is buggy, dev hsr_slave_0 [ 329.845285] protocol 88fb is buggy, dev hsr_slave_1 [ 329.920152] protocol 88fb is buggy, dev hsr_slave_0 [ 329.925286] protocol 88fb is buggy, dev hsr_slave_1 [ 329.930966] print_req_error: I/O error, dev loop2, sector 128 17:18:51 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:51 executing program 3: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) dup(0xffffffffffffffff) 17:18:51 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:18:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266", 0x45, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:51 executing program 3: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) 17:18:52 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:52 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:18:52 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) 17:18:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266", 0x45, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:52 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:52 executing program 4: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:18:52 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) 17:18:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266", 0x45, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:18:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:52 executing program 2: syz_mount_image$btrfs(0x0, &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) 17:18:53 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:18:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:53 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) 17:18:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:18:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) 17:18:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:18:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:53 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) 17:18:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df8", 0x49, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 332.484365] print_req_error: I/O error, dev loop2, sector 128 17:18:54 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r2 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) 17:18:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:18:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) 17:18:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df8", 0x49, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:18:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x0, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2, 0x0) 17:18:54 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df8", 0x49, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 17:18:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2, 0x0) 17:18:55 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r2 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) 17:18:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x0, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2, 0x0) 17:18:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 17:18:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x0, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x2, 0x0) [ 334.000137] net_ratelimit: 20 callbacks suppressed [ 334.000143] protocol 88fb is buggy, dev hsr_slave_0 [ 334.010286] protocol 88fb is buggy, dev hsr_slave_1 [ 334.080173] protocol 88fb is buggy, dev hsr_slave_0 [ 334.085344] protocol 88fb is buggy, dev hsr_slave_1 17:18:55 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 17:18:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x0, &(0x7f0000000040), 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:56 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r2 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) 17:18:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x2, 0x0) 17:18:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 17:18:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x0, &(0x7f0000000040), 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x0, &(0x7f0000000040), 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x2, 0x0) [ 334.640119] protocol 88fb is buggy, dev hsr_slave_0 [ 334.645302] protocol 88fb is buggy, dev hsr_slave_1 17:18:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:56 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 17:18:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x2, 0x0) 17:18:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 335.200155] protocol 88fb is buggy, dev hsr_slave_0 [ 335.205289] protocol 88fb is buggy, dev hsr_slave_1 17:18:56 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) 17:18:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x2, 0x0) 17:18:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 17:18:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x0, 0x0) 17:18:57 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) 17:18:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x2, 0x0) 17:18:57 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:18:57 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) 17:18:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x0, 0x0) 17:18:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x2, 0x0) [ 335.930157] protocol 88fb is buggy, dev hsr_slave_0 [ 335.935316] protocol 88fb is buggy, dev hsr_slave_1 17:18:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x0, 0x0) 17:18:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:18:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x2, 0x0) 17:18:57 executing program 5: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) 17:18:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) [ 336.244454] print_req_error: I/O error, dev loop2, sector 128 17:18:58 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(0xffffffffffffffff, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:58 executing program 5: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) 17:18:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x2, 0x0) 17:18:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 17:18:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:18:58 executing program 5: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) 17:18:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x2, 0x0) 17:18:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 336.885520] print_req_error: I/O error, dev loop2, sector 128 17:18:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 17:18:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:18:58 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:59 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(0xffffffffffffffff, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x2, 0x0) 17:18:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 17:18:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:18:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 17:18:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x2, 0x0) 17:18:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:18:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x2, 0x0) 17:18:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:18:59 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:18:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 17:19:00 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(0xffffffffffffffff, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2", 0x24, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x2, 0x0) 17:19:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x0, 0x0) 17:19:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 17:19:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x2, 0x0) 17:19:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x0, 0x0) 17:19:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 17:19:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x0, 0x0) 17:19:00 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x2, 0x0) [ 339.360114] net_ratelimit: 20 callbacks suppressed [ 339.360119] protocol 88fb is buggy, dev hsr_slave_0 [ 339.370176] protocol 88fb is buggy, dev hsr_slave_1 17:19:00 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 17:19:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x0, 0x0) 17:19:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x2, 0x0) 17:19:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x2, 0x0) 17:19:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x0, 0x0) 17:19:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x2, 0x0) 17:19:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) 17:19:01 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x0, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x0, 0x0) [ 340.080158] protocol 88fb is buggy, dev hsr_slave_0 [ 340.085314] protocol 88fb is buggy, dev hsr_slave_1 [ 340.090462] protocol 88fb is buggy, dev hsr_slave_0 [ 340.095513] protocol 88fb is buggy, dev hsr_slave_1 [ 340.240113] protocol 88fb is buggy, dev hsr_slave_0 [ 340.245244] protocol 88fb is buggy, dev hsr_slave_1 17:19:01 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x2, 0x0) 17:19:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) 17:19:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) [ 340.330201] protocol 88fb is buggy, dev hsr_slave_0 [ 340.335325] protocol 88fb is buggy, dev hsr_slave_1 17:19:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x2, 0x0) 17:19:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 17:19:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 340.424557] print_req_error: I/O error, dev loop2, sector 128 17:19:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) 17:19:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 17:19:02 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x0, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000", 0x3f, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:02 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x2, 0x0) 17:19:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 17:19:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 17:19:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x2, 0x0) 17:19:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 17:19:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 17:19:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x2, 0x0) 17:19:03 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x0, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 17:19:03 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r2 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) 17:19:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f424852", 0x44, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x2, 0x0) 17:19:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 17:19:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) 17:19:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x2, 0x0) 17:19:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) 17:19:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) 17:19:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 342.371399] print_req_error: I/O error, dev loop2, sector 128 17:19:03 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x0, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x2, 0x0) 17:19:04 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r2 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) 17:19:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) 17:19:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) 17:19:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x2, 0x0) 17:19:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x2, 0x0) 17:19:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) 17:19:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x2, 0x0) 17:19:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) 17:19:04 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x0, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:05 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r2 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) 17:19:05 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) 17:19:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:19:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:05 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) 17:19:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 17:19:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c9f80ab4d15e2eb40b1cc142415e760291210d1076ad2bcd1442550d3a0de5d057593344e942b26125097d76e06fb0ac0fb804de942414c714912d4b12173755712b9eebb8eb5dd1d9213dc7f105984cf86e7ce1404116efdbe3613a2b3cab8febcbb02729bc7886ff7aa3fe210efe8e56cddcbf220e206f47803371be231dbf3", 0xca, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000080)) 17:19:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:05 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x0, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:05 executing program 0: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) [ 344.231795] BTRFS error (device loop4): unsupported checksum algorithm 6967 [ 344.260548] BTRFS error (device loop4): superblock checksum mismatch [ 344.320701] BTRFS error (device loop4): open_ctree failed [ 344.400130] net_ratelimit: 20 callbacks suppressed [ 344.400135] protocol 88fb is buggy, dev hsr_slave_0 [ 344.410242] protocol 88fb is buggy, dev hsr_slave_1 [ 344.480170] protocol 88fb is buggy, dev hsr_slave_0 [ 344.485318] protocol 88fb is buggy, dev hsr_slave_1 17:19:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) 17:19:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x200000000d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc822, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/kvm\x00', 0x0, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x4191af8e) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) 17:19:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) 17:19:06 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0xa40}, 0x10) sendmsg$can_bcm(r2, &(0x7f0000000000)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={0x0}}, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r3, 0x16) 17:19:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) 17:19:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) [ 344.913533] bond0: Enslaving bond_slave_1 as an active interface with an up link 17:19:06 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0xa40}, 0x10) sendmsg$can_bcm(r2, &(0x7f0000000000)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={0x0}}, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r3, 0x16) 17:19:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4df82c", 0x4a, 0x10000}], 0x0, 0x0) [ 345.040157] protocol 88fb is buggy, dev hsr_slave_0 [ 345.045297] protocol 88fb is buggy, dev hsr_slave_1 17:19:06 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:06 executing program 2 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:06 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r2, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0xa40}, 0x10) sendmsg$can_bcm(r2, &(0x7f0000000000)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={0x0}}, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r3, 0x16) 17:19:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) 17:19:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 345.195724] FAULT_INJECTION: forcing a failure. [ 345.195724] name failslab, interval 1, probability 0, space 0, times 0 [ 345.236433] CPU: 0 PID: 20841 Comm: syz-executor.2 Not tainted 4.14.151 #0 [ 345.243490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.252854] Call Trace: [ 345.255563] dump_stack+0x138/0x197 [ 345.259239] should_fail.cold+0x10f/0x159 [ 345.259257] should_failslab+0xdb/0x130 [ 345.267368] __kmalloc+0x2f0/0x7a0 [ 345.270916] ? __sb_end_write+0xc1/0x100 [ 345.274972] ? strnlen_user+0x12f/0x1a0 [ 345.278930] ? SyS_memfd_create+0xba/0x3a0 [ 345.283176] SyS_memfd_create+0xba/0x3a0 [ 345.287234] ? shmem_fcntl+0x130/0x130 [ 345.291121] ? do_syscall_64+0x53/0x640 [ 345.295135] ? shmem_fcntl+0x130/0x130 [ 345.299009] do_syscall_64+0x1e8/0x640 [ 345.302937] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 345.307799] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 345.312979] RIP: 0033:0x459f49 [ 345.316179] RSP: 002b:00007f4cbfb52a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 345.323894] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f49 17:19:06 executing program 4 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:06 executing program 1: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) [ 345.331154] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004beff7 [ 345.338421] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 345.345677] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f4cbfb536d4 [ 345.352936] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:06 executing program 2 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 345.399794] FAULT_INJECTION: forcing a failure. [ 345.399794] name failslab, interval 1, probability 0, space 0, times 0 17:19:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:07 executing program 1: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) [ 345.495100] FAULT_INJECTION: forcing a failure. [ 345.495100] name failslab, interval 1, probability 0, space 0, times 0 [ 345.519956] CPU: 1 PID: 20854 Comm: syz-executor.4 Not tainted 4.14.151 #0 [ 345.527035] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.527041] Call Trace: [ 345.527059] dump_stack+0x138/0x197 [ 345.527078] should_fail.cold+0x10f/0x159 [ 345.527094] should_failslab+0xdb/0x130 [ 345.527104] __kmalloc+0x2f0/0x7a0 [ 345.527114] ? __sb_end_write+0xc1/0x100 [ 345.550806] ? strnlen_user+0x12f/0x1a0 [ 345.562357] ? SyS_memfd_create+0xba/0x3a0 [ 345.566611] SyS_memfd_create+0xba/0x3a0 [ 345.570684] ? shmem_fcntl+0x130/0x130 [ 345.574573] ? do_syscall_64+0x53/0x640 [ 345.578548] ? shmem_fcntl+0x130/0x130 [ 345.578562] do_syscall_64+0x1e8/0x640 [ 345.578572] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 345.578591] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 345.578599] RIP: 0033:0x459f49 [ 345.578605] RSP: 002b:00007f295d48da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 345.578614] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f49 [ 345.578622] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004beff7 [ 345.586376] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 345.586383] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f295d48e6d4 [ 345.586389] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 345.600123] protocol 88fb is buggy, dev hsr_slave_0 [ 345.616579] CPU: 0 PID: 20862 Comm: syz-executor.2 Not tainted 4.14.151 #0 [ 345.622161] protocol 88fb is buggy, dev hsr_slave_1 [ 345.629334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 345.670190] Call Trace: [ 345.672764] dump_stack+0x138/0x197 [ 345.676377] should_fail.cold+0x10f/0x159 [ 345.680509] should_failslab+0xdb/0x130 [ 345.684468] kmem_cache_alloc+0x2d7/0x780 [ 345.688596] ? __alloc_fd+0x1d4/0x4a0 [ 345.692380] __d_alloc+0x2d/0x9f0 [ 345.695816] ? lock_downgrade+0x740/0x740 [ 345.699946] d_alloc_pseudo+0x1e/0x30 [ 345.703762] __shmem_file_setup.part.0+0xd8/0x400 [ 345.708594] ? __alloc_fd+0x1d4/0x4a0 [ 345.712374] ? shmem_fill_super+0x8c0/0x8c0 [ 345.716682] SyS_memfd_create+0x1f9/0x3a0 [ 345.720826] ? shmem_fcntl+0x130/0x130 [ 345.724694] ? do_syscall_64+0x53/0x640 [ 345.728646] ? shmem_fcntl+0x130/0x130 [ 345.732516] do_syscall_64+0x1e8/0x640 [ 345.736385] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 345.741234] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 345.746416] RIP: 0033:0x459f49 [ 345.749597] RSP: 002b:00007f4cbfb52a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 345.757309] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f49 [ 345.764567] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004beff7 [ 345.771820] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 345.779085] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f4cbfb536d4 [ 345.786353] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:07 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:19:07 executing program 1: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r1, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) 17:19:07 executing program 2 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:07 executing program 4 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 346.042115] FAULT_INJECTION: forcing a failure. [ 346.042115] name failslab, interval 1, probability 0, space 0, times 0 [ 346.044045] FAULT_INJECTION: forcing a failure. [ 346.044045] name failslab, interval 1, probability 0, space 0, times 0 [ 346.067059] CPU: 0 PID: 20888 Comm: syz-executor.2 Not tainted 4.14.151 #0 [ 346.074108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.083557] Call Trace: [ 346.086151] dump_stack+0x138/0x197 [ 346.089787] should_fail.cold+0x10f/0x159 [ 346.089804] should_failslab+0xdb/0x130 [ 346.089819] kmem_cache_alloc+0x2d7/0x780 [ 346.097936] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 346.097951] ? rcu_read_lock_sched_held+0x110/0x130 [ 346.097959] ? shmem_destroy_callback+0xa0/0xa0 [ 346.097969] shmem_alloc_inode+0x1c/0x50 [ 346.121261] alloc_inode+0x64/0x180 [ 346.124880] new_inode_pseudo+0x19/0xf0 [ 346.128845] new_inode+0x1f/0x40 [ 346.132462] shmem_get_inode+0x75/0x750 [ 346.136438] __shmem_file_setup.part.0+0x111/0x400 [ 346.141353] ? __alloc_fd+0x1d4/0x4a0 [ 346.145137] ? shmem_fill_super+0x8c0/0x8c0 [ 346.149449] SyS_memfd_create+0x1f9/0x3a0 [ 346.153589] ? shmem_fcntl+0x130/0x130 [ 346.157459] ? do_syscall_64+0x53/0x640 [ 346.161415] ? shmem_fcntl+0x130/0x130 [ 346.165293] do_syscall_64+0x1e8/0x640 [ 346.169161] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 346.173992] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 346.179164] RIP: 0033:0x459f49 [ 346.182349] RSP: 002b:00007f4cbfb52a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 17:19:07 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 346.190041] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f49 [ 346.197295] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004beff7 [ 346.204546] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 346.211799] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f4cbfb536d4 [ 346.219048] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 346.237892] CPU: 1 PID: 20890 Comm: syz-executor.4 Not tainted 4.14.151 #0 [ 346.244937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.244942] Call Trace: [ 346.244957] dump_stack+0x138/0x197 [ 346.244975] should_fail.cold+0x10f/0x159 [ 346.244990] should_failslab+0xdb/0x130 [ 346.260543] kmem_cache_alloc+0x2d7/0x780 [ 346.260556] ? __alloc_fd+0x1d4/0x4a0 [ 346.260573] __d_alloc+0x2d/0x9f0 [ 346.260584] ? lock_downgrade+0x740/0x740 [ 346.260596] d_alloc_pseudo+0x1e/0x30 [ 346.260607] __shmem_file_setup.part.0+0xd8/0x400 [ 346.260615] ? __alloc_fd+0x1d4/0x4a0 [ 346.260625] ? shmem_fill_super+0x8c0/0x8c0 [ 346.300963] SyS_memfd_create+0x1f9/0x3a0 [ 346.305141] ? shmem_fcntl+0x130/0x130 [ 346.309057] ? do_syscall_64+0x53/0x640 [ 346.313042] ? shmem_fcntl+0x130/0x130 [ 346.316934] do_syscall_64+0x1e8/0x640 [ 346.320929] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 346.325844] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 346.331024] RIP: 0033:0x459f49 [ 346.334201] RSP: 002b:00007f295d48da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 17:19:07 executing program 2 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:07 executing program 4 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 346.341891] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f49 [ 346.349142] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004beff7 [ 346.356445] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 346.363719] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f295d48e6d4 [ 346.370978] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 346.380146] protocol 88fb is buggy, dev hsr_slave_0 [ 346.385240] protocol 88fb is buggy, dev hsr_slave_1 17:19:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 17:19:07 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 346.436760] FAULT_INJECTION: forcing a failure. [ 346.436760] name failslab, interval 1, probability 0, space 0, times 0 [ 346.464501] FAULT_INJECTION: forcing a failure. [ 346.464501] name failslab, interval 1, probability 0, space 0, times 0 17:19:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 346.500755] CPU: 0 PID: 20911 Comm: syz-executor.4 Not tainted 4.14.151 #0 [ 346.507819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.517187] Call Trace: [ 346.519784] dump_stack+0x138/0x197 [ 346.523425] should_fail.cold+0x10f/0x159 [ 346.527591] should_failslab+0xdb/0x130 [ 346.531581] kmem_cache_alloc+0x2d7/0x780 [ 346.535733] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 346.541180] ? rcu_read_lock_sched_held+0x110/0x130 [ 346.541191] ? shmem_destroy_callback+0xa0/0xa0 [ 346.541201] shmem_alloc_inode+0x1c/0x50 [ 346.541210] alloc_inode+0x64/0x180 [ 346.541218] new_inode_pseudo+0x19/0xf0 [ 346.541226] new_inode+0x1f/0x40 [ 346.541234] shmem_get_inode+0x75/0x750 [ 346.541246] __shmem_file_setup.part.0+0x111/0x400 [ 346.541255] ? __alloc_fd+0x1d4/0x4a0 [ 346.541269] ? shmem_fill_super+0x8c0/0x8c0 [ 346.541288] SyS_memfd_create+0x1f9/0x3a0 [ 346.541301] ? shmem_fcntl+0x130/0x130 [ 346.550986] ? do_syscall_64+0x53/0x640 [ 346.550999] ? shmem_fcntl+0x130/0x130 [ 346.551010] do_syscall_64+0x1e8/0x640 [ 346.551018] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 346.551034] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 346.551041] RIP: 0033:0x459f49 [ 346.551046] RSP: 002b:00007f295d48da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 346.551056] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f49 [ 346.551060] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004beff7 [ 346.551066] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 346.551072] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f295d48e6d4 [ 346.551077] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 346.556564] CPU: 0 PID: 20908 Comm: syz-executor.2 Not tainted 4.14.151 #0 [ 346.666799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.676151] Call Trace: [ 346.678731] dump_stack+0x138/0x197 [ 346.682347] should_fail.cold+0x10f/0x159 [ 346.686485] should_failslab+0xdb/0x130 [ 346.690449] kmem_cache_alloc+0x2d7/0x780 [ 346.694580] ? shmem_alloc_inode+0x1c/0x50 [ 346.698800] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 346.704236] selinux_inode_alloc_security+0xb6/0x2a0 [ 346.709324] security_inode_alloc+0x94/0xd0 [ 346.713633] inode_init_always+0x552/0xaf0 [ 346.717850] alloc_inode+0x81/0x180 [ 346.721460] new_inode_pseudo+0x19/0xf0 [ 346.725416] new_inode+0x1f/0x40 [ 346.728767] shmem_get_inode+0x75/0x750 [ 346.732731] __shmem_file_setup.part.0+0x111/0x400 [ 346.737666] ? __alloc_fd+0x1d4/0x4a0 [ 346.741451] ? shmem_fill_super+0x8c0/0x8c0 [ 346.745763] SyS_memfd_create+0x1f9/0x3a0 [ 346.749892] ? shmem_fcntl+0x130/0x130 [ 346.753769] ? do_syscall_64+0x53/0x640 [ 346.757730] ? shmem_fcntl+0x130/0x130 [ 346.761715] do_syscall_64+0x1e8/0x640 [ 346.765588] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 346.770418] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 346.775591] RIP: 0033:0x459f49 [ 346.778766] RSP: 002b:00007f4cbfb52a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 346.786474] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f49 [ 346.793854] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004beff7 17:19:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) [ 346.801120] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 346.808378] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f4cbfb536d4 [ 346.815652] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:08 executing program 4 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:08 executing program 2 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 346.897740] FAULT_INJECTION: forcing a failure. [ 346.897740] name failslab, interval 1, probability 0, space 0, times 0 [ 346.923080] CPU: 1 PID: 20929 Comm: syz-executor.4 Not tainted 4.14.151 #0 [ 346.930141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 346.931944] FAULT_INJECTION: forcing a failure. [ 346.931944] name failslab, interval 1, probability 0, space 0, times 0 [ 346.939505] Call Trace: [ 346.939528] dump_stack+0x138/0x197 [ 346.939548] should_fail.cold+0x10f/0x159 [ 346.939565] should_failslab+0xdb/0x130 [ 346.939575] kmem_cache_alloc+0x2d7/0x780 [ 346.939590] ? shmem_alloc_inode+0x1c/0x50 [ 346.973436] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 346.978883] selinux_inode_alloc_security+0xb6/0x2a0 [ 346.983981] security_inode_alloc+0x94/0xd0 [ 346.988297] inode_init_always+0x552/0xaf0 [ 346.992525] alloc_inode+0x81/0x180 [ 346.996157] new_inode_pseudo+0x19/0xf0 [ 347.000128] new_inode+0x1f/0x40 [ 347.003485] shmem_get_inode+0x75/0x750 [ 347.007454] __shmem_file_setup.part.0+0x111/0x400 [ 347.012374] ? __alloc_fd+0x1d4/0x4a0 [ 347.016167] ? shmem_fill_super+0x8c0/0x8c0 [ 347.020510] SyS_memfd_create+0x1f9/0x3a0 [ 347.024651] ? shmem_fcntl+0x130/0x130 [ 347.028532] ? do_syscall_64+0x53/0x640 [ 347.032502] ? shmem_fcntl+0x130/0x130 [ 347.036381] do_syscall_64+0x1e8/0x640 [ 347.040263] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 347.045126] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 347.050323] RIP: 0033:0x459f49 [ 347.053505] RSP: 002b:00007f295d48da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 347.061208] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f49 [ 347.068470] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004beff7 [ 347.075732] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 347.082996] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f295d48e6d4 [ 347.090258] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 347.097536] CPU: 0 PID: 20934 Comm: syz-executor.2 Not tainted 4.14.151 #0 [ 347.104556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.113897] Call Trace: [ 347.116490] dump_stack+0x138/0x197 [ 347.120127] should_fail.cold+0x10f/0x159 [ 347.124269] should_failslab+0xdb/0x130 [ 347.128243] kmem_cache_alloc+0x2d7/0x780 [ 347.132379] ? lock_downgrade+0x740/0x740 [ 347.136512] get_empty_filp+0x8c/0x3f0 [ 347.140385] alloc_file+0x23/0x440 [ 347.143908] __shmem_file_setup.part.0+0x1b1/0x400 [ 347.148819] ? __alloc_fd+0x1d4/0x4a0 [ 347.152602] ? shmem_fill_super+0x8c0/0x8c0 [ 347.156910] SyS_memfd_create+0x1f9/0x3a0 [ 347.161064] ? shmem_fcntl+0x130/0x130 [ 347.164934] ? do_syscall_64+0x53/0x640 [ 347.168904] ? shmem_fcntl+0x130/0x130 [ 347.172778] do_syscall_64+0x1e8/0x640 [ 347.176649] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 347.181479] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 347.186649] RIP: 0033:0x459f49 [ 347.189821] RSP: 002b:00007f4cbfb52a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 17:19:08 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 347.197513] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f49 [ 347.204765] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004beff7 [ 347.212015] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 347.219266] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f4cbfb536d4 [ 347.226517] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 17:19:08 executing program 2 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:19:08 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0x0, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:08 executing program 4 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) [ 347.386011] FAULT_INJECTION: forcing a failure. [ 347.386011] name failslab, interval 1, probability 0, space 0, times 0 [ 347.405131] FAULT_INJECTION: forcing a failure. [ 347.405131] name failslab, interval 1, probability 0, space 0, times 0 [ 347.424720] CPU: 1 PID: 20952 Comm: syz-executor.2 Not tainted 4.14.151 #0 [ 347.431790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.441151] Call Trace: [ 347.443751] dump_stack+0x138/0x197 [ 347.447384] should_fail.cold+0x10f/0x159 [ 347.451534] should_failslab+0xdb/0x130 [ 347.455536] kmem_cache_alloc+0x2d7/0x780 [ 347.459681] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 347.465130] ? check_preemption_disabled+0x3c/0x250 [ 347.470150] selinux_file_alloc_security+0xb4/0x190 [ 347.475160] security_file_alloc+0x6d/0xa0 [ 347.479392] get_empty_filp+0x162/0x3f0 [ 347.483449] alloc_file+0x23/0x440 [ 347.486986] __shmem_file_setup.part.0+0x1b1/0x400 [ 347.491913] ? __alloc_fd+0x1d4/0x4a0 [ 347.495707] ? shmem_fill_super+0x8c0/0x8c0 [ 347.500186] SyS_memfd_create+0x1f9/0x3a0 [ 347.504330] ? shmem_fcntl+0x130/0x130 [ 347.508207] ? do_syscall_64+0x53/0x640 [ 347.512173] ? shmem_fcntl+0x130/0x130 [ 347.516054] do_syscall_64+0x1e8/0x640 [ 347.519933] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 347.524778] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 347.529961] RIP: 0033:0x459f49 [ 347.533140] RSP: 002b:00007f4cbfb52a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 347.540841] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f49 [ 347.548104] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004beff7 [ 347.555364] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 347.562625] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f4cbfb536d4 [ 347.569890] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 347.577193] CPU: 0 PID: 20954 Comm: syz-executor.4 Not tainted 4.14.151 #0 [ 347.584248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.593609] Call Trace: [ 347.596249] dump_stack+0x138/0x197 [ 347.599912] should_fail.cold+0x10f/0x159 [ 347.604052] should_failslab+0xdb/0x130 [ 347.608021] kmem_cache_alloc+0x2d7/0x780 [ 347.612159] ? lock_downgrade+0x740/0x740 [ 347.616290] get_empty_filp+0x8c/0x3f0 [ 347.620166] alloc_file+0x23/0x440 [ 347.623716] __shmem_file_setup.part.0+0x1b1/0x400 [ 347.628631] ? __alloc_fd+0x1d4/0x4a0 [ 347.632427] ? shmem_fill_super+0x8c0/0x8c0 [ 347.637222] SyS_memfd_create+0x1f9/0x3a0 [ 347.641364] ? shmem_fcntl+0x130/0x130 [ 347.645259] ? do_syscall_64+0x53/0x640 [ 347.649234] ? shmem_fcntl+0x130/0x130 [ 347.653158] do_syscall_64+0x1e8/0x640 [ 347.657038] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 347.661880] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 347.667064] RIP: 0033:0x459f49 [ 347.670245] RSP: 002b:00007f295d48da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 347.677945] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f49 17:19:09 executing program 2 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:09 executing program 4 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 347.685199] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004beff7 [ 347.692454] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 347.699720] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f295d48e6d4 [ 347.706971] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 347.767747] FAULT_INJECTION: forcing a failure. [ 347.767747] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 347.780191] CPU: 0 PID: 20965 Comm: syz-executor.2 Not tainted 4.14.151 #0 [ 347.787228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 347.796577] Call Trace: [ 347.799183] dump_stack+0x138/0x197 [ 347.802807] should_fail.cold+0x10f/0x159 [ 347.806943] ? __might_sleep+0x93/0xb0 [ 347.810821] __alloc_pages_nodemask+0x1d6/0x7a0 [ 347.815477] ? __alloc_pages_slowpath+0x2930/0x2930 [ 347.820660] ? lock_downgrade+0x740/0x740 [ 347.824812] alloc_pages_vma+0xc9/0x4c0 [ 347.828773] shmem_alloc_page+0xf6/0x1a0 [ 347.832843] ? shmem_swapin+0x1a0/0x1a0 [ 347.836816] ? cred_has_capability+0x142/0x290 [ 347.841479] ? check_preemption_disabled+0x3c/0x250 [ 347.846492] ? __this_cpu_preempt_check+0x1d/0x30 [ 347.851322] ? percpu_counter_add_batch+0x112/0x160 [ 347.856326] ? __vm_enough_memory+0x26a/0x490 [ 347.860820] shmem_alloc_and_acct_page+0x12a/0x680 [ 347.865774] shmem_getpage_gfp+0x3e7/0x25d0 [ 347.870109] ? shmem_add_to_page_cache+0x860/0x860 [ 347.875042] ? iov_iter_fault_in_readable+0x1da/0x3c0 [ 347.880229] shmem_write_begin+0xfd/0x1b0 [ 347.884368] ? trace_hardirqs_on_caller+0x400/0x590 [ 347.889379] generic_perform_write+0x1f8/0x480 [ 347.893960] ? page_endio+0x530/0x530 [ 347.897750] ? current_time+0xb0/0xb0 [ 347.901546] ? generic_file_write_iter+0x9a/0x660 [ 347.906383] __generic_file_write_iter+0x239/0x5b0 [ 347.911299] generic_file_write_iter+0x303/0x660 [ 347.916049] __vfs_write+0x4a7/0x6b0 [ 347.919787] ? selinux_file_open+0x420/0x420 [ 347.924189] ? kernel_read+0x120/0x120 [ 347.928062] ? check_preemption_disabled+0x3c/0x250 [ 347.933080] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 347.938543] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 347.943294] ? __sb_start_write+0x153/0x2f0 [ 347.947607] vfs_write+0x198/0x500 [ 347.951136] SyS_pwrite64+0x115/0x140 [ 347.954929] ? SyS_pread64+0x140/0x140 [ 347.958799] ? do_syscall_64+0x53/0x640 [ 347.962770] ? SyS_pread64+0x140/0x140 [ 347.966641] do_syscall_64+0x1e8/0x640 [ 347.970511] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 347.975356] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 347.980707] RIP: 0033:0x413d47 [ 347.983894] RSP: 002b:00007f4cbfb52a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 347.991586] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000413d47 [ 347.998857] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 0000000000000004 [ 348.006128] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 348.013404] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 348.020687] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:09 executing program 2 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 17:19:09 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 348.119812] FAULT_INJECTION: forcing a failure. [ 348.119812] name failslab, interval 1, probability 0, space 0, times 0 [ 348.128209] FAULT_INJECTION: forcing a failure. [ 348.128209] name failslab, interval 1, probability 0, space 0, times 0 [ 348.142241] CPU: 0 PID: 20981 Comm: syz-executor.2 Not tainted 4.14.151 #0 [ 348.142250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.142254] Call Trace: [ 348.142271] dump_stack+0x138/0x197 [ 348.142290] should_fail.cold+0x10f/0x159 [ 348.142306] should_failslab+0xdb/0x130 [ 348.142316] kmem_cache_alloc+0x47/0x780 [ 348.142326] ? __alloc_pages_slowpath+0x2930/0x2930 [ 348.158697] ? lock_downgrade+0x740/0x740 [ 348.158782] radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 348.158795] __radix_tree_create+0x337/0x4d0 [ 348.196294] __radix_tree_insert+0xab/0x570 [ 348.200616] ? __radix_tree_create+0x4d0/0x4d0 [ 348.205200] shmem_add_to_page_cache+0x5a4/0x860 [ 348.209949] ? shmem_writepage+0xbb0/0xbb0 [ 348.214176] ? __radix_tree_preload+0x1d2/0x260 [ 348.218845] shmem_getpage_gfp+0x1757/0x25d0 [ 348.223258] ? shmem_add_to_page_cache+0x860/0x860 [ 348.228183] ? iov_iter_fault_in_readable+0x1da/0x3c0 [ 348.233373] shmem_write_begin+0xfd/0x1b0 [ 348.237528] ? trace_hardirqs_on_caller+0x400/0x590 [ 348.242545] generic_perform_write+0x1f8/0x480 [ 348.247128] ? page_endio+0x530/0x530 [ 348.250927] ? current_time+0xb0/0xb0 [ 348.254732] ? generic_file_write_iter+0x9a/0x660 [ 348.259572] __generic_file_write_iter+0x239/0x5b0 [ 348.264495] generic_file_write_iter+0x303/0x660 [ 348.269254] __vfs_write+0x4a7/0x6b0 [ 348.272965] ? selinux_file_open+0x420/0x420 [ 348.277374] ? kernel_read+0x120/0x120 [ 348.281260] ? check_preemption_disabled+0x3c/0x250 [ 348.286274] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 348.291728] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 348.296478] ? __sb_start_write+0x153/0x2f0 [ 348.300801] vfs_write+0x198/0x500 [ 348.304355] SyS_pwrite64+0x115/0x140 [ 348.308168] ? SyS_pread64+0x140/0x140 [ 348.312063] ? do_syscall_64+0x53/0x640 [ 348.316044] ? SyS_pread64+0x140/0x140 [ 348.319938] do_syscall_64+0x1e8/0x640 [ 348.323832] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 348.328685] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 348.333869] RIP: 0033:0x413d47 [ 348.337059] RSP: 002b:00007f4cbfb52a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 348.344766] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000413d47 [ 348.352030] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 0000000000000004 [ 348.359294] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 348.366558] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 348.373935] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 348.383796] CPU: 1 PID: 20979 Comm: syz-executor.4 Not tainted 4.14.151 #0 [ 348.390869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.400244] Call Trace: [ 348.400262] dump_stack+0x138/0x197 [ 348.400280] should_fail.cold+0x10f/0x159 [ 348.400294] should_failslab+0xdb/0x130 [ 348.400306] kmem_cache_alloc+0x2d7/0x780 [ 348.400316] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 348.400329] ? check_preemption_disabled+0x3c/0x250 [ 348.406520] selinux_file_alloc_security+0xb4/0x190 [ 348.406533] security_file_alloc+0x6d/0xa0 [ 348.406546] get_empty_filp+0x162/0x3f0 [ 348.406558] alloc_file+0x23/0x440 [ 348.445880] __shmem_file_setup.part.0+0x1b1/0x400 [ 348.450794] ? __alloc_fd+0x1d4/0x4a0 [ 348.454579] ? shmem_fill_super+0x8c0/0x8c0 [ 348.458891] SyS_memfd_create+0x1f9/0x3a0 [ 348.463110] ? shmem_fcntl+0x130/0x130 [ 348.466979] ? do_syscall_64+0x53/0x640 [ 348.470937] ? shmem_fcntl+0x130/0x130 [ 348.474811] do_syscall_64+0x1e8/0x640 [ 348.478698] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 348.483530] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 348.488702] RIP: 0033:0x459f49 [ 348.491876] RSP: 002b:00007f295d48da88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 348.499575] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f49 [ 348.506851] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004beff7 [ 348.514103] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 17:19:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:19:10 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0x0, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 348.521357] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f295d48e6d4 [ 348.528607] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:10 executing program 4 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 17:19:10 executing program 2 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 348.658992] FAULT_INJECTION: forcing a failure. [ 348.658992] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 348.682852] FAULT_INJECTION: forcing a failure. [ 348.682852] name failslab, interval 1, probability 0, space 0, times 0 [ 348.695171] CPU: 1 PID: 21005 Comm: syz-executor.4 Not tainted 4.14.151 #0 [ 348.702207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.711554] Call Trace: [ 348.714154] dump_stack+0x138/0x197 [ 348.717772] should_fail.cold+0x10f/0x159 [ 348.721915] ? __might_sleep+0x93/0xb0 [ 348.725790] __alloc_pages_nodemask+0x1d6/0x7a0 [ 348.730448] ? __alloc_pages_slowpath+0x2930/0x2930 [ 348.735447] ? lock_downgrade+0x740/0x740 [ 348.739586] alloc_pages_vma+0xc9/0x4c0 [ 348.743550] shmem_alloc_page+0xf6/0x1a0 [ 348.747683] ? shmem_swapin+0x1a0/0x1a0 [ 348.751646] ? cred_has_capability+0x142/0x290 [ 348.756213] ? check_preemption_disabled+0x3c/0x250 [ 348.761218] ? __this_cpu_preempt_check+0x1d/0x30 [ 348.766049] ? percpu_counter_add_batch+0x112/0x160 [ 348.771054] ? __vm_enough_memory+0x26a/0x490 [ 348.775575] shmem_alloc_and_acct_page+0x12a/0x680 [ 348.780497] shmem_getpage_gfp+0x3e7/0x25d0 [ 348.784812] ? shmem_add_to_page_cache+0x860/0x860 [ 348.789745] ? iov_iter_fault_in_readable+0x1da/0x3c0 [ 348.794922] shmem_write_begin+0xfd/0x1b0 [ 348.799058] ? trace_hardirqs_on_caller+0x400/0x590 [ 348.804185] generic_perform_write+0x1f8/0x480 [ 348.808763] ? page_endio+0x530/0x530 [ 348.812568] ? current_time+0xb0/0xb0 [ 348.816358] ? generic_file_write_iter+0x9a/0x660 [ 348.821186] __generic_file_write_iter+0x239/0x5b0 [ 348.826105] generic_file_write_iter+0x303/0x660 [ 348.830852] __vfs_write+0x4a7/0x6b0 [ 348.834554] ? selinux_file_open+0x420/0x420 [ 348.838948] ? kernel_read+0x120/0x120 [ 348.842824] ? check_preemption_disabled+0x3c/0x250 [ 348.847828] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 348.853265] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 348.858005] ? __sb_start_write+0x153/0x2f0 [ 348.862314] vfs_write+0x198/0x500 [ 348.865841] SyS_pwrite64+0x115/0x140 [ 348.869631] ? SyS_pread64+0x140/0x140 [ 348.873508] ? do_syscall_64+0x53/0x640 [ 348.877466] ? SyS_pread64+0x140/0x140 [ 348.881340] do_syscall_64+0x1e8/0x640 [ 348.885211] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 348.890046] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 348.895217] RIP: 0033:0x413d47 [ 348.898393] RSP: 002b:00007f295d48da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 348.906086] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000413d47 [ 348.913341] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 0000000000000004 [ 348.920594] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 348.927851] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 348.935107] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 348.946122] CPU: 0 PID: 21010 Comm: syz-executor.2 Not tainted 4.14.151 #0 [ 348.953170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 348.962520] Call Trace: [ 348.962542] dump_stack+0x138/0x197 [ 348.962561] should_fail.cold+0x10f/0x159 [ 348.962577] should_failslab+0xdb/0x130 [ 348.962586] kmem_cache_alloc+0x2d7/0x780 [ 348.962595] ? vfs_write+0x25f/0x500 [ 348.962609] getname_flags+0xcb/0x580 [ 348.962617] ? check_preemption_disabled+0x3c/0x250 [ 348.962627] getname+0x1a/0x20 [ 348.962636] do_sys_open+0x1e7/0x430 [ 348.962646] ? filp_open+0x70/0x70 [ 348.962654] ? fput+0xd4/0x150 17:19:10 executing program 2 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x0, 0x0) [ 348.962664] ? SyS_pwrite64+0xca/0x140 [ 348.962675] SyS_open+0x2d/0x40 [ 348.962682] ? do_sys_open+0x430/0x430 [ 348.962694] do_syscall_64+0x1e8/0x640 [ 348.973031] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 348.973049] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 348.973056] RIP: 0033:0x413ce1 [ 348.973061] RSP: 002b:00007f4cbfb52a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 348.973072] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413ce1 [ 348.973078] RDX: 00007f4cbfb52b0a RSI: 0000000000000002 RDI: 00007f4cbfb52b00 [ 348.973084] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 348.973090] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 348.973095] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 349.040336] FAULT_INJECTION: forcing a failure. [ 349.040336] name failslab, interval 1, probability 0, space 0, times 0 [ 349.061587] CPU: 0 PID: 21016 Comm: syz-executor.2 Not tainted 4.14.151 #0 [ 349.080367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 349.080372] Call Trace: [ 349.080387] dump_stack+0x138/0x197 [ 349.080405] should_fail.cold+0x10f/0x159 [ 349.080420] should_failslab+0xdb/0x130 [ 349.080432] kmem_cache_alloc+0x2d7/0x780 [ 349.080443] ? save_stack+0xa9/0xd0 [ 349.080457] get_empty_filp+0x8c/0x3f0 [ 349.080467] path_openat+0x8f/0x3f70 [ 349.080483] ? generic_perform_write+0x34f/0x480 [ 349.142565] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 349.147241] ? save_trace+0x290/0x290 [ 349.151048] ? __alloc_fd+0x1d4/0x4a0 [ 349.154857] do_filp_open+0x18e/0x250 [ 349.158659] ? may_open_dev+0xe0/0xe0 [ 349.162469] ? lock_downgrade+0x740/0x740 [ 349.166629] ? _raw_spin_unlock+0x2d/0x50 [ 349.170778] ? __alloc_fd+0x1d4/0x4a0 [ 349.174587] do_sys_open+0x2c5/0x430 [ 349.178303] ? filp_open+0x70/0x70 [ 349.181847] ? fput+0xd4/0x150 [ 349.185044] ? SyS_pwrite64+0xca/0x140 [ 349.188938] SyS_open+0x2d/0x40 [ 349.192215] ? do_sys_open+0x430/0x430 [ 349.196108] do_syscall_64+0x1e8/0x640 [ 349.199996] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 349.204849] entry_SYSCALL_64_after_hwframe+0x42/0xb7 17:19:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:19:10 executing program 2 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:10 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x0, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 349.210035] RIP: 0033:0x413ce1 [ 349.213222] RSP: 002b:00007f4cbfb52a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 349.220927] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413ce1 [ 349.220933] RDX: 00007f4cbfb52b0a RSI: 0000000000000002 RDI: 00007f4cbfb52b00 [ 349.220938] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 349.220943] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 349.220949] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:10 executing program 4 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 349.311150] FAULT_INJECTION: forcing a failure. [ 349.311150] name failslab, interval 1, probability 0, space 0, times 0 [ 349.340406] CPU: 1 PID: 21033 Comm: syz-executor.2 Not tainted 4.14.151 #0 [ 349.347468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 349.351322] FAULT_INJECTION: forcing a failure. [ 349.351322] name failslab, interval 1, probability 0, space 0, times 0 [ 349.356833] Call Trace: [ 349.370625] dump_stack+0x138/0x197 [ 349.374258] should_fail.cold+0x10f/0x159 [ 349.378402] should_failslab+0xdb/0x130 [ 349.382367] kmem_cache_alloc+0x2d7/0x780 [ 349.386503] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 349.391943] ? check_preemption_disabled+0x3c/0x250 [ 349.396953] selinux_file_alloc_security+0xb4/0x190 [ 349.401960] security_file_alloc+0x6d/0xa0 [ 349.406188] get_empty_filp+0x162/0x3f0 [ 349.410153] path_openat+0x8f/0x3f70 [ 349.413862] ? generic_perform_write+0x34f/0x480 [ 349.418616] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 349.423304] ? save_trace+0x290/0x290 [ 349.427101] ? __alloc_fd+0x1d4/0x4a0 [ 349.430908] do_filp_open+0x18e/0x250 [ 349.434703] ? may_open_dev+0xe0/0xe0 [ 349.438495] ? lock_downgrade+0x740/0x740 [ 349.442636] ? _raw_spin_unlock+0x2d/0x50 [ 349.446774] ? __alloc_fd+0x1d4/0x4a0 [ 349.450575] do_sys_open+0x2c5/0x430 [ 349.454278] ? filp_open+0x70/0x70 [ 349.457806] ? fput+0xd4/0x150 [ 349.461097] ? SyS_pwrite64+0xca/0x140 [ 349.464996] SyS_open+0x2d/0x40 [ 349.468263] ? do_sys_open+0x430/0x430 [ 349.472151] do_syscall_64+0x1e8/0x640 [ 349.476025] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 349.480862] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 349.486040] RIP: 0033:0x413ce1 [ 349.489219] RSP: 002b:00007f4cbfb52a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 349.496916] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413ce1 [ 349.504189] RDX: 00007f4cbfb52b0a RSI: 0000000000000002 RDI: 00007f4cbfb52b00 [ 349.511445] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 349.518700] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 349.525959] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 349.533254] CPU: 0 PID: 21040 Comm: syz-executor.4 Not tainted 4.14.151 #0 [ 349.540262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 349.540266] Call Trace: [ 349.540280] dump_stack+0x138/0x197 [ 349.540296] should_fail.cold+0x10f/0x159 [ 349.540310] should_failslab+0xdb/0x130 [ 349.563946] kmem_cache_alloc+0x47/0x780 [ 349.568014] ? __alloc_pages_slowpath+0x2930/0x2930 [ 349.573028] ? lock_downgrade+0x740/0x740 [ 349.577173] radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 349.582797] __radix_tree_create+0x337/0x4d0 [ 349.587200] __radix_tree_insert+0xab/0x570 [ 349.591507] ? __radix_tree_create+0x4d0/0x4d0 [ 349.596136] shmem_add_to_page_cache+0x5a4/0x860 [ 349.600885] ? shmem_writepage+0xbb0/0xbb0 [ 349.605108] ? __radix_tree_preload+0x1d2/0x260 [ 349.609758] shmem_getpage_gfp+0x1757/0x25d0 [ 349.614154] ? shmem_add_to_page_cache+0x860/0x860 [ 349.619068] ? iov_iter_fault_in_readable+0x1da/0x3c0 [ 349.624246] shmem_write_begin+0xfd/0x1b0 [ 349.628385] ? trace_hardirqs_on_caller+0x400/0x590 [ 349.633393] generic_perform_write+0x1f8/0x480 [ 349.637970] ? page_endio+0x530/0x530 [ 349.641764] ? current_time+0xb0/0xb0 [ 349.645556] ? generic_file_write_iter+0x9a/0x660 [ 349.650386] __generic_file_write_iter+0x239/0x5b0 [ 349.655301] generic_file_write_iter+0x303/0x660 [ 349.660059] __vfs_write+0x4a7/0x6b0 [ 349.663782] ? selinux_file_open+0x420/0x420 [ 349.668185] ? kernel_read+0x120/0x120 [ 349.672059] ? check_preemption_disabled+0x3c/0x250 [ 349.677114] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 349.682561] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 349.687360] ? __sb_start_write+0x153/0x2f0 [ 349.691669] vfs_write+0x198/0x500 [ 349.695207] SyS_pwrite64+0x115/0x140 [ 349.698991] ? SyS_pread64+0x140/0x140 [ 349.702868] ? do_syscall_64+0x53/0x640 [ 349.706838] ? SyS_pread64+0x140/0x140 [ 349.710708] do_syscall_64+0x1e8/0x640 [ 349.714576] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 349.719405] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 349.724575] RIP: 0033:0x413d47 [ 349.728091] RSP: 002b:00007f295d48da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 349.735797] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000413d47 [ 349.743058] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 0000000000000004 [ 349.750323] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 17:19:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 17:19:11 executing program 2 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 349.757575] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 349.760115] net_ratelimit: 20 callbacks suppressed [ 349.760120] protocol 88fb is buggy, dev hsr_slave_0 [ 349.764830] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 349.769799] protocol 88fb is buggy, dev hsr_slave_1 17:19:11 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0x0, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x0, 0x0) [ 349.858799] FAULT_INJECTION: forcing a failure. [ 349.858799] name failslab, interval 1, probability 0, space 0, times 0 [ 349.903457] CPU: 1 PID: 21051 Comm: syz-executor.2 Not tainted 4.14.151 #0 [ 349.910517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 349.919883] Call Trace: [ 349.922487] dump_stack+0x138/0x197 [ 349.926142] should_fail.cold+0x10f/0x159 [ 349.930313] should_failslab+0xdb/0x130 [ 349.934307] kmem_cache_alloc+0x2d7/0x780 [ 349.938473] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 349.943945] ? check_preemption_disabled+0x3c/0x250 [ 349.948985] selinux_file_alloc_security+0xb4/0x190 [ 349.954022] security_file_alloc+0x6d/0xa0 [ 349.958273] get_empty_filp+0x162/0x3f0 [ 349.962258] path_openat+0x8f/0x3f70 [ 349.965986] ? trace_hardirqs_on+0x10/0x10 [ 349.970233] ? check_preemption_disabled+0x3c/0x250 [ 349.975271] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 349.979950] ? find_held_lock+0x35/0x130 [ 349.984026] ? save_trace+0x290/0x290 [ 349.987840] ? __alloc_fd+0x1d4/0x4a0 [ 349.991644] do_filp_open+0x18e/0x250 [ 349.995453] ? may_open_dev+0xe0/0xe0 [ 349.999238] ? lock_downgrade+0x740/0x740 [ 350.003377] ? _raw_spin_unlock+0x2d/0x50 [ 350.007512] ? __alloc_fd+0x1d4/0x4a0 [ 350.011310] do_sys_open+0x2c5/0x430 [ 350.015025] ? filp_open+0x70/0x70 [ 350.018574] ? fput+0xd4/0x150 [ 350.021759] ? SyS_pwrite64+0xca/0x140 [ 350.025633] SyS_open+0x2d/0x40 [ 350.028893] ? do_sys_open+0x430/0x430 [ 350.032761] do_syscall_64+0x1e8/0x640 [ 350.036628] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 350.041461] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 350.046694] RIP: 0033:0x413ce1 17:19:11 executing program 2 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x0, 0x0) [ 350.049866] RSP: 002b:00007f4cbfb52a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 350.057559] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413ce1 [ 350.064812] RDX: 00007f4cbfb52b0a RSI: 0000000000000002 RDI: 00007f4cbfb52b00 [ 350.072067] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 350.079328] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 350.086617] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:11 executing program 4 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:11 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x0, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 350.191783] FAULT_INJECTION: forcing a failure. [ 350.191783] name failslab, interval 1, probability 0, space 0, times 0 [ 350.221249] FAULT_INJECTION: forcing a failure. [ 350.221249] name failslab, interval 1, probability 0, space 0, times 0 [ 350.235491] CPU: 1 PID: 21073 Comm: syz-executor.2 Not tainted 4.14.151 #0 [ 350.242525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 350.251870] Call Trace: [ 350.254455] dump_stack+0x138/0x197 [ 350.258071] should_fail.cold+0x10f/0x159 [ 350.262246] should_failslab+0xdb/0x130 [ 350.266206] kmem_cache_alloc_trace+0x2e9/0x790 [ 350.270860] ? __lockdep_init_map+0x10c/0x570 [ 350.275340] ? loop_get_status64+0x120/0x120 [ 350.279734] __kthread_create_on_node+0xe3/0x3e0 [ 350.284478] ? kthread_park+0x140/0x140 [ 350.288436] ? __fget+0x210/0x370 [ 350.291880] ? loop_get_status64+0x120/0x120 [ 350.296271] kthread_create_on_node+0xa8/0xd0 [ 350.300750] ? __kthread_create_on_node+0x3e0/0x3e0 [ 350.305752] ? __lockdep_init_map+0x10c/0x570 [ 350.310235] lo_ioctl+0xcf7/0x1ce0 [ 350.313761] ? debug_check_no_obj_freed+0x2aa/0x7b7 [ 350.318761] ? loop_probe+0x160/0x160 [ 350.322546] blkdev_ioctl+0x96b/0x1860 [ 350.326417] ? blkpg_ioctl+0x980/0x980 [ 350.330292] ? __might_sleep+0x93/0xb0 [ 350.334163] ? __fget+0x210/0x370 [ 350.337607] block_ioctl+0xde/0x120 [ 350.341222] ? blkdev_fallocate+0x3b0/0x3b0 [ 350.345700] do_vfs_ioctl+0x7ae/0x1060 [ 350.349575] ? selinux_file_mprotect+0x5d0/0x5d0 [ 350.354316] ? lock_downgrade+0x740/0x740 [ 350.358451] ? ioctl_preallocate+0x1c0/0x1c0 [ 350.362850] ? __fget+0x237/0x370 [ 350.366295] ? security_file_ioctl+0x89/0xb0 [ 350.370694] SyS_ioctl+0x8f/0xc0 [ 350.374052] ? do_vfs_ioctl+0x1060/0x1060 [ 350.378185] do_syscall_64+0x1e8/0x640 [ 350.382059] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 350.386891] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 350.392063] RIP: 0033:0x459db7 [ 350.395235] RSP: 002b:00007f4cbfb52a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 350.402928] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 350.410184] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 350.417439] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 350.424694] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 350.431947] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 350.440794] CPU: 1 PID: 21084 Comm: syz-executor.4 Not tainted 4.14.151 #0 [ 350.447839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 350.457200] Call Trace: [ 350.459779] dump_stack+0x138/0x197 [ 350.463424] should_fail.cold+0x10f/0x159 [ 350.467597] should_failslab+0xdb/0x130 [ 350.471588] kmem_cache_alloc+0x2d7/0x780 [ 350.475750] ? vfs_write+0x25f/0x500 [ 350.479486] getname_flags+0xcb/0x580 [ 350.483299] ? check_preemption_disabled+0x3c/0x250 [ 350.488328] getname+0x1a/0x20 [ 350.491527] do_sys_open+0x1e7/0x430 [ 350.495294] ? filp_open+0x70/0x70 [ 350.498868] ? fput+0xd4/0x150 [ 350.502057] ? SyS_pwrite64+0xca/0x140 [ 350.505927] SyS_open+0x2d/0x40 [ 350.509189] ? do_sys_open+0x430/0x430 [ 350.513062] do_syscall_64+0x1e8/0x640 [ 350.516929] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 350.521767] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 350.526943] RIP: 0033:0x413ce1 [ 350.530151] RSP: 002b:00007f295d48da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 350.537840] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413ce1 [ 350.545090] RDX: 00007f295d48db0a RSI: 0000000000000002 RDI: 00007f295d48db00 [ 350.552342] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 350.559595] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 350.566865] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 350.580178] protocol 88fb is buggy, dev hsr_slave_0 [ 350.585317] protocol 88fb is buggy, dev hsr_slave_1 17:19:12 executing program 4 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 350.590461] protocol 88fb is buggy, dev hsr_slave_0 [ 350.595517] protocol 88fb is buggy, dev hsr_slave_1 [ 350.627424] FAULT_INJECTION: forcing a failure. [ 350.627424] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 350.639267] CPU: 1 PID: 21092 Comm: syz-executor.4 Not tainted 4.14.151 #0 [ 350.646287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 350.655647] Call Trace: [ 350.658247] dump_stack+0x138/0x197 [ 350.661893] should_fail.cold+0x10f/0x159 [ 350.666064] __alloc_pages_nodemask+0x1d6/0x7a0 [ 350.670743] ? fs_reclaim_acquire+0x20/0x20 [ 350.675075] ? __alloc_pages_slowpath+0x2930/0x2930 [ 350.680109] cache_grow_begin+0x80/0x400 [ 350.686183] kmem_cache_alloc+0x6a6/0x780 [ 350.688851] FAULT_INJECTION: forcing a failure. [ 350.688851] name failslab, interval 1, probability 0, space 0, times 0 [ 350.690331] ? vfs_write+0x25f/0x500 [ 350.690350] getname_flags+0xcb/0x580 [ 350.690362] ? check_preemption_disabled+0x3c/0x250 [ 350.690373] getname+0x1a/0x20 [ 350.690381] do_sys_open+0x1e7/0x430 [ 350.690398] ? filp_open+0x70/0x70 [ 350.724479] ? fput+0xd4/0x150 [ 350.727666] ? SyS_pwrite64+0xca/0x140 [ 350.731550] SyS_open+0x2d/0x40 [ 350.734820] ? do_sys_open+0x430/0x430 [ 350.738703] do_syscall_64+0x1e8/0x640 [ 350.742580] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 350.747421] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 350.752599] RIP: 0033:0x413ce1 [ 350.755778] RSP: 002b:00007f295d48da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 350.769038] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413ce1 [ 350.776299] RDX: 00007f295d48db0a RSI: 0000000000000002 RDI: 00007f295d48db00 [ 350.783562] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 350.790832] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 350.798111] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 350.805401] CPU: 0 PID: 21096 Comm: syz-executor.2 Not tainted 4.14.151 #0 [ 350.805628] protocol 88fb is buggy, dev hsr_slave_0 [ 350.812419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 350.812424] Call Trace: [ 350.812441] dump_stack+0x138/0x197 [ 350.812462] should_fail.cold+0x10f/0x159 [ 350.817496] protocol 88fb is buggy, dev hsr_slave_1 17:19:12 executing program 2 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 350.826804] should_failslab+0xdb/0x130 [ 350.826817] kmem_cache_alloc+0x2d7/0x780 [ 350.826826] ? trace_hardirqs_on+0x10/0x10 [ 350.826837] ? save_trace+0x290/0x290 [ 350.829571] protocol 88fb is buggy, dev hsr_slave_0 [ 350.833013] __kernfs_new_node+0x70/0x420 [ 350.833027] kernfs_new_node+0x80/0xf0 [ 350.833040] kernfs_create_dir_ns+0x41/0x140 [ 350.837300] protocol 88fb is buggy, dev hsr_slave_1 [ 350.842254] internal_create_group+0xea/0x7b0 [ 350.842271] sysfs_create_group+0x20/0x30 [ 350.842281] lo_ioctl+0x1176/0x1ce0 [ 350.854613] ? loop_probe+0x160/0x160 [ 350.854627] blkdev_ioctl+0x96b/0x1860 [ 350.854636] ? blkpg_ioctl+0x980/0x980 [ 350.854651] ? __might_sleep+0x93/0xb0 [ 350.863441] ? __fget+0x210/0x370 [ 350.863453] block_ioctl+0xde/0x120 [ 350.863461] ? blkdev_fallocate+0x3b0/0x3b0 [ 350.863470] do_vfs_ioctl+0x7ae/0x1060 [ 350.863481] ? selinux_file_mprotect+0x5d0/0x5d0 [ 350.863490] ? lock_downgrade+0x740/0x740 [ 350.863500] ? ioctl_preallocate+0x1c0/0x1c0 [ 350.863511] ? __fget+0x237/0x370 [ 350.940338] ? security_file_ioctl+0x89/0xb0 [ 350.944738] SyS_ioctl+0x8f/0xc0 [ 350.948094] ? do_vfs_ioctl+0x1060/0x1060 [ 350.952235] do_syscall_64+0x1e8/0x640 [ 350.956105] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 350.960937] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 350.966110] RIP: 0033:0x459db7 [ 350.969295] RSP: 002b:00007f4cbfb52a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 350.976987] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 350.984239] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 17:19:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a229", 0x25, 0x10000}], 0x0, 0x0) [ 350.991491] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 350.998744] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 351.005995] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:12 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, 0x0, 0x0) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 17:19:12 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x0, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:12 executing program 4 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a229", 0x25, 0x10000}], 0x0, 0x0) [ 351.152800] FAULT_INJECTION: forcing a failure. [ 351.152800] name failslab, interval 1, probability 0, space 0, times 0 [ 351.185923] CPU: 1 PID: 21120 Comm: syz-executor.4 Not tainted 4.14.151 #0 [ 351.192981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.192986] Call Trace: [ 351.193004] dump_stack+0x138/0x197 [ 351.193023] should_fail.cold+0x10f/0x159 [ 351.193040] should_failslab+0xdb/0x130 [ 351.193055] kmem_cache_alloc+0x2d7/0x780 [ 351.193067] ? save_stack+0xa9/0xd0 [ 351.193082] get_empty_filp+0x8c/0x3f0 [ 351.193092] path_openat+0x8f/0x3f70 [ 351.193105] ? trace_hardirqs_on+0x10/0x10 [ 351.193119] ? check_preemption_disabled+0x3c/0x250 [ 351.193135] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 351.193147] ? find_held_lock+0x35/0x130 [ 351.205096] ? save_trace+0x290/0x290 [ 351.253784] ? __alloc_fd+0x1d4/0x4a0 [ 351.257571] do_filp_open+0x18e/0x250 [ 351.261353] ? may_open_dev+0xe0/0xe0 [ 351.269651] ? lock_downgrade+0x740/0x740 [ 351.273787] ? _raw_spin_unlock+0x2d/0x50 [ 351.277916] ? __alloc_fd+0x1d4/0x4a0 [ 351.281749] do_sys_open+0x2c5/0x430 [ 351.285444] ? filp_open+0x70/0x70 [ 351.289012] ? fput+0xd4/0x150 [ 351.292195] ? SyS_pwrite64+0xca/0x140 [ 351.296066] SyS_open+0x2d/0x40 [ 351.299323] ? do_sys_open+0x430/0x430 [ 351.303205] do_syscall_64+0x1e8/0x640 [ 351.308563] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 351.313391] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 351.318562] RIP: 0033:0x413ce1 [ 351.321732] RSP: 002b:00007f295d48da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 351.329422] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413ce1 [ 351.336675] RDX: 00007f295d48db0a RSI: 0000000000000002 RDI: 00007f295d48db00 [ 351.344014] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 17:19:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a229", 0x25, 0x10000}], 0x0, 0x0) 17:19:12 executing program 4 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 351.351265] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 351.358512] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 351.446455] FAULT_INJECTION: forcing a failure. [ 351.446455] name failslab, interval 1, probability 0, space 0, times 0 [ 351.465035] CPU: 1 PID: 21136 Comm: syz-executor.4 Not tainted 4.14.151 #0 [ 351.472084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.481433] Call Trace: [ 351.484017] dump_stack+0x138/0x197 [ 351.487637] should_fail.cold+0x10f/0x159 [ 351.491773] should_failslab+0xdb/0x130 [ 351.495734] kmem_cache_alloc+0x2d7/0x780 [ 351.499867] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 351.505304] ? check_preemption_disabled+0x3c/0x250 [ 351.510308] selinux_file_alloc_security+0xb4/0x190 [ 351.515308] security_file_alloc+0x6d/0xa0 [ 351.519561] get_empty_filp+0x162/0x3f0 [ 351.523537] path_openat+0x8f/0x3f70 [ 351.527238] ? trace_hardirqs_on+0x10/0x10 [ 351.531454] ? check_preemption_disabled+0x3c/0x250 [ 351.536457] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 351.541110] ? find_held_lock+0x35/0x130 [ 351.545157] ? save_trace+0x290/0x290 [ 351.548942] ? __alloc_fd+0x1d4/0x4a0 [ 351.552727] do_filp_open+0x18e/0x250 [ 351.556508] ? may_open_dev+0xe0/0xe0 [ 351.560292] ? lock_downgrade+0x740/0x740 [ 351.564431] ? _raw_spin_unlock+0x2d/0x50 [ 351.568563] ? __alloc_fd+0x1d4/0x4a0 [ 351.572370] do_sys_open+0x2c5/0x430 [ 351.576070] ? filp_open+0x70/0x70 [ 351.579604] ? fput+0xd4/0x150 [ 351.582778] ? SyS_pwrite64+0xca/0x140 [ 351.586669] SyS_open+0x2d/0x40 [ 351.589930] ? do_sys_open+0x430/0x430 [ 351.593802] do_syscall_64+0x1e8/0x640 [ 351.597672] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 351.602501] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 351.607671] RIP: 0033:0x413ce1 [ 351.610843] RSP: 002b:00007f295d48da80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 351.618533] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413ce1 [ 351.625798] RDX: 00007f295d48db0a RSI: 0000000000000002 RDI: 00007f295d48db00 [ 351.633050] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 351.640318] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 17:19:13 executing program 4 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000", 0x38, 0x10000}], 0x0, 0x0) [ 351.647572] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:13 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000001600)=[{&(0x7f00000000c0)="37c6810c367b30d60db42602243dcb7c005eb1ab1a0b666744f5d49f610c770419f28d543ddce58cf971b8157560ef842527ac1e913be6d6b83866049d48db868d0e76fe58fd9c9aa79506463f4575a7b6a18108a0b5aa206aea5aa08e61481d03f705fa65ff3d3346bc6850c7601f02be6ebb02efd9fd26f2eb818e9e1a1c76ef53a657fdce27e38c48b103f36f92a237c9de", 0x93, 0x6}, {&(0x7f0000000180)="6baef316ba5a3b3c6ab0cd3c024556fd38b06b17b77b02462c2d6970923d1add9a33ea57eaba465a2b31245e7d80f8f9d61bc7f21feb42304e524e319b1739b9e0048192c073b979aebd9af6ee", 0x4d, 0x5d}, {&(0x7f0000000200)="2c60081d1aff2194fa04b83ed3c8729dd572129bba40844284c7b42b501bbbbf7b7b77ea4aad70c615dddd8aa78ccf285393d9e2b5c788ac028e4d7752dbb443e6bc725281ff2d150210e10a1a082253cd8ed4d056a553774fbcd536890a147417302a429c2c50757a7106b3b97f4993e11758950504c238bf260ec0dc934b8162f8cf60137bf5ea49fffc8b5d4108ab4cdee981edc5c5252315a70f10c3fd26e4c05461c18784aab60464ef9fe669e295e0a650bffe673e26b78ce8bc22acbfadb4ea7602a108852bf4cb06855b459fb4c19f41a28490a601b43af2150d2a00cc81006455f771a225476e22a1", 0xed, 0x4}, {&(0x7f00000016c0)="e33cf29eaf37f5636f86c73837efd3c6f5c8b19638c62946b297ee147f4fc67d76386da11fcba6a841d38e68e91394daa0388295f683ffd8da67d274403de3e9c9e0593c221c6978ea00ccf8dbb653e9e615614dbf2534745b96ad4d23c3616b2c805ed0e7a899690ebf1ecb82948534911e8ce95a840c86c25d5fd9e60d963307da9607c507bf53e3a09d4c3a983d61becc035e2aa17473a06c6c072e94c570cd53987473f04d0c3df808ef5b021572eb4cc52ed2f9fc7abcd39c7e5e8a1945570000000000000000", 0xb9, 0x6}, {&(0x7f00000003c0)="5f5e212c3fbc4aa434158e1f8316e847066a1fd22881571a490440b0b6b2af50763fd54e4194449267a45e030d70c48e1b9fab82928242d90c31841a5373d9fd337cdbfdead74a619233fe0a406210c6ba271e24eb1ae6e97a29e00274a29fa102f70e08937177945e6a13f15aab7c2fee0875887eb9fe91002c8ed4c31444b93928b97a8fcc9ec7caf95214a58f8f321b64f893f5032ab6061c0966c7d281fc621bd39633ef4cce47e5ad4b", 0xfffffc77, 0x8}, {&(0x7f0000000480)="87ee13c2e04e34fa344cf9a950738c1d1acf7a33106e9f6019c8b283870f2f93193b072c1cb7c0ac4fdecc76783a29186f957c0b184b82977f20e643ce0c6a0d0a003c0c307b0ea093bda7c9531f104bec3a33c0a24f6c6161bb5f9d5bd9b0d39b9e467004237ea96f37dcabee4bc9a2dff8374234ae9586a3a98612c2cb6c291f4e3e1fa1d37050aae1f6f1b154e1c5ce973991539c095868dba8d49a84b82792024fc6ea48fc1693eae7b2d0c5226644dc", 0xb2}, {&(0x7f0000000540)="b75e19a2430a7d3afc5f77fcf0a30ac7b2f9ed1eb47eaf773cb9ac139e2a2c5a56c3789ab1abcadec1feef3f239d70d69df048736e0e02a7caeb66993ccd5441559a9876c413b10c5c5c36ff6635f92c9af20729d8a254d25294bb04b4dc9ce448e0d45489f622139ece520d774113a057ac9c4d68686cb63f707c87b2640dd0133f37a2f999f900182fe51ad8", 0x8d, 0x5}, {&(0x7f0000000600)="54688f0cc2cf8ddbe787a153dad12db51810f4fa86a343edb89bfaf8c15c28dd0efd3d127161881fc89b03f9504c5ab8d0d173bea70f8747f9fa93f6924fbad45b852164b10bee999e22a3de71ae85f05f2358b17ee940e7948cc39a5533f9a6e4674f4df4faffd71b99aad22eb83ae4f48ec633924da74bd79f4067ae90e11959bfce40f1dfa14ea61837768808be5f0141f97e92b945234580cd2fc0ab178da9b5b50c5f827321a7b138aeb7039b8c32eec2b1d4e1c21dd0c9e3f53b9a6ed31b457ed3f19469792753d81722f6314e2ad38c5025bb3042b15ff88c9a0d7c4270b1df3c951d06ca55b92fe7deb7b160fb61b9692683a4bbcad4a2943b99bdcd2f2cef64fe2dff85b579a3c6454f889f20427b51ed1104880f33814aa34e5e4ad0e78b270af542a306804e7e80d08bbbf74a05692e2921356ea66779728b767327664d7fd7f2921ec61ae1d7c49fbac8df5bc22e942d198f2c5bc96d3190bed0dd9a571854ce55a1494fec61f62fe3cd4282adbf511779a946527656c07a81ddc4edc5086740e22eee802553297afc0b38a8fdede2c44ff1f9880f2828dce9832e987b8bd12fc29d8b2029a1ca44633e1fab057bf6a87e89b49198eb7f7c2601d10e66c653e008abab8828fd977fa5eb0d18a4f6cfe1377441d94dc536d674e1c5668d3864c4e65d9c072271274bb9462032afcf7cb8ba76a1f3a9785a4dc5b408c64d20026351f9fd206f3a0b00ad6fda8c8926636563f8b24f6babf01ef1dc7172d63756a1eea06c5714559f2d44805e6eb5dd34823656445e2ceacbe839f77236ba82f0e08e2f0681e69f1c6b2470743f953299b05ce038dac0fcacb1370e316e6884fd22080116cdafa43f5f46d6e1d194debc97bb0d3d4448adbd1e0cf1cb7f941f21da3741444a4cc6a21b3252ae37ac6d18ef87dc288276b8a3e44f58915a0caff9d15ded139d6680d6adcd49a78649f9751217572a4eba7ed5c3eb48a56ef8f976f57f9a235e64c7a3ba611b8f9742f813fb2be04bebefd78d7998feaadb5995d57030de8c7950d5cef5367522bfe51ff1aae72bde6937e31d3fd962fcd63e0f51f0da6128daa2607cf5daf8a3ca772202c58021c3e015abd479d4c9b4585f7bbacddf8a4c8a678da1216c1caffec3fcf386e39f0065e4af631c6fb4323dab4bfa3a4d8c0f74450ba17d4935592b9fe105959c5803a8162239da39549d64a3946098351259dba1064c34505850adbf559602ab1735971853f29eaa17bd6cf99fd3ff3ac28e8bc2c87d49da043bd0e8c3484210a5e8acc3bf52198f5ab8fbb68360ab0e4df709593b575dad2eb45388a1dc13608a49dd0b9811957eaae3fe9f9ec8cab360a716afb0aeb9902dca532e4a11ef9ec6ec9ab425422597250955a0aa38f6291a61713e18528a84d0a6a8c93b5a24612a679ca178b2b878640e9d4bb74fb447734b070b0127817df80e015234b8cf798ef3c0c521dda3f6ab070990cb020a712baaebdead2a7965e1e2584f2f5cf241206499509d64160231823d3628c1dae480a723d60cfb1c6290e7e20c2704b5b1ee7fb9eda058673251fca74ca245568f997972e22123e74913e0268a07f9c491e862c58791253e11c2cb26e515f784a2176f4aecb880361f0886734a2d220a557f20ba758eb1b7414c3af653d9a3d6711627ce4ce02b768903994e2e5034bc8b4628b80605ed8f6bde9c1cd886c4e4147658f9814bf8576c607c77dc5c3583d8f0a4f0c36dcfbaaa5bad5f724f244831e311396157407577465cb5c2b99ac0d3529cd72ae1fda1e3152bb358c30db81275c7ce1c78257f0120eb5897c0c9660c71c10686e1c513c9236707fac82a38699ded578869db3ebf86434a01a4c72eebbd1799c26c26c27810bd3bee24a08dd1ce99b46f1f929b8c25f0685d28d2a805c2eade06f34bd47f5f6625f25e17de17d9c9221a69953260d51c74c94e67c578527a8f1db79bf7b1fd6c40a144d4d84ede72c95329b3915ac1c08f23d89cda23a37c54f950d4f0eb514631be45686f9665f366c6170cfbec9b78dad8586f402f75be3ef086ba64cb27673de28fe869cfe522c9be523a3de8bb8b5c726e886ffc490e704c73e9a36f29cd7516b05b7046667c67b841b7aabee62c9523bb9234ee1990d5f8b371d0cf304213392264a80dca5cf613823eaacf9769b35434d66d425c53d3662e0ea42ae51f8bf65f8a7cc7b38871b7349a5540947795510bb8c8ff5638a27ccb8f7363c8dbe3f43a9af1484c2f56b215f6ab931fb98777484901b7386a3b2c21d80b009ac33b1facdc1a1c51c9f5df2e74c9cc8d60b859aa2d916c0a9a8e43f70d8cde68dfad3fcc59d8f1233d583c483100d89356bb6ffe3715f9b377c367b83fb6c3ddfef7b7e4b2805bcac75360f46c3780d2345359c3fa1a5e161fe0061f7f3f4de842c57c1daffed9a9e8a15f136e0478ab4ef144dc537a5231aaaa5ae3904b00b3e2717269f22b866c94fb28cdaa08abf59d17a238bab1f06721f2f66af8f8f6f9dd7f6fc692044a15e7ddb5242afad3697e71636edfefef358262fc0012aa896bb3413a1819ebe49a55d41e5f867a04a65cfbe82ce3626d6ca34cdf87ef45b1eef3eae57553e9ac109099f9bd4006b9c07e9e9c8efa6d43e5245938afb6d9c1bed2114a84005b777f0687b452a0da2becf35afce813e88cde5850d6a4423eed34945a8184e3972f5a6223f81f35cc1321b3e05207fb449609bc00c4630baa1196ce44df0f8c08e39267e7e3f953cbdbb4455b1f898db84345a9ce46acc9ec96e7f726b170a112f42738394a9c52e0156a5c0c13e4e2285053380659fa0a1f02e4ecef3618b4a258c5fafed30e75eb0cc14205490e4416cf03c08d4bfdbd955af2265c5d0ba85117e3cde70a0366e5936fd3b5d8de07c17a0953d8637088f5213aa761004cd7aed412ff41b5363efa6515c726afc2871535f30ba2480802f5a4d11b73ac439d29c8ead45c8d9631ae2bde8416a578aa41023ce5894c6a8d0f37fcd3b8c001370738a0dc37dc775a85712a72264521f242b8ca536db5c3f6cabf4b77e9ba8665db9c144f0f8470fa82d264c9e566394de2ee67fcdfee87929895ee05a71aedf84391c55f6e15bb0f9ec9ca1d458c291144404dce9408bb0554669ef06408fba3a9090d3a88fdbb759679f6a051d1df020e1c8fb67c3057283048f4189cd96dbdd44b8eac754e8afbe3b2589f5bee6d2ead55d08861b613c438c80ab8f9e9fc8fa0e196562182b8343e678f46801f5826076736c4d4068942b3cdd63450d288dde06a62aab3ecd17400a16f2ceb3d53c629df7fbc5a2546823fad47863990a2ee0e82c9ee346ff211adea42e9beac66f58d91eadccbc7868e27a7095ef3dd377cf557ea199aad76656179b56d37269ff0263dbb03d838ee21e3f1256bac3f5e0cd7dc0d9f71cc3b3dfb711b4660169ee9d34740602f9673b5ac71c64eaf5bba23f9f27e00f69c2e8e4c59138ca236145b3b29b51f971ecb95d15d9bdb68ca8d8489c446d483e6a995314059f9ec4d1be42f87615d112d3ff962ca0e5122d5b57631687fb2ae9b65243b52fbd56aa3d4b253dd088e70d959350d79819d7f6b7b751140bcb76b5b0adf9fec0d65d78377b4d2e58a659dce4ba4ca265fb6f7f1c06a1a2ea06f0e705969571d2ae34834b5b12d34a36803aef7f176e58d5f6204f2f61fefda7d8f689b318e00ef4dcf48d5b8bd12425639312c876ba0119e46ca54b70d705ed2e6ce2d6b22977bbe37d2e5f9f6feabc37d0a356c879b20176d83fe4ec5393dfdb80f76e886f9b94b1b6fc77441cae7afe77ace31e2cd8d8ff3a4b3c7b2bd1c9ceec5c722e18bf5ddf42706fb2536d7074d612a3ec5482ccc4da36e1c93db05ecfb0e795106fcd0c22189bdd03c5417b38a46dd74547cb843b472b2f68144d771e18228c2cbc794f4b75c22976598655ea0352efeb92a57a3f0579b1843183d77a42ce9f8fed797c72aa87cbfb65f0e50c026615e453edc726dd32620bedf1f13625943e21ec1c7b188d7f3ce87a9e51ca0669989b24c35c6bcb6f28afdbbe019b78eaadaa4cf85e84ed0329f4bef773c34a32dd3fa99b8e937ccd87599546964d9f1656beffbe692bd9ff05b1f443432d87011e139f9cbcc91bfafc56459a85eb04f7f360df7c80c54c14a282e45f59723ff91b595ce7ff3dcbd5dd6f60bb81b1fda8b7c1b24b64b3b599940599c99e7647454efc9eae9e9bb2ba4fb53105072b5c4c68bb77bb664f3ed94955a4fdfde25e9305d422b687d027f9694ac4af38980c583d8e570c31859525c863ec1a406085537d5339115434f717f1c8ae3995bfacfc47a57cdb7f9da04b2d741f837d49670c1ba569ab3ff91b72d0584fd34923769bc929f9f38c9bf89b856a8203c3141a252a6ac2c12e9873d4e2537065b93b8058ad4dbae21a06a90684567054a51f210c3b754256c0553ca4644e008a7e3983e82ccc007ff906cae80aa5a23ba0632259630914fb1de837e090a8ac0b343a332d968ff63dc14014771ddfa08c2ab0da740f61c9a572b1047b86a1709c38500be301fb6851b4f3bb1751be83961f24d4b61f71c2dc2fd169011a7b1b76e80b592df778645a920bba0259bf9fed4cd7deb304e27d79223e8f13b5ace984c97ed9cd1b756fb7783ecc9f4d85f94fadb034ef766a672ffb6bc0d1a0e435b5e92cccf771960286f096b556da45261ebe6bc250d89c38499049d482146b347e532e30fc1c8b6265dd4894e876a599bb0bed815dd100e57e3ec3b7280399a7f911eb369641e6e4120ca45aad4b3be9c64fcc9e60444ff335211f706a8ab5ea47dee7ddb09c28febec96add08afca4ef59670af99dc70b9d7a6c6493ce3f8a7a361c607607b4f1580139b6774d90b46fdc53aa3cbb8cb5352a98caf3d16e98da21793ab782e4c5a183a6fb43e703598f45f7282d922ab86e6e521b13270f6f519e3be4b2b651f203bf809d06eb31ebe6ea47f0c673197052123ae06b668af4a15d841cfd213d45efe3e7e5321a6a9fc32f6f967e516685d6ee53404a9feae318b019b58eca128a5dbe3a10564e73aadd42c20721bf41044a112a350f51c1b5a2d4a0aa83b0c50479e88cf231de7c9592250a1c136c04f31fa35f5420e334b54d2531845ceec380d2703d3e98f8bffb3f869974eb3f97b08384703cc4c65f9757f85fcb8d615b11b62d2c16aadeeaa49679135e3f965f5c42eb7d4ddbd60ef9d88190d1c68b3c67436639f61dea775fc6ab77beb21db4e104418876049c8497100395593410973bd7d5952932393974e32c138afd6fd60a31a6d7704188c70c0172dd35aafa5332b7ffda019cbe81322958d0607ae348a1a3e243fea61176f19f2a8d79ca2f737d4c66138151486092b64d6b2b5df33dd89d1bf42e9d9d31736249302ec79d07eba1252a05b6658824450afd651785e7404c5bd5ca22fdff2a195df855e7994587ad6bcdca5baa4ac08970528bdbd1d79d979dd07e2e8bac14e22a12a6edcac3ff6aa2902948f842c9af28287f7bc294367f882c4a58a63c1a59d25369eb04a0c01f8df0c6a96919c0823eb484d91625dfabbbca7538f1913289c85c2320074d85b91774ccd54630aaaa9759a5afd69a944a2fa2ac775785f6f1e55fe123d18bf502ce87334bb85a21fb0ccc7b5d7910ca8de8cd9cd2de97ddf1d1aaef93bffec2f6c854a7fa3e2cb665697cd6d37206f0ad24646ecfdb48fc6946b847672fd4a0a2dd98ba4b37c5e5cef2d4c93556e5a8a8e5", 0xffef, 0x3c}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x19, 0x0, &(0x7f0000000040)) fcntl$setlease(r0, 0x400, 0x2) 17:19:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) [ 351.744936] FAULT_INJECTION: forcing a failure. [ 351.744936] name failslab, interval 1, probability 0, space 0, times 0 [ 351.766014] CPU: 0 PID: 21145 Comm: syz-executor.4 Not tainted 4.14.151 #0 [ 351.773068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 351.773074] Call Trace: [ 351.773093] dump_stack+0x138/0x197 [ 351.773113] should_fail.cold+0x10f/0x159 [ 351.773128] should_failslab+0xdb/0x130 [ 351.773138] kmem_cache_alloc_trace+0x2e9/0x790 [ 351.773149] ? __lockdep_init_map+0x10c/0x570 [ 351.773162] ? loop_get_status64+0x120/0x120 [ 351.773171] __kthread_create_on_node+0xe3/0x3e0 [ 351.773181] ? kthread_park+0x140/0x140 [ 351.773191] ? __fget+0x210/0x370 [ 351.773208] ? loop_get_status64+0x120/0x120 [ 351.773218] kthread_create_on_node+0xa8/0xd0 [ 351.773227] ? __kthread_create_on_node+0x3e0/0x3e0 [ 351.773240] ? __lockdep_init_map+0x10c/0x570 [ 351.773254] lo_ioctl+0xcf7/0x1ce0 [ 351.773264] ? debug_check_no_obj_freed+0x2aa/0x7b7 [ 351.773276] ? loop_probe+0x160/0x160 [ 351.773287] blkdev_ioctl+0x96b/0x1860 [ 351.819247] ? blkpg_ioctl+0x980/0x980 [ 351.819267] ? __might_sleep+0x93/0xb0 [ 351.819277] ? __fget+0x210/0x370 [ 351.819289] block_ioctl+0xde/0x120 [ 351.819299] ? blkdev_fallocate+0x3b0/0x3b0 [ 351.827168] do_vfs_ioctl+0x7ae/0x1060 [ 351.827182] ? selinux_file_mprotect+0x5d0/0x5d0 [ 351.827194] ? lock_downgrade+0x740/0x740 [ 351.827204] ? ioctl_preallocate+0x1c0/0x1c0 [ 351.827217] ? __fget+0x237/0x370 [ 351.841205] ? security_file_ioctl+0x89/0xb0 [ 351.841220] SyS_ioctl+0x8f/0xc0 [ 351.841227] ? do_vfs_ioctl+0x1060/0x1060 [ 351.841239] do_syscall_64+0x1e8/0x640 [ 351.841247] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 351.841261] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 351.841269] RIP: 0033:0x459db7 [ 351.841274] RSP: 002b:00007f295d48da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 351.841284] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 17:19:13 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, 0x0, 0x0) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:13 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x0, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:13 executing program 4 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000", 0x38, 0x10000}], 0x0, 0x0) [ 351.841289] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 351.841295] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 351.841300] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 351.841305] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 352.083242] FAULT_INJECTION: forcing a failure. [ 352.083242] name failslab, interval 1, probability 0, space 0, times 0 [ 352.103147] CPU: 0 PID: 21171 Comm: syz-executor.4 Not tainted 4.14.151 #0 [ 352.110206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.119558] Call Trace: [ 352.119579] dump_stack+0x138/0x197 [ 352.125819] should_fail.cold+0x10f/0x159 [ 352.129985] should_failslab+0xdb/0x130 [ 352.134056] kmem_cache_alloc+0x2d7/0x780 [ 352.138212] ? trace_hardirqs_on+0x10/0x10 [ 352.142449] ? save_trace+0x290/0x290 [ 352.146242] __kernfs_new_node+0x70/0x420 [ 352.150397] kernfs_new_node+0x80/0xf0 [ 352.154469] kernfs_create_dir_ns+0x41/0x140 [ 352.158887] internal_create_group+0xea/0x7b0 [ 352.163392] sysfs_create_group+0x20/0x30 [ 352.167547] lo_ioctl+0x1176/0x1ce0 [ 352.171179] ? loop_probe+0x160/0x160 [ 352.174985] blkdev_ioctl+0x96b/0x1860 [ 352.178868] ? blkpg_ioctl+0x980/0x980 [ 352.182754] ? __might_sleep+0x93/0xb0 [ 352.186658] ? __fget+0x210/0x370 [ 352.190107] block_ioctl+0xde/0x120 [ 352.193731] ? blkdev_fallocate+0x3b0/0x3b0 [ 352.198059] do_vfs_ioctl+0x7ae/0x1060 [ 352.201930] ? selinux_file_mprotect+0x5d0/0x5d0 [ 352.206671] ? lock_downgrade+0x740/0x740 [ 352.210840] ? ioctl_preallocate+0x1c0/0x1c0 [ 352.215252] ? __fget+0x237/0x370 [ 352.218740] ? security_file_ioctl+0x89/0xb0 [ 352.223305] SyS_ioctl+0x8f/0xc0 [ 352.226652] ? do_vfs_ioctl+0x1060/0x1060 [ 352.230793] do_syscall_64+0x1e8/0x640 [ 352.234668] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 352.239509] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 352.244695] RIP: 0033:0x459db7 [ 352.247863] RSP: 002b:00007f295d48da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 352.255554] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 352.262815] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 352.270070] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 17:19:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) [ 352.277328] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 352.284597] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000", 0x38, 0x10000}], 0x0, 0x0) 17:19:13 executing program 4 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) [ 352.390642] print_req_error: I/O error, dev loop4, sector 128 17:19:14 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/validatetrans\x00', 0x1, 0x0) 17:19:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f", 0x41, 0x10000}], 0x0, 0x0) [ 352.511791] FAULT_INJECTION: forcing a failure. [ 352.511791] name failslab, interval 1, probability 0, space 0, times 0 [ 352.546854] print_req_error: I/O error, dev loop4, sector 128 [ 352.557862] print_req_error: I/O error, dev loop4, sector 128 [ 352.569674] CPU: 1 PID: 21197 Comm: syz-executor.4 Not tainted 4.14.151 #0 [ 352.576726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 352.586087] Call Trace: [ 352.588689] dump_stack+0x138/0x197 [ 352.592341] should_fail.cold+0x10f/0x159 [ 352.596512] should_failslab+0xdb/0x130 [ 352.600489] kmem_cache_alloc+0x2d7/0x780 [ 352.604640] ? __mutex_unlock_slowpath+0x71/0x800 [ 352.609498] ? __lock_is_held+0xb6/0x140 [ 352.613566] __kernfs_new_node+0x70/0x420 [ 352.613583] kernfs_new_node+0x80/0xf0 [ 352.613596] __kernfs_create_file+0x46/0x323 [ 352.613610] sysfs_add_file_mode_ns+0x1e4/0x450 [ 352.613624] internal_create_group+0x232/0x7b0 [ 352.621654] sysfs_create_group+0x20/0x30 [ 352.621667] lo_ioctl+0x1176/0x1ce0 [ 352.621682] ? loop_probe+0x160/0x160 [ 352.621696] blkdev_ioctl+0x96b/0x1860 [ 352.621706] ? blkpg_ioctl+0x980/0x980 [ 352.621723] ? __might_sleep+0x93/0xb0 [ 352.621732] ? __fget+0x210/0x370 [ 352.621744] block_ioctl+0xde/0x120 [ 352.621752] ? blkdev_fallocate+0x3b0/0x3b0 [ 352.621761] do_vfs_ioctl+0x7ae/0x1060 [ 352.621775] ? selinux_file_mprotect+0x5d0/0x5d0 [ 352.678466] ? lock_downgrade+0x740/0x740 [ 352.682602] ? ioctl_preallocate+0x1c0/0x1c0 [ 352.686997] ? __fget+0x237/0x370 [ 352.690437] ? security_file_ioctl+0x89/0xb0 [ 352.694915] SyS_ioctl+0x8f/0xc0 [ 352.698266] ? do_vfs_ioctl+0x1060/0x1060 [ 352.702397] do_syscall_64+0x1e8/0x640 [ 352.706270] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 352.711115] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 352.716291] RIP: 0033:0x459db7 [ 352.719466] RSP: 002b:00007f295d48da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 352.727177] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 352.734431] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 352.741701] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 352.748965] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 352.756499] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f", 0x41, 0x10000}], 0x0, 0x0) 17:19:14 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x0, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:14 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, 0x0, 0x0) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) 17:19:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f", 0x41, 0x10000}], 0x0, 0x0) 17:19:14 executing program 4 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:14 executing program 2: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000000)=0x4, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) munlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$CAPI_CLR_FLAGS(r2, 0x80044325, &(0x7f0000000040)=0x1) [ 352.979965] FAULT_INJECTION: forcing a failure. [ 352.979965] name failslab, interval 1, probability 0, space 0, times 0 [ 353.007068] CPU: 1 PID: 21235 Comm: syz-executor.4 Not tainted 4.14.151 #0 [ 353.014124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.023485] Call Trace: [ 353.026067] dump_stack+0x138/0x197 [ 353.029698] should_fail.cold+0x10f/0x159 [ 353.033847] should_failslab+0xdb/0x130 [ 353.037806] kmem_cache_alloc+0x2d7/0x780 [ 353.041950] ? wait_for_completion+0x420/0x420 [ 353.046518] __kernfs_new_node+0x70/0x420 [ 353.050662] kernfs_new_node+0x80/0xf0 [ 353.054532] __kernfs_create_file+0x46/0x323 [ 353.058922] sysfs_add_file_mode_ns+0x1e4/0x450 [ 353.063585] internal_create_group+0x232/0x7b0 [ 353.068165] sysfs_create_group+0x20/0x30 [ 353.072295] lo_ioctl+0x1176/0x1ce0 [ 353.075908] ? loop_probe+0x160/0x160 [ 353.079702] blkdev_ioctl+0x96b/0x1860 [ 353.083572] ? blkpg_ioctl+0x980/0x980 [ 353.087467] ? __might_sleep+0x93/0xb0 [ 353.091336] ? __fget+0x210/0x370 [ 353.094773] block_ioctl+0xde/0x120 [ 353.098389] ? blkdev_fallocate+0x3b0/0x3b0 [ 353.102692] do_vfs_ioctl+0x7ae/0x1060 [ 353.106561] ? selinux_file_mprotect+0x5d0/0x5d0 [ 353.111298] ? lock_downgrade+0x740/0x740 [ 353.115427] ? ioctl_preallocate+0x1c0/0x1c0 [ 353.119817] ? __fget+0x237/0x370 [ 353.123273] ? security_file_ioctl+0x89/0xb0 [ 353.127667] SyS_ioctl+0x8f/0xc0 [ 353.131016] ? do_vfs_ioctl+0x1060/0x1060 [ 353.135158] do_syscall_64+0x1e8/0x640 [ 353.139027] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 353.143861] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 353.149047] RIP: 0033:0x459db7 [ 353.152229] RSP: 002b:00007f295d48da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 353.159919] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 353.167173] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 17:19:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 17:19:14 executing program 2: syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000080)='./file1\x00', 0x7, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) accept$unix(0xffffffffffffffff, &(0x7f00000001c0)=@abs, &(0x7f0000000100)=0x6e) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$llc(r1, &(0x7f0000000000)={0x1a, 0x7cfff998bb1c4832, 0x9, 0x1, 0x6, 0x7f, @random="8c78b5121d88"}, 0x10) [ 353.174439] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 353.181689] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 353.188952] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:14 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:14 executing program 4 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 353.338493] print_req_error: I/O error, dev loop4, sector 128 [ 353.384990] FAULT_INJECTION: forcing a failure. [ 353.384990] name failslab, interval 1, probability 0, space 0, times 0 [ 353.407105] CPU: 0 PID: 21271 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 353.414166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.423524] Call Trace: [ 353.425669] FAULT_INJECTION: forcing a failure. [ 353.425669] name failslab, interval 1, probability 0, space 0, times 0 [ 353.426117] dump_stack+0x138/0x197 [ 353.426139] should_fail.cold+0x10f/0x159 [ 353.426156] should_failslab+0xdb/0x130 [ 353.449059] __kmalloc+0x2f0/0x7a0 [ 353.452598] ? __sb_end_write+0xc1/0x100 [ 353.456656] ? strnlen_user+0x12f/0x1a0 [ 353.460624] ? SyS_memfd_create+0xba/0x3a0 [ 353.464855] SyS_memfd_create+0xba/0x3a0 [ 353.468908] ? shmem_fcntl+0x130/0x130 [ 353.472790] ? do_syscall_64+0x53/0x640 [ 353.476757] ? shmem_fcntl+0x130/0x130 [ 353.480642] do_syscall_64+0x1e8/0x640 [ 353.484522] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 353.489363] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 353.494544] RIP: 0033:0x459f49 [ 353.497721] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 353.505422] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f49 [ 353.512685] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004beff7 [ 353.519945] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 353.527225] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fc4a260a6d4 [ 353.534488] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 353.541974] CPU: 1 PID: 21272 Comm: syz-executor.4 Not tainted 4.14.151 #0 [ 353.549009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.558375] Call Trace: [ 353.560975] dump_stack+0x138/0x197 [ 353.564617] should_fail.cold+0x10f/0x159 [ 353.568781] should_failslab+0xdb/0x130 [ 353.572766] kmem_cache_alloc+0x2d7/0x780 [ 353.576926] ? wait_for_completion+0x420/0x420 [ 353.581530] __kernfs_new_node+0x70/0x420 [ 353.585684] kernfs_new_node+0x80/0xf0 [ 353.585697] __kernfs_create_file+0x46/0x323 [ 353.593993] sysfs_add_file_mode_ns+0x1e4/0x450 [ 353.594011] internal_create_group+0x232/0x7b0 [ 353.594028] sysfs_create_group+0x20/0x30 [ 353.594039] lo_ioctl+0x1176/0x1ce0 [ 353.594052] ? loop_probe+0x160/0x160 [ 353.614846] blkdev_ioctl+0x96b/0x1860 [ 353.616042] FAULT_INJECTION: forcing a failure. [ 353.616042] name failslab, interval 1, probability 0, space 0, times 0 [ 353.618753] ? blkpg_ioctl+0x980/0x980 [ 353.618773] ? __might_sleep+0x93/0xb0 [ 353.618784] ? __fget+0x210/0x370 [ 353.618798] block_ioctl+0xde/0x120 [ 353.618807] ? blkdev_fallocate+0x3b0/0x3b0 [ 353.618821] do_vfs_ioctl+0x7ae/0x1060 [ 353.652989] ? selinux_file_mprotect+0x5d0/0x5d0 [ 353.657736] ? lock_downgrade+0x740/0x740 [ 353.661889] ? ioctl_preallocate+0x1c0/0x1c0 [ 353.666303] ? __fget+0x237/0x370 [ 353.669759] ? security_file_ioctl+0x89/0xb0 [ 353.674169] SyS_ioctl+0x8f/0xc0 [ 353.677553] ? do_vfs_ioctl+0x1060/0x1060 [ 353.681696] do_syscall_64+0x1e8/0x640 [ 353.685579] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 353.690423] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 353.695609] RIP: 0033:0x459db7 [ 353.698793] RSP: 002b:00007f295d48da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 353.706498] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 353.713766] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 353.721028] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 353.728287] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 17:19:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 17:19:15 executing program 3 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 353.735545] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 353.742828] CPU: 0 PID: 21279 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 353.749860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.759227] Call Trace: [ 353.761843] dump_stack+0x138/0x197 [ 353.765482] should_fail.cold+0x10f/0x159 [ 353.769631] should_failslab+0xdb/0x130 [ 353.773600] kmem_cache_alloc+0x2d7/0x780 [ 353.777740] ? __alloc_fd+0x1d4/0x4a0 [ 353.781537] __d_alloc+0x2d/0x9f0 [ 353.785147] ? lock_downgrade+0x740/0x740 [ 353.789279] d_alloc_pseudo+0x1e/0x30 [ 353.793092] __shmem_file_setup.part.0+0xd8/0x400 [ 353.797941] ? __alloc_fd+0x1d4/0x4a0 [ 353.801735] ? shmem_fill_super+0x8c0/0x8c0 [ 353.806048] SyS_memfd_create+0x1f9/0x3a0 [ 353.810193] ? shmem_fcntl+0x130/0x130 [ 353.814068] ? do_syscall_64+0x53/0x640 [ 353.818026] ? shmem_fcntl+0x130/0x130 [ 353.821898] do_syscall_64+0x1e8/0x640 [ 353.825771] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 353.830601] entry_SYSCALL_64_after_hwframe+0x42/0xb7 17:19:15 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x0, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 353.835773] RIP: 0033:0x459f49 [ 353.838943] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 353.846632] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f49 [ 353.853903] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004beff7 [ 353.861154] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 353.868419] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fc4a260a6d4 [ 353.875675] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:15 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0), 0x0) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) [ 353.909566] print_req_error: I/O error, dev loop4, sector 128 17:19:15 executing program 3 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:15 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x101000, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r0, 0xc0106401, &(0x7f0000000100)={0xcc, &(0x7f00000001c0)=""/204}) 17:19:15 executing program 4 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 354.016330] FAULT_INJECTION: forcing a failure. [ 354.016330] name failslab, interval 1, probability 0, space 0, times 0 [ 354.086919] CPU: 0 PID: 21300 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 354.087096] FAULT_INJECTION: forcing a failure. [ 354.087096] name failslab, interval 1, probability 0, space 0, times 0 [ 354.093975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.093981] Call Trace: [ 354.094000] dump_stack+0x138/0x197 [ 354.094018] should_fail.cold+0x10f/0x159 [ 354.094032] should_failslab+0xdb/0x130 [ 354.094043] kmem_cache_alloc+0x2d7/0x780 [ 354.094054] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 354.094064] ? rcu_read_lock_sched_held+0x110/0x130 [ 354.094073] ? shmem_destroy_callback+0xa0/0xa0 [ 354.094081] shmem_alloc_inode+0x1c/0x50 [ 354.094091] alloc_inode+0x64/0x180 [ 354.094100] new_inode_pseudo+0x19/0xf0 [ 354.094110] new_inode+0x1f/0x40 [ 354.094118] shmem_get_inode+0x75/0x750 [ 354.094132] __shmem_file_setup.part.0+0x111/0x400 [ 354.094140] ? __alloc_fd+0x1d4/0x4a0 [ 354.094150] ? shmem_fill_super+0x8c0/0x8c0 [ 354.094167] SyS_memfd_create+0x1f9/0x3a0 [ 354.094176] ? shmem_fcntl+0x130/0x130 [ 354.094185] ? do_syscall_64+0x53/0x640 [ 354.094194] ? shmem_fcntl+0x130/0x130 [ 354.094205] do_syscall_64+0x1e8/0x640 [ 354.094213] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 354.094226] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 354.094233] RIP: 0033:0x459f49 [ 354.094238] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 354.094248] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f49 [ 354.094253] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004beff7 [ 354.094259] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 354.094263] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fc4a260a6d4 [ 354.094269] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 354.105798] CPU: 1 PID: 21311 Comm: syz-executor.4 Not tainted 4.14.151 #0 [ 354.125319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.125324] Call Trace: [ 354.125339] dump_stack+0x138/0x197 [ 354.125358] should_fail.cold+0x10f/0x159 [ 354.125373] should_failslab+0xdb/0x130 [ 354.125387] kmem_cache_alloc+0x2d7/0x780 [ 354.291817] ? wait_for_completion+0x420/0x420 [ 354.296393] __kernfs_new_node+0x70/0x420 [ 354.300527] kernfs_new_node+0x80/0xf0 [ 354.304396] __kernfs_create_file+0x46/0x323 [ 354.308792] sysfs_add_file_mode_ns+0x1e4/0x450 [ 354.313480] internal_create_group+0x232/0x7b0 [ 354.318053] sysfs_create_group+0x20/0x30 [ 354.322184] lo_ioctl+0x1176/0x1ce0 [ 354.325802] ? loop_probe+0x160/0x160 [ 354.329586] blkdev_ioctl+0x96b/0x1860 [ 354.333454] ? blkpg_ioctl+0x980/0x980 [ 354.337338] ? __might_sleep+0x93/0xb0 [ 354.341207] ? __fget+0x210/0x370 [ 354.344645] block_ioctl+0xde/0x120 [ 354.348262] ? blkdev_fallocate+0x3b0/0x3b0 [ 354.352566] do_vfs_ioctl+0x7ae/0x1060 [ 354.356438] ? selinux_file_mprotect+0x5d0/0x5d0 [ 354.361177] ? lock_downgrade+0x740/0x740 [ 354.365307] ? ioctl_preallocate+0x1c0/0x1c0 [ 354.369723] ? __fget+0x237/0x370 [ 354.373163] ? security_file_ioctl+0x89/0xb0 [ 354.377554] SyS_ioctl+0x8f/0xc0 [ 354.380898] ? do_vfs_ioctl+0x1060/0x1060 [ 354.385033] do_syscall_64+0x1e8/0x640 [ 354.388899] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 354.393729] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 354.398898] RIP: 0033:0x459db7 [ 354.402066] RSP: 002b:00007f295d48da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 354.409758] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 354.417011] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 354.424264] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 17:19:16 executing program 3 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 354.431514] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 354.438764] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 354.510707] FAULT_INJECTION: forcing a failure. [ 354.510707] name failslab, interval 1, probability 0, space 0, times 0 [ 354.529258] CPU: 0 PID: 21322 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 354.536317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.545663] Call Trace: [ 354.548321] dump_stack+0x138/0x197 [ 354.551941] should_fail.cold+0x10f/0x159 [ 354.556077] should_failslab+0xdb/0x130 [ 354.560040] kmem_cache_alloc+0x2d7/0x780 [ 354.564174] ? shmem_alloc_inode+0x1c/0x50 [ 354.568443] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 354.573881] selinux_inode_alloc_security+0xb6/0x2a0 [ 354.578966] security_inode_alloc+0x94/0xd0 [ 354.583272] inode_init_always+0x552/0xaf0 [ 354.587491] alloc_inode+0x81/0x180 [ 354.591098] new_inode_pseudo+0x19/0xf0 [ 354.595051] new_inode+0x1f/0x40 [ 354.598398] shmem_get_inode+0x75/0x750 [ 354.602355] __shmem_file_setup.part.0+0x111/0x400 [ 354.607265] ? __alloc_fd+0x1d4/0x4a0 [ 354.611050] ? shmem_fill_super+0x8c0/0x8c0 [ 354.615353] SyS_memfd_create+0x1f9/0x3a0 [ 354.619483] ? shmem_fcntl+0x130/0x130 [ 354.623358] ? do_syscall_64+0x53/0x640 [ 354.627314] ? shmem_fcntl+0x130/0x130 [ 354.631182] do_syscall_64+0x1e8/0x640 [ 354.635062] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 354.639902] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 354.645083] RIP: 0033:0x459f49 [ 354.648255] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 17:19:16 executing program 2: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a3ffe9f0c977c00858a13000001000000000001fffffff600", 0x48, 0x9}], 0x0, 0x0) rt_sigreturn() 17:19:16 executing program 3 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 354.655943] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f49 [ 354.663194] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004beff7 [ 354.670480] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 354.677732] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fc4a260a6d4 [ 354.685065] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:16 executing program 4 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:16 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) [ 354.793212] FAULT_INJECTION: forcing a failure. [ 354.793212] name failslab, interval 1, probability 0, space 0, times 0 [ 354.810101] net_ratelimit: 16 callbacks suppressed [ 354.810106] protocol 88fb is buggy, dev hsr_slave_0 [ 354.820185] protocol 88fb is buggy, dev hsr_slave_1 [ 354.823722] FAULT_INJECTION: forcing a failure. [ 354.823722] name failslab, interval 1, probability 0, space 0, times 0 [ 354.825302] protocol 88fb is buggy, dev hsr_slave_0 [ 354.839034] CPU: 1 PID: 21333 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 354.841559] protocol 88fb is buggy, dev hsr_slave_1 [ 354.848491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 354.862839] Call Trace: [ 354.865423] dump_stack+0x138/0x197 [ 354.869037] should_fail.cold+0x10f/0x159 [ 354.873170] should_failslab+0xdb/0x130 [ 354.877126] kmem_cache_alloc+0x2d7/0x780 [ 354.881258] ? lock_downgrade+0x740/0x740 [ 354.885392] get_empty_filp+0x8c/0x3f0 [ 354.889263] alloc_file+0x23/0x440 [ 354.892789] __shmem_file_setup.part.0+0x1b1/0x400 [ 354.898139] ? __alloc_fd+0x1d4/0x4a0 [ 354.901929] ? shmem_fill_super+0x8c0/0x8c0 [ 354.906259] SyS_memfd_create+0x1f9/0x3a0 [ 354.910400] ? shmem_fcntl+0x130/0x130 [ 354.914311] ? do_syscall_64+0x53/0x640 [ 354.918299] ? shmem_fcntl+0x130/0x130 [ 354.922185] do_syscall_64+0x1e8/0x640 [ 354.926060] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 354.930891] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 354.936064] RIP: 0033:0x459f49 [ 354.939235] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 354.946924] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f49 [ 354.954177] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004beff7 [ 354.961430] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 354.968682] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fc4a260a6d4 [ 354.975934] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 354.983449] protocol 88fb is buggy, dev hsr_slave_0 [ 354.988525] protocol 88fb is buggy, dev hsr_slave_1 17:19:16 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0), 0x0) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 354.993681] protocol 88fb is buggy, dev hsr_slave_0 [ 354.998761] protocol 88fb is buggy, dev hsr_slave_1 [ 355.017631] CPU: 1 PID: 21340 Comm: syz-executor.4 Not tainted 4.14.151 #0 [ 355.024686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 355.034068] Call Trace: [ 355.036692] dump_stack+0x138/0x197 [ 355.040342] should_fail.cold+0x10f/0x159 [ 355.044508] should_failslab+0xdb/0x130 [ 355.048499] kmem_cache_alloc+0x2d7/0x780 [ 355.052658] ? wait_for_completion+0x420/0x420 [ 355.057256] __kernfs_new_node+0x70/0x420 [ 355.061443] kernfs_new_node+0x80/0xf0 [ 355.065340] __kernfs_create_file+0x46/0x323 [ 355.069760] sysfs_add_file_mode_ns+0x1e4/0x450 [ 355.074442] internal_create_group+0x232/0x7b0 [ 355.079041] sysfs_create_group+0x20/0x30 [ 355.083198] lo_ioctl+0x1176/0x1ce0 [ 355.086838] ? loop_probe+0x160/0x160 [ 355.090644] blkdev_ioctl+0x96b/0x1860 [ 355.094544] ? blkpg_ioctl+0x980/0x980 [ 355.098445] ? __might_sleep+0x93/0xb0 [ 355.102336] ? __fget+0x210/0x370 [ 355.105799] block_ioctl+0xde/0x120 [ 355.109432] ? blkdev_fallocate+0x3b0/0x3b0 [ 355.113862] do_vfs_ioctl+0x7ae/0x1060 [ 355.117752] ? selinux_file_mprotect+0x5d0/0x5d0 [ 355.122508] ? lock_downgrade+0x740/0x740 [ 355.126660] ? ioctl_preallocate+0x1c0/0x1c0 [ 355.131069] ? __fget+0x237/0x370 [ 355.134529] ? security_file_ioctl+0x89/0xb0 [ 355.138941] SyS_ioctl+0x8f/0xc0 [ 355.142311] ? do_vfs_ioctl+0x1060/0x1060 [ 355.146463] do_syscall_64+0x1e8/0x640 [ 355.150349] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 355.155196] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 355.160383] RIP: 0033:0x459db7 [ 355.163566] RSP: 002b:00007f295d48da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 355.171276] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 355.178545] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 355.185821] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 355.193097] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 355.200374] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:16 executing program 3 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) [ 355.325337] FAULT_INJECTION: forcing a failure. [ 355.325337] name failslab, interval 1, probability 0, space 0, times 0 [ 355.350474] CPU: 1 PID: 21357 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 355.357533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 355.367421] Call Trace: [ 355.370000] dump_stack+0x138/0x197 [ 355.373621] should_fail.cold+0x10f/0x159 [ 355.377754] should_failslab+0xdb/0x130 [ 355.381710] kmem_cache_alloc+0x2d7/0x780 [ 355.385840] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 355.391276] ? check_preemption_disabled+0x3c/0x250 [ 355.396275] selinux_file_alloc_security+0xb4/0x190 [ 355.401274] security_file_alloc+0x6d/0xa0 [ 355.405496] get_empty_filp+0x162/0x3f0 [ 355.409452] alloc_file+0x23/0x440 [ 355.412986] __shmem_file_setup.part.0+0x1b1/0x400 [ 355.417900] ? __alloc_fd+0x1d4/0x4a0 [ 355.421688] ? shmem_fill_super+0x8c0/0x8c0 [ 355.426000] SyS_memfd_create+0x1f9/0x3a0 [ 355.430134] ? shmem_fcntl+0x130/0x130 [ 355.434006] ? do_syscall_64+0x53/0x640 [ 355.437966] ? shmem_fcntl+0x130/0x130 [ 355.441847] do_syscall_64+0x1e8/0x640 [ 355.445716] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 355.454554] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 355.459742] RIP: 0033:0x459f49 [ 355.462926] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 355.470618] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f49 [ 355.477871] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004beff7 [ 355.485122] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 355.492374] R10: 0000000000010000 R11: 0000000000000246 R12: 00007fc4a260a6d4 [ 355.499632] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 355.520135] protocol 88fb is buggy, dev hsr_slave_0 [ 355.525252] protocol 88fb is buggy, dev hsr_slave_1 17:19:17 executing program 4 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) [ 355.617634] FAULT_INJECTION: forcing a failure. [ 355.617634] name failslab, interval 1, probability 0, space 0, times 0 [ 355.643029] CPU: 0 PID: 21367 Comm: syz-executor.4 Not tainted 4.14.151 #0 [ 355.650089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 355.659452] Call Trace: [ 355.662055] dump_stack+0x138/0x197 [ 355.665699] should_fail.cold+0x10f/0x159 [ 355.669865] should_failslab+0xdb/0x130 [ 355.673860] kmem_cache_alloc+0x2d7/0x780 [ 355.678024] ? wait_for_completion+0x420/0x420 [ 355.682626] __kernfs_new_node+0x70/0x420 [ 355.686789] kernfs_new_node+0x80/0xf0 [ 355.690688] __kernfs_create_file+0x46/0x323 [ 355.695102] sysfs_add_file_mode_ns+0x1e4/0x450 [ 355.699776] internal_create_group+0x232/0x7b0 [ 355.704367] sysfs_create_group+0x20/0x30 [ 355.708518] lo_ioctl+0x1176/0x1ce0 [ 355.712148] ? loop_probe+0x160/0x160 [ 355.715955] blkdev_ioctl+0x96b/0x1860 [ 355.719845] ? blkpg_ioctl+0x980/0x980 [ 355.723742] ? __might_sleep+0x93/0xb0 [ 355.727628] ? __fget+0x210/0x370 [ 355.731085] block_ioctl+0xde/0x120 [ 355.734716] ? blkdev_fallocate+0x3b0/0x3b0 [ 355.739059] do_vfs_ioctl+0x7ae/0x1060 [ 355.742947] ? selinux_file_mprotect+0x5d0/0x5d0 [ 355.747793] ? lock_downgrade+0x740/0x740 [ 355.751950] ? ioctl_preallocate+0x1c0/0x1c0 [ 355.756365] ? __fget+0x237/0x370 [ 355.759914] ? security_file_ioctl+0x89/0xb0 [ 355.764323] SyS_ioctl+0x8f/0xc0 [ 355.767688] ? do_vfs_ioctl+0x1060/0x1060 [ 355.771840] do_syscall_64+0x1e8/0x640 [ 355.775732] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 355.780588] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 355.785789] RIP: 0033:0x459db7 [ 355.788975] RSP: 002b:00007f295d48da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 355.796696] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 355.803975] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 355.811253] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 355.818531] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 355.825803] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 17:19:17 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:17 executing program 3 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 355.945318] FAULT_INJECTION: forcing a failure. [ 355.945318] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 355.958635] CPU: 1 PID: 21382 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 355.965771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 355.975157] Call Trace: [ 355.977747] dump_stack+0x138/0x197 [ 355.981375] should_fail.cold+0x10f/0x159 [ 355.985513] ? __might_sleep+0x93/0xb0 [ 355.989389] __alloc_pages_nodemask+0x1d6/0x7a0 [ 355.994046] ? __alloc_pages_slowpath+0x2930/0x2930 [ 355.999043] ? lock_downgrade+0x740/0x740 [ 356.003185] alloc_pages_vma+0xc9/0x4c0 [ 356.007143] shmem_alloc_page+0xf6/0x1a0 [ 356.011187] ? shmem_swapin+0x1a0/0x1a0 [ 356.015152] ? cred_has_capability+0x142/0x290 [ 356.019717] ? check_preemption_disabled+0x3c/0x250 [ 356.024719] ? __this_cpu_preempt_check+0x1d/0x30 [ 356.029562] ? percpu_counter_add_batch+0x112/0x160 [ 356.034563] ? __vm_enough_memory+0x26a/0x490 [ 356.039045] shmem_alloc_and_acct_page+0x12a/0x680 [ 356.043961] shmem_getpage_gfp+0x3e7/0x25d0 [ 356.048278] ? shmem_add_to_page_cache+0x860/0x860 [ 356.053198] ? iov_iter_fault_in_readable+0x1da/0x3c0 [ 356.058374] shmem_write_begin+0xfd/0x1b0 [ 356.062518] ? trace_hardirqs_on_caller+0x400/0x590 [ 356.067519] generic_perform_write+0x1f8/0x480 [ 356.072086] ? page_endio+0x530/0x530 [ 356.075867] ? current_time+0xb0/0xb0 [ 356.079651] ? generic_file_write_iter+0x9a/0x660 [ 356.084479] __generic_file_write_iter+0x239/0x5b0 [ 356.089394] generic_file_write_iter+0x303/0x660 [ 356.094138] __vfs_write+0x4a7/0x6b0 [ 356.097830] ? selinux_file_open+0x420/0x420 [ 356.102220] ? kernel_read+0x120/0x120 [ 356.106103] ? check_preemption_disabled+0x3c/0x250 [ 356.111102] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 356.116538] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 356.121277] ? __sb_start_write+0x153/0x2f0 [ 356.125587] vfs_write+0x198/0x500 [ 356.129112] SyS_pwrite64+0x115/0x140 [ 356.132898] ? SyS_pread64+0x140/0x140 [ 356.136767] ? do_syscall_64+0x53/0x640 [ 356.140731] ? SyS_pread64+0x140/0x140 [ 356.144611] do_syscall_64+0x1e8/0x640 [ 356.148479] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 356.153309] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 356.158487] RIP: 0033:0x413d47 [ 356.161659] RSP: 002b:00007fc4a2609a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 356.169357] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000413d47 [ 356.176613] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 0000000000000004 [ 356.183875] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 17:19:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 17:19:17 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0), 0x0) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 356.191212] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 356.198462] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:17 executing program 3 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 17:19:17 executing program 4 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 356.411587] FAULT_INJECTION: forcing a failure. [ 356.411587] name failslab, interval 1, probability 0, space 0, times 0 [ 356.422823] CPU: 1 PID: 21402 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 356.422830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.422834] Call Trace: [ 356.422853] dump_stack+0x138/0x197 [ 356.422872] should_fail.cold+0x10f/0x159 [ 356.422889] should_failslab+0xdb/0x130 [ 356.422900] kmem_cache_alloc+0x47/0x780 [ 356.422908] ? __alloc_pages_slowpath+0x2930/0x2930 [ 356.422920] ? lock_downgrade+0x740/0x740 [ 356.439327] radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 356.439344] __radix_tree_create+0x337/0x4d0 [ 356.439362] __radix_tree_insert+0xab/0x570 [ 356.439377] ? __radix_tree_create+0x4d0/0x4d0 [ 356.466885] shmem_add_to_page_cache+0x5a4/0x860 [ 356.466900] ? shmem_writepage+0xbb0/0xbb0 [ 356.466913] ? __radix_tree_preload+0x1d2/0x260 [ 356.466928] shmem_getpage_gfp+0x1757/0x25d0 [ 356.466946] ? shmem_add_to_page_cache+0x860/0x860 [ 356.472824] FAULT_INJECTION: forcing a failure. [ 356.472824] name failslab, interval 1, probability 0, space 0, times 0 [ 356.476981] ? iov_iter_fault_in_readable+0x1da/0x3c0 [ 356.476999] shmem_write_begin+0xfd/0x1b0 [ 356.477013] ? trace_hardirqs_on_caller+0x400/0x590 [ 356.477026] generic_perform_write+0x1f8/0x480 [ 356.477040] ? page_endio+0x530/0x530 [ 356.542650] ? current_time+0xb0/0xb0 [ 356.546445] ? generic_file_write_iter+0x9a/0x660 [ 356.551285] __generic_file_write_iter+0x239/0x5b0 [ 356.556209] generic_file_write_iter+0x303/0x660 [ 356.560974] __vfs_write+0x4a7/0x6b0 [ 356.564678] ? selinux_file_open+0x420/0x420 [ 356.569083] ? kernel_read+0x120/0x120 [ 356.572965] ? check_preemption_disabled+0x3c/0x250 [ 356.577981] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 356.583431] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 356.588181] ? __sb_start_write+0x153/0x2f0 [ 356.592518] vfs_write+0x198/0x500 [ 356.596058] SyS_pwrite64+0x115/0x140 [ 356.599852] ? SyS_pread64+0x140/0x140 [ 356.603754] ? do_syscall_64+0x53/0x640 [ 356.607729] ? SyS_pread64+0x140/0x140 [ 356.611608] do_syscall_64+0x1e8/0x640 [ 356.615501] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 356.620354] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 356.625536] RIP: 0033:0x413d47 [ 356.628716] RSP: 002b:00007fc4a2609a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 356.636425] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000413d47 [ 356.643686] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 0000000000000004 [ 356.650949] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 356.658212] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 356.665480] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 356.672783] CPU: 0 PID: 21407 Comm: syz-executor.4 Not tainted 4.14.151 #0 [ 356.679813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.689168] Call Trace: [ 356.691766] dump_stack+0x138/0x197 [ 356.695602] should_fail.cold+0x10f/0x159 [ 356.699762] should_failslab+0xdb/0x130 [ 356.703745] kmem_cache_alloc_trace+0x2e9/0x790 [ 356.708419] ? kernfs_put+0x35e/0x490 [ 356.712221] ? sysfs_add_file_mode_ns+0x1e4/0x450 [ 356.717067] ? devm_device_remove_groups+0x50/0x50 [ 356.722001] kobject_uevent_env+0x378/0xc23 [ 356.726324] ? internal_create_group+0x49a/0x7b0 [ 356.731091] kobject_uevent+0x20/0x26 [ 356.734896] lo_ioctl+0x11e7/0x1ce0 [ 356.738531] ? loop_probe+0x160/0x160 [ 356.742333] blkdev_ioctl+0x96b/0x1860 [ 356.746224] ? blkpg_ioctl+0x980/0x980 [ 356.750124] ? __might_sleep+0x93/0xb0 [ 356.754014] ? __fget+0x210/0x370 [ 356.757473] block_ioctl+0xde/0x120 [ 356.761107] ? blkdev_fallocate+0x3b0/0x3b0 [ 356.765431] do_vfs_ioctl+0x7ae/0x1060 [ 356.771184] ? selinux_file_mprotect+0x5d0/0x5d0 [ 356.775951] ? lock_downgrade+0x740/0x740 [ 356.780105] ? ioctl_preallocate+0x1c0/0x1c0 [ 356.784519] ? __fget+0x237/0x370 [ 356.787989] ? security_file_ioctl+0x89/0xb0 [ 356.792405] SyS_ioctl+0x8f/0xc0 [ 356.795772] ? do_vfs_ioctl+0x1060/0x1060 [ 356.799928] do_syscall_64+0x1e8/0x640 [ 356.803821] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 356.808710] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 356.813903] RIP: 0033:0x459db7 [ 356.817091] RSP: 002b:00007f295d48da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 356.824800] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 356.832073] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 356.839344] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 356.846617] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 356.853887] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) 17:19:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) 17:19:18 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:18 executing program 4 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:18 executing program 3 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 357.056025] FAULT_INJECTION: forcing a failure. [ 357.056025] name failslab, interval 1, probability 0, space 0, times 0 [ 357.065390] FAULT_INJECTION: forcing a failure. [ 357.065390] name failslab, interval 1, probability 0, space 0, times 0 [ 357.079606] CPU: 0 PID: 21431 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 357.086645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.086650] Call Trace: [ 357.086671] dump_stack+0x138/0x197 [ 357.086694] should_fail.cold+0x10f/0x159 [ 357.106385] should_failslab+0xdb/0x130 [ 357.110375] kmem_cache_alloc+0x2d7/0x780 [ 357.114526] ? vfs_write+0x25f/0x500 [ 357.118248] getname_flags+0xcb/0x580 [ 357.122055] ? check_preemption_disabled+0x3c/0x250 [ 357.127075] getname+0x1a/0x20 [ 357.130274] do_sys_open+0x1e7/0x430 [ 357.133996] ? filp_open+0x70/0x70 [ 357.137542] ? fput+0xd4/0x150 [ 357.140740] ? SyS_pwrite64+0xca/0x140 [ 357.144641] SyS_open+0x2d/0x40 [ 357.147921] ? do_sys_open+0x430/0x430 [ 357.151810] do_syscall_64+0x1e8/0x640 [ 357.155697] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 357.160552] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 357.165739] RIP: 0033:0x413ce1 [ 357.168928] RSP: 002b:00007fc4a2609a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 357.176636] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413ce1 [ 357.183905] RDX: 00007fc4a2609b0a RSI: 0000000000000002 RDI: 00007fc4a2609b00 [ 357.191172] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 357.198447] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 17:19:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) [ 357.205727] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 357.215910] CPU: 1 PID: 21429 Comm: syz-executor.4 Not tainted 4.14.151 #0 [ 357.222949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.232305] Call Trace: [ 357.234898] dump_stack+0x138/0x197 [ 357.238537] should_fail.cold+0x10f/0x159 [ 357.242694] should_failslab+0xdb/0x130 [ 357.246683] __kmalloc+0x2f0/0x7a0 [ 357.250225] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 357.255688] ? kobject_uevent_env+0x378/0xc23 [ 357.260186] ? rcu_read_lock_sched_held+0x110/0x130 [ 357.265203] ? kobject_get_path+0xbb/0x1a0 [ 357.269444] kobject_get_path+0xbb/0x1a0 [ 357.273509] ? devm_device_remove_groups+0x50/0x50 [ 357.278443] kobject_uevent_env+0x39c/0xc23 [ 357.282768] ? internal_create_group+0x49a/0x7b0 [ 357.287537] kobject_uevent+0x20/0x26 [ 357.291336] lo_ioctl+0x11e7/0x1ce0 [ 357.294973] ? loop_probe+0x160/0x160 [ 357.298772] blkdev_ioctl+0x96b/0x1860 [ 357.298783] ? blkpg_ioctl+0x980/0x980 [ 357.298801] ? __might_sleep+0x93/0xb0 [ 357.298812] ? __fget+0x210/0x370 [ 357.298825] block_ioctl+0xde/0x120 [ 357.306574] ? blkdev_fallocate+0x3b0/0x3b0 [ 357.306586] do_vfs_ioctl+0x7ae/0x1060 [ 357.306599] ? selinux_file_mprotect+0x5d0/0x5d0 [ 357.306610] ? lock_downgrade+0x740/0x740 [ 357.306621] ? ioctl_preallocate+0x1c0/0x1c0 [ 357.306632] ? __fget+0x237/0x370 [ 357.342520] ? security_file_ioctl+0x89/0xb0 [ 357.346936] SyS_ioctl+0x8f/0xc0 [ 357.350302] ? do_vfs_ioctl+0x1060/0x1060 17:19:18 executing program 3 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 357.354440] do_syscall_64+0x1e8/0x640 [ 357.358324] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 357.363173] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 357.368350] RIP: 0033:0x459db7 [ 357.371534] RSP: 002b:00007f295d48da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 357.379254] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 357.386530] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 357.393823] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 357.395299] FAULT_INJECTION: forcing a failure. [ 357.395299] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 357.401117] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 357.420187] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 357.427476] CPU: 0 PID: 21445 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 357.434499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.443874] Call Trace: [ 357.446452] dump_stack+0x138/0x197 [ 357.450082] should_fail.cold+0x10f/0x159 [ 357.454222] __alloc_pages_nodemask+0x1d6/0x7a0 [ 357.458879] ? fs_reclaim_acquire+0x20/0x20 [ 357.463196] ? __alloc_pages_slowpath+0x2930/0x2930 [ 357.468207] cache_grow_begin+0x80/0x400 [ 357.472256] kmem_cache_alloc+0x6a6/0x780 [ 357.476387] ? vfs_write+0x25f/0x500 [ 357.480098] getname_flags+0xcb/0x580 [ 357.483884] ? check_preemption_disabled+0x3c/0x250 [ 357.488894] getname+0x1a/0x20 [ 357.492071] do_sys_open+0x1e7/0x430 [ 357.495768] ? filp_open+0x70/0x70 [ 357.499286] ? fput+0xd4/0x150 [ 357.502462] ? SyS_pwrite64+0xca/0x140 [ 357.506336] SyS_open+0x2d/0x40 [ 357.509599] ? do_sys_open+0x430/0x430 [ 357.513475] do_syscall_64+0x1e8/0x640 [ 357.517349] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 357.522181] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 357.527373] RIP: 0033:0x413ce1 [ 357.530544] RSP: 002b:00007fc4a2609a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 357.538252] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413ce1 [ 357.545505] RDX: 00007fc4a2609b0a RSI: 0000000000000002 RDI: 00007fc4a2609b00 17:19:19 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb", 0x2) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 357.552758] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 357.560012] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 357.567281] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:19 executing program 4 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 357.745665] FAULT_INJECTION: forcing a failure. [ 357.745665] name failslab, interval 1, probability 0, space 0, times 0 [ 357.764082] CPU: 0 PID: 21459 Comm: syz-executor.4 Not tainted 4.14.151 #0 [ 357.771135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.780495] Call Trace: [ 357.783092] dump_stack+0x138/0x197 [ 357.786744] should_fail.cold+0x10f/0x159 [ 357.790903] should_failslab+0xdb/0x130 [ 357.794883] __kmalloc+0x2f0/0x7a0 [ 357.798434] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 357.803889] ? kobject_uevent_env+0x378/0xc23 [ 357.808386] ? rcu_read_lock_sched_held+0x110/0x130 [ 357.813407] ? kobject_get_path+0xbb/0x1a0 [ 357.813537] FAULT_INJECTION: forcing a failure. [ 357.813537] name failslab, interval 1, probability 0, space 0, times 0 [ 357.817640] kobject_get_path+0xbb/0x1a0 [ 357.817654] ? devm_device_remove_groups+0x50/0x50 [ 357.817667] kobject_uevent_env+0x39c/0xc23 [ 357.817679] ? internal_create_group+0x49a/0x7b0 [ 357.817701] kobject_uevent+0x20/0x26 [ 357.817716] lo_ioctl+0x11e7/0x1ce0 [ 357.854326] ? loop_probe+0x160/0x160 [ 357.858133] blkdev_ioctl+0x96b/0x1860 [ 357.862022] ? blkpg_ioctl+0x980/0x980 [ 357.865920] ? __might_sleep+0x93/0xb0 [ 357.869810] ? __fget+0x210/0x370 [ 357.873270] block_ioctl+0xde/0x120 [ 357.876902] ? blkdev_fallocate+0x3b0/0x3b0 [ 357.881224] do_vfs_ioctl+0x7ae/0x1060 [ 357.885134] ? selinux_file_mprotect+0x5d0/0x5d0 [ 357.889906] ? lock_downgrade+0x740/0x740 17:19:19 executing program 3 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 357.894058] ? ioctl_preallocate+0x1c0/0x1c0 [ 357.898472] ? __fget+0x237/0x370 [ 357.901930] ? security_file_ioctl+0x89/0xb0 [ 357.906777] SyS_ioctl+0x8f/0xc0 [ 357.910146] ? do_vfs_ioctl+0x1060/0x1060 [ 357.914299] do_syscall_64+0x1e8/0x640 [ 357.918187] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 357.923042] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 357.928238] RIP: 0033:0x459db7 [ 357.931425] RSP: 002b:00007f295d48da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 357.939154] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 357.946436] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 357.953706] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 357.960978] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 357.968257] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 357.976752] CPU: 1 PID: 21462 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 357.983964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.993324] Call Trace: [ 357.995920] dump_stack+0x138/0x197 [ 357.999574] should_fail.cold+0x10f/0x159 [ 358.003730] should_failslab+0xdb/0x130 [ 358.007719] kmem_cache_alloc+0x2d7/0x780 [ 358.011878] ? save_stack+0xa9/0xd0 [ 358.015514] get_empty_filp+0x8c/0x3f0 [ 358.019436] path_openat+0x8f/0x3f70 [ 358.023162] ? trace_hardirqs_on+0x10/0x10 [ 358.027437] ? check_preemption_disabled+0x3c/0x250 [ 358.032471] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 358.037164] ? find_held_lock+0x35/0x130 [ 358.041259] ? save_trace+0x290/0x290 [ 358.045094] ? __alloc_fd+0x1d4/0x4a0 [ 358.048919] do_filp_open+0x18e/0x250 [ 358.052728] ? may_open_dev+0xe0/0xe0 [ 358.056544] ? lock_downgrade+0x740/0x740 [ 358.060704] ? _raw_spin_unlock+0x2d/0x50 [ 358.064863] ? __alloc_fd+0x1d4/0x4a0 [ 358.068674] do_sys_open+0x2c5/0x430 [ 358.072398] ? filp_open+0x70/0x70 [ 358.075942] ? fput+0xd4/0x150 [ 358.079136] ? SyS_pwrite64+0xca/0x140 [ 358.083028] SyS_open+0x2d/0x40 [ 358.086303] ? do_sys_open+0x430/0x430 [ 358.090194] do_syscall_64+0x1e8/0x640 [ 358.094104] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 358.098954] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 358.104138] RIP: 0033:0x413ce1 [ 358.107323] RSP: 002b:00007fc4a2609a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 358.115030] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413ce1 [ 358.122302] RDX: 00007fc4a2609b0a RSI: 0000000000000002 RDI: 00007fc4a2609b00 [ 358.129593] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 358.136877] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 358.144151] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:19 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0x0, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:19 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:19 executing program 3 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:19 executing program 4 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 358.266913] FAULT_INJECTION: forcing a failure. [ 358.266913] name failslab, interval 1, probability 0, space 0, times 0 [ 358.281286] FAULT_INJECTION: forcing a failure. [ 358.281286] name failslab, interval 1, probability 0, space 0, times 0 [ 358.294829] FAULT_INJECTION: forcing a failure. [ 358.294829] name failslab, interval 1, probability 0, space 0, times 0 [ 358.304897] CPU: 1 PID: 21472 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 358.313042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 358.322396] Call Trace: [ 358.324991] dump_stack+0x138/0x197 [ 358.328625] should_fail.cold+0x10f/0x159 [ 358.332782] should_failslab+0xdb/0x130 [ 358.336756] kmem_cache_alloc+0x2d7/0x780 [ 358.340898] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 358.346430] ? check_preemption_disabled+0x3c/0x250 [ 358.351443] selinux_file_alloc_security+0xb4/0x190 [ 358.356466] security_file_alloc+0x6d/0xa0 [ 358.360697] get_empty_filp+0x162/0x3f0 [ 358.364666] path_openat+0x8f/0x3f70 [ 358.368378] ? trace_hardirqs_on+0x10/0x10 [ 358.372616] ? check_preemption_disabled+0x3c/0x250 [ 358.377646] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 358.382306] ? find_held_lock+0x35/0x130 [ 358.386361] ? save_trace+0x290/0x290 [ 358.390338] ? __alloc_fd+0x1d4/0x4a0 [ 358.394136] do_filp_open+0x18e/0x250 [ 358.397932] ? may_open_dev+0xe0/0xe0 [ 358.401731] ? lock_downgrade+0x740/0x740 [ 358.405879] ? _raw_spin_unlock+0x2d/0x50 [ 358.410017] ? __alloc_fd+0x1d4/0x4a0 [ 358.413824] do_sys_open+0x2c5/0x430 [ 358.417532] ? filp_open+0x70/0x70 [ 358.421063] ? fput+0xd4/0x150 [ 358.424248] ? SyS_pwrite64+0xca/0x140 [ 358.428131] SyS_open+0x2d/0x40 [ 358.431420] ? do_sys_open+0x430/0x430 [ 358.435316] do_syscall_64+0x1e8/0x640 [ 358.439197] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 358.444050] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 358.449232] RIP: 0033:0x413ce1 [ 358.452413] RSP: 002b:00007fc4a2609a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 358.460114] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413ce1 [ 358.467374] RDX: 00007fc4a2609b0a RSI: 0000000000000002 RDI: 00007fc4a2609b00 [ 358.474634] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 358.481986] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 358.489250] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 358.496534] CPU: 0 PID: 21474 Comm: syz-executor.4 Not tainted 4.14.151 #0 [ 358.503565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 358.512929] Call Trace: [ 358.515528] dump_stack+0x138/0x197 [ 358.519173] should_fail.cold+0x10f/0x159 [ 358.523356] should_failslab+0xdb/0x130 [ 358.527341] __kmalloc+0x2f0/0x7a0 [ 358.530889] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 358.536350] ? kobject_uevent_env+0x378/0xc23 [ 358.540854] ? rcu_read_lock_sched_held+0x110/0x130 [ 358.545878] ? kobject_get_path+0xbb/0x1a0 [ 358.550130] kobject_get_path+0xbb/0x1a0 [ 358.554201] ? devm_device_remove_groups+0x50/0x50 [ 358.559140] kobject_uevent_env+0x39c/0xc23 [ 358.563476] ? internal_create_group+0x49a/0x7b0 [ 358.568368] kobject_uevent+0x20/0x26 [ 358.572175] lo_ioctl+0x11e7/0x1ce0 [ 358.575816] ? loop_probe+0x160/0x160 [ 358.579625] blkdev_ioctl+0x96b/0x1860 [ 358.583530] ? blkpg_ioctl+0x980/0x980 [ 358.587432] ? __might_sleep+0x93/0xb0 [ 358.591327] ? __fget+0x210/0x370 [ 358.594788] block_ioctl+0xde/0x120 [ 358.598424] ? blkdev_fallocate+0x3b0/0x3b0 [ 358.602748] do_vfs_ioctl+0x7ae/0x1060 [ 358.606640] ? selinux_file_mprotect+0x5d0/0x5d0 [ 358.611401] ? lock_downgrade+0x740/0x740 [ 358.615556] ? ioctl_preallocate+0x1c0/0x1c0 [ 358.619974] ? __fget+0x237/0x370 [ 358.623443] ? security_file_ioctl+0x89/0xb0 [ 358.627864] SyS_ioctl+0x8f/0xc0 [ 358.631237] ? do_vfs_ioctl+0x1060/0x1060 [ 358.635395] do_syscall_64+0x1e8/0x640 [ 358.639305] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 358.644161] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 358.649362] RIP: 0033:0x459db7 [ 358.652545] RSP: 002b:00007f295d48da88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 358.660371] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 17:19:20 executing program 3 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 358.667665] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 358.674931] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 358.682201] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 358.689466] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 358.704386] CPU: 1 PID: 21473 Comm: syz-executor.0 Not tainted 4.14.151 #0 [ 358.711435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 358.720787] Call Trace: [ 358.723389] dump_stack+0x138/0x197 [ 358.727010] should_fail.cold+0x10f/0x159 [ 358.731168] should_failslab+0xdb/0x130 [ 358.735125] __kmalloc+0x2f0/0x7a0 [ 358.738658] ? __sb_end_write+0xc1/0x100 [ 358.742705] ? strnlen_user+0x12f/0x1a0 [ 358.746660] ? SyS_memfd_create+0xba/0x3a0 [ 358.750879] SyS_memfd_create+0xba/0x3a0 [ 358.754922] ? shmem_fcntl+0x130/0x130 [ 358.758881] ? do_syscall_64+0x53/0x640 [ 358.762851] ? shmem_fcntl+0x130/0x130 [ 358.766720] do_syscall_64+0x1e8/0x640 [ 358.770594] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 358.775443] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 358.780620] RIP: 0033:0x459f49 [ 358.783807] RSP: 002b:00007f5a0fb49a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 358.791503] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f49 [ 358.798766] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004beff7 [ 358.806025] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 17:19:20 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb", 0x2) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 358.813720] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5a0fb4a6d4 [ 358.820976] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 358.847062] FAULT_INJECTION: forcing a failure. [ 358.847062] name failslab, interval 1, probability 0, space 0, times 0 [ 358.874240] CPU: 1 PID: 21480 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 358.881306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 358.890761] Call Trace: [ 358.893370] dump_stack+0x138/0x197 [ 358.897019] should_fail.cold+0x10f/0x159 [ 358.901184] should_failslab+0xdb/0x130 [ 358.905174] kmem_cache_alloc_trace+0x2e9/0x790 [ 358.909854] ? __lockdep_init_map+0x10c/0x570 [ 358.914368] ? loop_get_status64+0x120/0x120 [ 358.918790] __kthread_create_on_node+0xe3/0x3e0 [ 358.923562] ? kthread_park+0x140/0x140 [ 358.927634] ? __fget+0x210/0x370 [ 358.931117] ? loop_get_status64+0x120/0x120 [ 358.935540] kthread_create_on_node+0xa8/0xd0 [ 358.940048] ? __kthread_create_on_node+0x3e0/0x3e0 [ 358.945088] ? __lockdep_init_map+0x10c/0x570 [ 358.949608] lo_ioctl+0xcf7/0x1ce0 [ 358.953165] ? debug_check_no_obj_freed+0x2aa/0x7b7 [ 358.958202] ? loop_probe+0x160/0x160 [ 358.962019] blkdev_ioctl+0x96b/0x1860 [ 358.965936] ? blkpg_ioctl+0x980/0x980 [ 358.969842] ? __might_sleep+0x93/0xb0 17:19:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x10, 0x0) r0 = getpid() r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x812c, 0x101082) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000140)={0x7, 0x0, 0x10000, 0x3629}) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000180)={0x6eb3cbd1, r4}) sched_setattr(r0, 0x0, 0x0) r5 = syz_open_procfs(r0, &(0x7f00000000c0)='pagemap\x00') ioctl$sock_inet_tcp_SIOCOUTQNSD(r5, 0x894b, &(0x7f0000000280)) lsetxattr$security_smack_transmute(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x2) ioctl$BLKROTATIONAL(r5, 0x127e, &(0x7f0000000100)) [ 358.973744] ? __fget+0x210/0x370 [ 358.977215] block_ioctl+0xde/0x120 [ 358.980852] ? blkdev_fallocate+0x3b0/0x3b0 [ 358.985193] do_vfs_ioctl+0x7ae/0x1060 [ 358.989099] ? selinux_file_mprotect+0x5d0/0x5d0 [ 358.993871] ? lock_downgrade+0x740/0x740 [ 358.998024] ? ioctl_preallocate+0x1c0/0x1c0 [ 358.998036] ? __fget+0x237/0x370 [ 358.998051] ? security_file_ioctl+0x89/0xb0 [ 359.005900] SyS_ioctl+0x8f/0xc0 [ 359.005911] ? do_vfs_ioctl+0x1060/0x1060 [ 359.005926] do_syscall_64+0x1e8/0x640 [ 359.021796] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 359.026713] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 359.031930] RIP: 0033:0x459db7 [ 359.035108] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 359.042828] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 359.050139] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 359.057410] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 359.064709] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 17:19:20 executing program 0 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 359.071978] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='b\xf4rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f00000013c0)=[{&(0x7f0000000140)="f4ad90b89cd9fb0d38772c16fb5a8d4492ed171105f0adfd4a24efe99fdb76e1b6759c80a4042c7134905e9b975d05a0d513dab7904afc35162c8336caf32a2bbfb36c4e35127e36fbd204168ee001ca20a38204ccb2059b39631110685c488cfd30f9614e65d1bbed3a13b8b03dd32842dd305aa61623af2e674036fb8bc2d6f44d7104c4463e3ad58e9f4ae542d81bdc450bc1436896d16503629ac1672267c7d8134a504db888f9331c8947726ad71d8f31e35e7b", 0xb6, 0x3}, {&(0x7f0000000200)="7fb350d59ac1832e13cdb1f160939acfbe3423d48c79cbfa577749e630fa4b51d90c68097f0278ee825b1311c868fceca5e9ce9afc37426029eadba06a4a30df", 0x40, 0xffffffffffffff71}, {&(0x7f0000000240)="a89581a35caeab294834cf5a973d24183543642b29e3a3d256731a4bc69b943adba225fd9c816d582375fd5de368a80b193ff077bdce1c118308c251911e21cca7e9870e53ddd2d68c46a83c504d73a83a84261dae0c400fcd6bed4261007a2d91b54effbb9a5f8ea80382f211c0ab7b9372e536a879a8138106d4367d6225ba7a66131288b4622ee48d54030d60f64e0b8f381675708eefea6f77ccec5c5effa862eaab207ccec3139b55926169a4de048343a39ab0b71a24c13d1cb48e829045403c3a5372ee01ab8a7d1fe55b6373", 0xd0, 0x7f}, {&(0x7f0000000340)="7cf1bedecedbb67e587af2e1cd9a5d97e90fea425b2c6757f1043f80f43c550951a5b1aa3e1a0403e4b021115b2da77ccc0b54311801d4b4a4022a125f6254b45095aea96467a919c9b6ad5e82f1e2537fb8ce43b0", 0x55, 0x2}, {&(0x7f00000003c0)="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", 0x1000, 0x1000}], 0x2000800, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000000080)={0x3, 0x2, [0x3, 0x101, 0x6, 0x1000, 0x5, 0x2, 0x7]}) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000040)=0xffffffe1, 0x4) 17:19:20 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0x0, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:20 executing program 3 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 359.156783] FAULT_INJECTION: forcing a failure. [ 359.156783] name failslab, interval 1, probability 0, space 0, times 0 [ 359.168186] CPU: 1 PID: 21499 Comm: syz-executor.0 Not tainted 4.14.151 #0 [ 359.175290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.184649] Call Trace: [ 359.187238] dump_stack+0x138/0x197 [ 359.190861] should_fail.cold+0x10f/0x159 [ 359.194999] should_failslab+0xdb/0x130 [ 359.198958] kmem_cache_alloc+0x2d7/0x780 [ 359.203087] ? __alloc_fd+0x1d4/0x4a0 [ 359.206872] __d_alloc+0x2d/0x9f0 [ 359.210310] ? lock_downgrade+0x740/0x740 [ 359.214440] d_alloc_pseudo+0x1e/0x30 [ 359.218225] __shmem_file_setup.part.0+0xd8/0x400 [ 359.223048] ? __alloc_fd+0x1d4/0x4a0 [ 359.226830] ? shmem_fill_super+0x8c0/0x8c0 [ 359.231137] SyS_memfd_create+0x1f9/0x3a0 [ 359.235367] ? shmem_fcntl+0x130/0x130 [ 359.239238] ? do_syscall_64+0x53/0x640 [ 359.243195] ? shmem_fcntl+0x130/0x130 [ 359.247064] do_syscall_64+0x1e8/0x640 [ 359.250932] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 359.255770] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 359.260949] RIP: 0033:0x459f49 [ 359.264118] RSP: 002b:00007f5a0fb49a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 359.271823] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f49 [ 359.279073] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004beff7 [ 359.286339] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 359.293594] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5a0fb4a6d4 [ 359.300847] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:20 executing program 0 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='bf\x18\xe0\xc0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r1) getgroups(0x6, &(0x7f0000000280)=[r1, 0xee01, 0xffffffffffffffff, 0xee00, 0xee00, 0x0]) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0xffffffffffffffff, r4) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000240)='9p\x00', 0x40000, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=unix,version=9p2000,access=user,version=9p2000,dfltgid=', @ANYRESHEX=r2, @ANYBLOB=',euid=', @ANYRESDEC=r4, @ANYBLOB=',subj_user=cpusetcgroupcpuset:ppp0proc}usernodovem1/%)@procwlJn0,uid>', @ANYRESDEC, @ANYBLOB="2c736d61636b66737472616e736d7574653d626618e0c0002c00"]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f00000000c0)='bf\x18\xe0\xc0\x00') [ 359.395882] FAULT_INJECTION: forcing a failure. [ 359.395882] name failslab, interval 1, probability 0, space 0, times 0 [ 359.407572] FAULT_INJECTION: forcing a failure. [ 359.407572] name failslab, interval 1, probability 0, space 0, times 0 [ 359.421215] CPU: 1 PID: 21513 Comm: syz-executor.0 Not tainted 4.14.151 #0 [ 359.428259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.437617] Call Trace: [ 359.440238] dump_stack+0x138/0x197 [ 359.443872] should_fail.cold+0x10f/0x159 [ 359.448018] should_failslab+0xdb/0x130 [ 359.451994] kmem_cache_alloc+0x2d7/0x780 [ 359.456140] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 359.461587] ? rcu_read_lock_sched_held+0x110/0x130 [ 359.466597] ? shmem_destroy_callback+0xa0/0xa0 [ 359.471257] shmem_alloc_inode+0x1c/0x50 [ 359.475332] alloc_inode+0x64/0x180 [ 359.478955] new_inode_pseudo+0x19/0xf0 [ 359.482921] new_inode+0x1f/0x40 [ 359.486285] shmem_get_inode+0x75/0x750 [ 359.490257] __shmem_file_setup.part.0+0x111/0x400 [ 359.495179] ? __alloc_fd+0x1d4/0x4a0 [ 359.498973] ? shmem_fill_super+0x8c0/0x8c0 [ 359.503295] SyS_memfd_create+0x1f9/0x3a0 [ 359.507442] ? shmem_fcntl+0x130/0x130 [ 359.511320] ? do_syscall_64+0x53/0x640 [ 359.515289] ? shmem_fcntl+0x130/0x130 [ 359.519179] do_syscall_64+0x1e8/0x640 [ 359.523060] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 359.527906] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 359.533090] RIP: 0033:0x459f49 [ 359.536272] RSP: 002b:00007f5a0fb49a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 359.543975] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f49 [ 359.551239] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004beff7 [ 359.558520] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 359.565782] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5a0fb4a6d4 [ 359.573060] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 359.580342] CPU: 0 PID: 21510 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 359.587378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.596727] Call Trace: [ 359.599309] dump_stack+0x138/0x197 [ 359.602926] should_fail.cold+0x10f/0x159 [ 359.607081] should_failslab+0xdb/0x130 [ 359.611040] kmem_cache_alloc+0x2d7/0x780 [ 359.615172] ? trace_hardirqs_on+0x10/0x10 [ 359.619404] ? save_trace+0x290/0x290 [ 359.623192] __kernfs_new_node+0x70/0x420 [ 359.627328] kernfs_new_node+0x80/0xf0 [ 359.631202] kernfs_create_dir_ns+0x41/0x140 [ 359.635621] internal_create_group+0xea/0x7b0 [ 359.640112] sysfs_create_group+0x20/0x30 [ 359.644251] lo_ioctl+0x1176/0x1ce0 [ 359.647868] ? loop_probe+0x160/0x160 [ 359.651658] blkdev_ioctl+0x96b/0x1860 [ 359.655531] ? blkpg_ioctl+0x980/0x980 [ 359.659410] ? __might_sleep+0x93/0xb0 [ 359.663297] ? __fget+0x210/0x370 [ 359.666736] block_ioctl+0xde/0x120 [ 359.670348] ? blkdev_fallocate+0x3b0/0x3b0 [ 359.674655] do_vfs_ioctl+0x7ae/0x1060 [ 359.678548] ? selinux_file_mprotect+0x5d0/0x5d0 [ 359.683313] ? lock_downgrade+0x740/0x740 [ 359.687445] ? ioctl_preallocate+0x1c0/0x1c0 [ 359.691838] ? __fget+0x237/0x370 [ 359.695294] ? security_file_ioctl+0x89/0xb0 [ 359.699689] SyS_ioctl+0x8f/0xc0 [ 359.703039] ? do_vfs_ioctl+0x1060/0x1060 [ 359.707173] do_syscall_64+0x1e8/0x640 [ 359.711041] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 359.715871] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 359.721042] RIP: 0033:0x459db7 [ 359.724215] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 359.731921] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 359.739174] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 17:19:21 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb", 0x2) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 359.746425] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 359.753676] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 359.760940] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:21 executing program 0 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x20000, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x5, 0x4) 17:19:21 executing program 3 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 359.899014] FAULT_INJECTION: forcing a failure. [ 359.899014] name failslab, interval 1, probability 0, space 0, times 0 [ 359.939745] CPU: 0 PID: 21530 Comm: syz-executor.0 Not tainted 4.14.151 #0 [ 359.946803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.946809] Call Trace: [ 359.946828] dump_stack+0x138/0x197 [ 359.946848] should_fail.cold+0x10f/0x159 [ 359.946865] should_failslab+0xdb/0x130 [ 359.946878] kmem_cache_alloc+0x2d7/0x780 [ 359.946887] ? shmem_alloc_inode+0x1c/0x50 [ 359.946899] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 359.978971] selinux_inode_alloc_security+0xb6/0x2a0 [ 359.978986] security_inode_alloc+0x94/0xd0 [ 359.978998] inode_init_always+0x552/0xaf0 [ 359.998106] alloc_inode+0x81/0x180 [ 359.998118] new_inode_pseudo+0x19/0xf0 [ 359.998129] new_inode+0x1f/0x40 [ 359.998140] shmem_get_inode+0x75/0x750 [ 359.998155] __shmem_file_setup.part.0+0x111/0x400 [ 359.998165] ? __alloc_fd+0x1d4/0x4a0 [ 359.998175] ? shmem_fill_super+0x8c0/0x8c0 [ 359.998192] SyS_memfd_create+0x1f9/0x3a0 [ 360.009134] ? shmem_fcntl+0x130/0x130 [ 360.009147] ? do_syscall_64+0x53/0x640 [ 360.009158] ? shmem_fcntl+0x130/0x130 [ 360.009171] do_syscall_64+0x1e8/0x640 [ 360.009180] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 360.009198] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 360.009224] RIP: 0033:0x459f49 [ 360.058776] FAULT_INJECTION: forcing a failure. [ 360.058776] name failslab, interval 1, probability 0, space 0, times 0 [ 360.059169] RSP: 002b:00007f5a0fb49a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 360.059181] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f49 [ 360.059187] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004beff7 [ 360.059194] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 360.059200] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5a0fb4a6d4 [ 360.059206] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 360.119120] CPU: 1 PID: 21543 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 360.126161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.135514] Call Trace: [ 360.138107] dump_stack+0x138/0x197 [ 360.141749] should_fail.cold+0x10f/0x159 [ 360.145906] should_failslab+0xdb/0x130 [ 360.149878] kmem_cache_alloc+0x2d7/0x780 [ 360.154011] ? __mutex_unlock_slowpath+0x71/0x800 [ 360.158835] ? __lock_is_held+0xb6/0x140 [ 360.162879] __kernfs_new_node+0x70/0x420 [ 360.167025] kernfs_new_node+0x80/0xf0 [ 360.170913] __kernfs_create_file+0x46/0x323 [ 360.175321] sysfs_add_file_mode_ns+0x1e4/0x450 [ 360.179975] internal_create_group+0x232/0x7b0 [ 360.184544] sysfs_create_group+0x20/0x30 [ 360.188672] lo_ioctl+0x1176/0x1ce0 [ 360.192281] ? loop_probe+0x160/0x160 [ 360.196062] blkdev_ioctl+0x96b/0x1860 [ 360.199942] ? blkpg_ioctl+0x980/0x980 [ 360.203905] ? __might_sleep+0x93/0xb0 [ 360.207772] ? __fget+0x210/0x370 [ 360.211207] block_ioctl+0xde/0x120 [ 360.214814] ? blkdev_fallocate+0x3b0/0x3b0 [ 360.219120] do_vfs_ioctl+0x7ae/0x1060 [ 360.223125] ? selinux_file_mprotect+0x5d0/0x5d0 [ 360.227880] ? lock_downgrade+0x740/0x740 [ 360.232010] ? ioctl_preallocate+0x1c0/0x1c0 [ 360.236398] ? __fget+0x237/0x370 [ 360.239847] ? security_file_ioctl+0x89/0xb0 [ 360.244239] SyS_ioctl+0x8f/0xc0 [ 360.247582] ? do_vfs_ioctl+0x1060/0x1060 [ 360.251711] do_syscall_64+0x1e8/0x640 [ 360.255576] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 360.260403] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 360.265574] RIP: 0033:0x459db7 [ 360.268745] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 360.276436] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 360.283697] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 17:19:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="8da4403ac0ed0200000000000001cd0cc74312571977000000007a000000fff6f2a2299748aeb81e1b00920efd9a000001000000005ed015fd00630d69020540417aaaa09af407281f3c01ffff81fff60000005f424852", 0x57, 0xffff}], 0x0, 0x0) 17:19:21 executing program 0 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 360.290967] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 360.298218] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 360.305498] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 360.324661] net_ratelimit: 24 callbacks suppressed [ 360.324666] protocol 88fb is buggy, dev hsr_slave_0 [ 360.334710] protocol 88fb is buggy, dev hsr_slave_1 [ 360.359206] FAULT_INJECTION: forcing a failure. [ 360.359206] name failslab, interval 1, probability 0, space 0, times 0 [ 360.380260] print_req_error: I/O error, dev loop4, sector 128 [ 360.399597] CPU: 0 PID: 21562 Comm: syz-executor.0 Not tainted 4.14.151 #0 [ 360.406647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.406653] Call Trace: [ 360.406669] dump_stack+0x138/0x197 [ 360.406690] should_fail.cold+0x10f/0x159 [ 360.406706] should_failslab+0xdb/0x130 [ 360.430379] kmem_cache_alloc+0x2d7/0x780 [ 360.434535] ? shmem_alloc_inode+0x1c/0x50 [ 360.434549] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 360.434564] selinux_inode_alloc_security+0xb6/0x2a0 [ 360.434576] security_inode_alloc+0x94/0xd0 [ 360.449344] inode_init_always+0x552/0xaf0 [ 360.449358] alloc_inode+0x81/0x180 [ 360.449369] new_inode_pseudo+0x19/0xf0 [ 360.449380] new_inode+0x1f/0x40 [ 360.449390] shmem_get_inode+0x75/0x750 [ 360.449405] __shmem_file_setup.part.0+0x111/0x400 [ 360.449412] ? __alloc_fd+0x1d4/0x4a0 [ 360.449422] ? shmem_fill_super+0x8c0/0x8c0 [ 360.457978] SyS_memfd_create+0x1f9/0x3a0 [ 360.457990] ? shmem_fcntl+0x130/0x130 [ 360.458001] ? do_syscall_64+0x53/0x640 [ 360.458012] ? shmem_fcntl+0x130/0x130 [ 360.458024] do_syscall_64+0x1e8/0x640 17:19:22 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0x0, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:22 executing program 0 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 360.458034] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 360.458050] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 360.501956] RIP: 0033:0x459f49 [ 360.510661] RSP: 002b:00007f5a0fb49a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 360.510673] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f49 [ 360.510679] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004beff7 [ 360.510686] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 360.510692] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5a0fb4a6d4 [ 360.510698] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000280)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x233, 0x10000}], 0x840000, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000240)={'ip_vti0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="37000000000000001f0000000000000047c68f6914210660f3fe5c2f7d813f6519189e8b48ed92272bdb916b1a4bc4"]}) accept4$unix(r1, &(0x7f0000000080), &(0x7f00000001c0)=0x6e, 0x0) 17:19:22 executing program 3 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:22 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96", 0x3) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$VIDIOC_RESERVED(r0, 0x5601, 0x0) setxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000400)=@known='com.apple.FinderInfo\x00', &(0x7f00000003c0)='bt\xa7fs\x00', 0x6, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x19, 0x0, &(0x7f0000000040)) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f0000000200)={0x3, {{0x2, 0x4e24, @local}}, {{0x2, 0x4e22, @multicast1}}}, 0x108) getsockopt$inet_tcp_int(r0, 0x6, 0x11, &(0x7f0000000100), &(0x7f00000001c0)=0xfffffe5a) [ 360.667485] FAULT_INJECTION: forcing a failure. [ 360.667485] name failslab, interval 1, probability 0, space 0, times 0 [ 360.686337] FAULT_INJECTION: forcing a failure. [ 360.686337] name failslab, interval 1, probability 0, space 0, times 0 [ 360.698442] CPU: 1 PID: 21577 Comm: syz-executor.0 Not tainted 4.14.151 #0 [ 360.705497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.705503] Call Trace: [ 360.705521] dump_stack+0x138/0x197 [ 360.705540] should_fail.cold+0x10f/0x159 [ 360.705556] should_failslab+0xdb/0x130 [ 360.705571] kmem_cache_alloc+0x2d7/0x780 [ 360.717515] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 360.717529] ? check_preemption_disabled+0x3c/0x250 [ 360.738995] selinux_file_alloc_security+0xb4/0x190 [ 360.739010] security_file_alloc+0x6d/0xa0 [ 360.739023] get_empty_filp+0x162/0x3f0 [ 360.739034] alloc_file+0x23/0x440 [ 360.760762] __shmem_file_setup.part.0+0x1b1/0x400 [ 360.765709] ? __alloc_fd+0x1d4/0x4a0 [ 360.769525] ? shmem_fill_super+0x8c0/0x8c0 [ 360.773864] SyS_memfd_create+0x1f9/0x3a0 [ 360.778023] ? shmem_fcntl+0x130/0x130 [ 360.781917] ? do_syscall_64+0x53/0x640 [ 360.785900] ? shmem_fcntl+0x130/0x130 [ 360.789801] do_syscall_64+0x1e8/0x640 [ 360.793683] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 360.798644] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 360.803838] RIP: 0033:0x459f49 [ 360.807022] RSP: 002b:00007f5a0fb49a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 360.814728] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459f49 [ 360.821994] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004beff7 [ 360.829430] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 360.836692] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5a0fb4a6d4 [ 360.843957] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 360.851249] CPU: 0 PID: 21580 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 360.858283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.867643] Call Trace: [ 360.870256] dump_stack+0x138/0x197 [ 360.873903] should_fail.cold+0x10f/0x159 [ 360.878075] should_failslab+0xdb/0x130 [ 360.882064] kmem_cache_alloc+0x2d7/0x780 [ 360.886237] ? __mutex_unlock_slowpath+0x71/0x800 [ 360.891093] ? __lock_is_held+0xb6/0x140 [ 360.895163] ? bochs_ttm_io_mem_reserve+0x210/0x280 [ 360.900193] __kernfs_new_node+0x70/0x420 [ 360.904350] kernfs_new_node+0x80/0xf0 [ 360.908268] __kernfs_create_file+0x46/0x323 [ 360.908280] sysfs_add_file_mode_ns+0x1e4/0x450 [ 360.908293] internal_create_group+0x232/0x7b0 [ 360.917362] sysfs_create_group+0x20/0x30 [ 360.917375] lo_ioctl+0x1176/0x1ce0 [ 360.930407] ? loop_probe+0x160/0x160 [ 360.934213] blkdev_ioctl+0x96b/0x1860 [ 360.938091] ? blkpg_ioctl+0x980/0x980 [ 360.941976] ? __might_sleep+0x93/0xb0 [ 360.945875] ? __fget+0x210/0x370 [ 360.949320] block_ioctl+0xde/0x120 [ 360.952933] ? blkdev_fallocate+0x3b0/0x3b0 [ 360.957244] do_vfs_ioctl+0x7ae/0x1060 [ 360.961119] ? selinux_file_mprotect+0x5d0/0x5d0 [ 360.965876] ? lock_downgrade+0x740/0x740 [ 360.970012] ? ioctl_preallocate+0x1c0/0x1c0 [ 360.974414] ? __fget+0x237/0x370 [ 360.977858] ? security_file_ioctl+0x89/0xb0 [ 360.982262] SyS_ioctl+0x8f/0xc0 [ 360.985614] ? do_vfs_ioctl+0x1060/0x1060 [ 360.989753] do_syscall_64+0x1e8/0x640 [ 360.993624] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 360.998462] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 361.003636] RIP: 0033:0x459db7 [ 361.006807] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 17:19:22 executing program 0 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 361.014499] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 361.021761] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 361.029015] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 361.036288] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 361.043541] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 361.082905] FAULT_INJECTION: forcing a failure. [ 361.082905] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 361.102933] CPU: 1 PID: 21602 Comm: syz-executor.0 Not tainted 4.14.151 #0 [ 361.110003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.119363] Call Trace: [ 361.121975] dump_stack+0x138/0x197 [ 361.125611] should_fail.cold+0x10f/0x159 [ 361.129766] ? __might_sleep+0x93/0xb0 [ 361.133658] __alloc_pages_nodemask+0x1d6/0x7a0 [ 361.138316] ? __alloc_pages_slowpath+0x2930/0x2930 [ 361.143328] ? lock_downgrade+0x740/0x740 [ 361.147483] alloc_pages_vma+0xc9/0x4c0 [ 361.151454] shmem_alloc_page+0xf6/0x1a0 [ 361.155514] ? shmem_swapin+0x1a0/0x1a0 [ 361.159518] ? cred_has_capability+0x142/0x290 [ 361.164103] ? check_preemption_disabled+0x3c/0x250 [ 361.169112] ? __this_cpu_preempt_check+0x1d/0x30 [ 361.174001] ? percpu_counter_add_batch+0x112/0x160 [ 361.179008] ? __vm_enough_memory+0x26a/0x490 [ 361.183493] shmem_alloc_and_acct_page+0x12a/0x680 [ 361.188412] shmem_getpage_gfp+0x3e7/0x25d0 [ 361.192738] ? shmem_add_to_page_cache+0x860/0x860 [ 361.197658] ? iov_iter_fault_in_readable+0x1da/0x3c0 [ 361.202850] shmem_write_begin+0xfd/0x1b0 [ 361.206986] ? trace_hardirqs_on_caller+0x400/0x590 [ 361.212005] generic_perform_write+0x1f8/0x480 [ 361.216592] ? page_endio+0x530/0x530 [ 361.220385] ? current_time+0xb0/0xb0 [ 361.224215] ? generic_file_write_iter+0x9a/0x660 [ 361.229042] __generic_file_write_iter+0x239/0x5b0 [ 361.233957] generic_file_write_iter+0x303/0x660 [ 361.238712] __vfs_write+0x4a7/0x6b0 [ 361.242419] ? selinux_file_open+0x420/0x420 [ 361.246814] ? kernel_read+0x120/0x120 [ 361.250687] ? check_preemption_disabled+0x3c/0x250 [ 361.255699] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 361.261155] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 361.265905] ? __sb_start_write+0x153/0x2f0 [ 361.270214] vfs_write+0x198/0x500 [ 361.273806] SyS_pwrite64+0x115/0x140 [ 361.277601] ? SyS_pread64+0x140/0x140 [ 361.281482] ? do_syscall_64+0x53/0x640 [ 361.285450] ? SyS_pread64+0x140/0x140 [ 361.289431] do_syscall_64+0x1e8/0x640 [ 361.293323] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 361.298168] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 361.303389] RIP: 0033:0x413d47 [ 361.306563] RSP: 002b:00007f5a0fb49a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 361.314260] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000413d47 [ 361.321530] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 0000000000000004 [ 361.328837] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 361.336098] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 361.343410] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 361.350926] protocol 88fb is buggy, dev hsr_slave_0 [ 361.356027] protocol 88fb is buggy, dev hsr_slave_1 [ 361.360172] protocol 88fb is buggy, dev hsr_slave_0 [ 361.361185] protocol 88fb is buggy, dev hsr_slave_0 [ 361.366164] protocol 88fb is buggy, dev hsr_slave_1 [ 361.371189] protocol 88fb is buggy, dev hsr_slave_1 17:19:22 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, 0x0, 0x0) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:22 executing program 4: write$P9_RREADDIR(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="870000202901000500000000080000000800000000000000020000000007002e2f66696c65304a02000000080000000507002e2f66696c65302102000000040000000001040000010000000000003f07002e2f66696c65300c0400000004000000000000001f000000000000000407002e2f66696c6530000000000000000000000000000000003727eb4ade5f754647b00a0b818c163f59bc7f08176439bd91ff77ef995c765902a88921ae802c5fe3ec42bc0754573d3e0566aa3dd872f1413b1304d3be65e9bb3a66333dce979ba53cfb696e817bf1f62befb04efb6b8f445ce0ba4b29ee4a392f21"], 0x87) r0 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x4, 0x200000) getsockopt$packet_int(r0, 0x107, 0xe, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x440401, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$nbd(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="6744669801000000010004000400000041a315f007234fa06ff4774b2eb732c1cb5bba1f38dbb8b9ea64d68fbba16a102cdd3803f09151fc751f1813104dfba21b0e102f88ba73c93e65e3cd463d4d25867bb73e881dfe62530b933098a12295407525dc7d6d017a968da908326761827eb43e0dbab60da25717e50814d2ec23df7305c129d2f6c5e4f28f67f22395cb4df0eadfab47e4eb9926dedfe804f4a352614e60f0fa307c904a82954070d1d3b9b90a4585d000a5610b5e790c7cbee1d65f2b7cc4b27d1456087667891d07081928d71f75fe63e71b0a03f8e95d6ee17f0cf5d72ee335cd3a89"], 0xe5) write$P9_RVERSION(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="1300000065ffff0800000006003950325d3030"], 0x13) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') open$dir(&(0x7f0000000080)='./file0\x00', 0x501000, 0x80) [ 361.376218] protocol 88fb is buggy, dev hsr_slave_0 [ 361.386205] protocol 88fb is buggy, dev hsr_slave_1 17:19:22 executing program 0 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:23 executing program 3 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2d1, 0xaaaaaaaaaaaad5e, &(0x7f0000000100), 0x13, 0x0) [ 361.538412] FAULT_INJECTION: forcing a failure. [ 361.538412] name failslab, interval 1, probability 0, space 0, times 0 [ 361.549781] CPU: 0 PID: 21623 Comm: syz-executor.0 Not tainted 4.14.151 #0 [ 361.555253] FAULT_INJECTION: forcing a failure. [ 361.555253] name failslab, interval 1, probability 0, space 0, times 0 [ 361.556801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.556806] Call Trace: [ 361.556823] dump_stack+0x138/0x197 [ 361.556844] should_fail.cold+0x10f/0x159 [ 361.587739] should_failslab+0xdb/0x130 [ 361.591735] kmem_cache_alloc+0x47/0x780 [ 361.595827] ? __alloc_pages_slowpath+0x2930/0x2930 [ 361.600855] ? lock_downgrade+0x740/0x740 [ 361.605018] radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 361.610741] __radix_tree_create+0x337/0x4d0 [ 361.615156] __radix_tree_insert+0xab/0x570 [ 361.619475] ? __radix_tree_create+0x4d0/0x4d0 [ 361.624084] shmem_add_to_page_cache+0x5a4/0x860 [ 361.628841] ? shmem_writepage+0xbb0/0xbb0 [ 361.633089] ? __radix_tree_preload+0x1d2/0x260 [ 361.637766] shmem_getpage_gfp+0x1757/0x25d0 [ 361.642187] ? shmem_add_to_page_cache+0x860/0x860 [ 361.647123] ? iov_iter_fault_in_readable+0x1da/0x3c0 [ 361.652342] shmem_write_begin+0xfd/0x1b0 [ 361.656497] ? trace_hardirqs_on_caller+0x400/0x590 [ 361.661512] generic_perform_write+0x1f8/0x480 [ 361.666111] ? page_endio+0x530/0x530 [ 361.669914] ? current_time+0xb0/0xb0 [ 361.673726] ? generic_file_write_iter+0x9a/0x660 [ 361.678571] __generic_file_write_iter+0x239/0x5b0 [ 361.683506] generic_file_write_iter+0x303/0x660 [ 361.688276] __vfs_write+0x4a7/0x6b0 [ 361.691988] ? selinux_file_open+0x420/0x420 [ 361.696406] ? kernel_read+0x120/0x120 [ 361.700298] ? check_preemption_disabled+0x3c/0x250 [ 361.705314] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 361.710762] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 361.715603] ? __sb_start_write+0x153/0x2f0 [ 361.719940] vfs_write+0x198/0x500 [ 361.723518] SyS_pwrite64+0x115/0x140 [ 361.727333] ? SyS_pread64+0x140/0x140 [ 361.731218] ? do_syscall_64+0x53/0x640 [ 361.735188] ? SyS_pread64+0x140/0x140 [ 361.739079] do_syscall_64+0x1e8/0x640 [ 361.739090] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 361.739107] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 361.739116] RIP: 0033:0x413d47 [ 361.756194] RSP: 002b:00007f5a0fb49a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 361.763904] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 0000000000413d47 [ 361.771175] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 0000000000000004 [ 361.778440] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 17:19:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f5d", 0x48, 0x10000}], 0x0, 0x0) syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x1, 0x2) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) [ 361.785725] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 361.793000] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 361.802241] CPU: 1 PID: 21624 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 361.809281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.818658] Call Trace: [ 361.818676] dump_stack+0x138/0x197 [ 361.818692] should_fail.cold+0x10f/0x159 [ 361.818706] should_failslab+0xdb/0x130 [ 361.829294] kmem_cache_alloc+0x2d7/0x780 [ 361.829309] ? wait_for_completion+0x420/0x420 [ 361.829328] __kernfs_new_node+0x70/0x420 [ 361.829342] kernfs_new_node+0x80/0xf0 [ 361.850089] __kernfs_create_file+0x46/0x323 [ 361.854515] sysfs_add_file_mode_ns+0x1e4/0x450 [ 361.859180] internal_create_group+0x232/0x7b0 [ 361.863749] sysfs_create_group+0x20/0x30 [ 361.867887] lo_ioctl+0x1176/0x1ce0 [ 361.867903] ? loop_probe+0x160/0x160 [ 361.867915] blkdev_ioctl+0x96b/0x1860 [ 361.867925] ? blkpg_ioctl+0x980/0x980 [ 361.867942] ? __might_sleep+0x93/0xb0 [ 361.875342] ? __fget+0x210/0x370 [ 361.875357] block_ioctl+0xde/0x120 [ 361.875368] ? blkdev_fallocate+0x3b0/0x3b0 [ 361.875379] do_vfs_ioctl+0x7ae/0x1060 [ 361.875391] ? selinux_file_mprotect+0x5d0/0x5d0 [ 361.875404] ? lock_downgrade+0x740/0x740 [ 361.911136] ? ioctl_preallocate+0x1c0/0x1c0 [ 361.915548] ? __fget+0x237/0x370 [ 361.918990] ? security_file_ioctl+0x89/0xb0 [ 361.923386] SyS_ioctl+0x8f/0xc0 [ 361.926740] ? do_vfs_ioctl+0x1060/0x1060 [ 361.930883] do_syscall_64+0x1e8/0x640 [ 361.934758] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 361.939591] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 361.944792] RIP: 0033:0x459db7 [ 361.947971] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 361.955679] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 361.962936] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 361.970192] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 361.977451] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 361.984707] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:23 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96", 0x3) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:23 executing program 0 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:23 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='bt\x02\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x8, &(0x7f0000000640)=[{&(0x7f00000000c0)="d7d83ae0e63ff5c43620aeb6f2af14154268832bb42d6eb8b2785ac8a5dd362695afb8051c19205375755aa09da3c76ede48e6fb505810772df71e681e3d7010cf0531aed15193c5de112b709d8165814dc6940a1ff2f8784ad6f9c17ed87b8e95511ee69ee18deeeb87f27de3c536d782fa987fc4c55dc094f7aa06ab513e4728b2a13f120d8ed77bc58e32438b5f3e0f359779ce885e99127b362b3092752a9a0dfcee0058037defb4008701192ced995862c3042c7e754f41210b56c1f1af5037", 0xc2, 0x2}, {&(0x7f0000000700)="5633499454a0b9d4649eea2663ca6c7b15230c161d2442edfb141396c36edba4190e252229692b6eb24fcceb7be7c1d0edeba546e9995dcf94e72fc17c7960b4266a63078ee95416fb2dd1226e9971f5f878b5e06c256c691522a29a4f781baef5e42409a36f8eb742bd11e67a00a692b4f3a057c17f0cd709320a1c8f70b71220fbc7b4b3709ae916be30fb86abdcddd3224fdaad1c30ea4d9e756259882955c39a4328cb1685798aea7a0a82b47fabe4f288ab1ac55a8f1cde74998de5c7b8a2bc2ff0391567316cc36b122afa318fea3eb5d42db4d28276fde7a6025df905", 0xe0, 0x40000000006}, {&(0x7f0000000280)="5169788642880c100d6a27efa6247cbb7200c4dcd2e787ca7ba85850c8d82df6b22da4dee60a7ad9edcd392a03435e4d80af891cb559d9bee833713a619e9c08f7a218e5b908338cae536998c70363a44913af8f207acf540f8c7f22ee0cf1aca091e329f1f73f311560d345df86872d671bc314d831ebd6397074a54503b4696669a627bd012e8efb7d394b5488a78b7eadd7591a4b3e9c0b19ec49bbf894346a0cd7e4b7019bacef2df3edf8b6548a94d0bef808bae6b293e96caf50882e4ed04e9dd31c63a63fe3e244caa62f29839bedf6b414697859a5ce83", 0xdb, 0x8}, {&(0x7f0000000380)="2d84894a2f5ebbbd4010be1cdfd6e2108a8c8baa7b163e808927e3735a9efc750276466a84a847f758c52829e3e1b987900e36fa8d28292ebe9c6401c5195f396ea325b8e3d7238c208647e7404b34233e73e318b84b2b8193183b2fb4fbcfe630d7e24a64f8b0e0abbc115b601ae07330ad36d8eed16d3b425420b981466a80eb3289b8fa941a6d4c141999129cfdded80bdc9336513ea4384f0b6eb8cbb9c75ad24a70abba5f980986217b2fe4fbdc934134baef2ee6fefb28005510a9a5aa9b70b27c0f43c9898e3b8add03ebf55bbb27", 0xd2, 0x8}, {&(0x7f0000000480)="90432bffe8df358a935da6a40c155d56e7c57394456cfc908bcf", 0x1a, 0xf9d6}, {&(0x7f0000000800)="ade1186567dac463d48d8f53771857f4be7830fd18707af0db346e9d70724249a7057e23fe81a3f3cb1fecae934d887d4097c57a91f45f68cc519bc753df6ba0f29f0291b5c9ae81c981ef3e", 0x4c, 0x6}, {&(0x7f0000000540)="3b7b7d2216e13f1c903d59083c13e9d6ae0d131743111b4458bce67c15e703c4172fd664ec99c39079d84d37b28459fa723542e8fc3c942ae9799c75f3462e5cbd191083763c73be15ec4790c5caa1bdbf15566c241f78ce3c936abc397a43e3102b232e93edd1d36b25bd83278613c14d49", 0x72, 0x800}, {&(0x7f00000005c0)="f959bc543abbeb81d01fd049ab7d477b89a47dd985ad1f5bcda0b1685dfa16cb596604a24963c5487ddd7d89029bea79dcfbae12244e8cfdbe71ba3b9d13718a40d3f9843b32b0a677cf7dc0d64b4b0c4cc100955de7ffb31d6a1ecf216653c4fdd719", 0x63, 0x81}], 0x200884, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) [ 362.064032] print_req_error: I/O error, dev loop4, sector 128 17:19:23 executing program 3 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:23 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000400)=0x8, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000000000)={0x1, @bcast, @rose={'rose', 0x0}, 0xd8, 'syz1\x00', @default, 0xcb0, 0xfffffffe, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0xfffffefd, 0x51d9a5d8}], 0x80806, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @rand_addr="ffaf8a03e6d4076f84c596a67c1040d4"}, {0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xfc}}, r2}}, 0x48) r3 = socket$inet6(0xa, 0x2, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x4) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r5, 0x0, 0x19, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'\x00', &(0x7f00000003c0)=@ethtool_sset_info={0x37, 0xfffffffd, 0x1f, [0xff, 0xc41, 0x8, 0x1, 0x7f, 0x8, 0x20000, 0x2]}}) r6 = openat$cgroup_ro(r4, &(0x7f00000002c0)='memory.events\x00\x98)~~]\x84\xfd\xb3 \\\xf7\xe7 S5\xb1M\x80\x00\xd0d\x04\xb8\x989\x98f\xbc\x9c\xb6\xba0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$RTC_EPOCH_SET(r8, 0x4008700e, 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}}}, 0x69) r10 = socket$inet6(0xa, 0x2, 0x0) r11 = dup(r10) ioctl$sock_SIOCETHTOOL(r11, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) ioctl$sock_inet_tcp_SIOCATMARK(r11, 0x8905, &(0x7f0000000380)) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000180), r9}}, 0x18) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000280)={0xa, 0x194, 0xfa00, {r9}}, 0xfffffce8) [ 362.142402] FAULT_INJECTION: forcing a failure. [ 362.142402] name failslab, interval 1, probability 0, space 0, times 0 [ 362.155957] CPU: 0 PID: 21649 Comm: syz-executor.0 Not tainted 4.14.151 #0 [ 362.163005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.172368] Call Trace: [ 362.174957] dump_stack+0x138/0x197 [ 362.178584] should_fail.cold+0x10f/0x159 [ 362.182744] should_failslab+0xdb/0x130 [ 362.187783] kmem_cache_alloc+0x2d7/0x780 [ 362.191972] ? vfs_write+0x25f/0x500 [ 362.195698] getname_flags+0xcb/0x580 [ 362.199518] ? check_preemption_disabled+0x3c/0x250 [ 362.204556] getname+0x1a/0x20 [ 362.207099] FAULT_INJECTION: forcing a failure. [ 362.207099] name failslab, interval 1, probability 0, space 0, times 0 [ 362.207784] do_sys_open+0x1e7/0x430 [ 362.207798] ? filp_open+0x70/0x70 [ 362.207807] ? fput+0xd4/0x150 [ 362.207822] ? SyS_pwrite64+0xca/0x140 [ 362.233299] SyS_open+0x2d/0x40 [ 362.236574] ? do_sys_open+0x430/0x430 [ 362.240460] do_syscall_64+0x1e8/0x640 [ 362.244366] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 362.244384] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 362.254395] RIP: 0033:0x413ce1 [ 362.254400] RSP: 002b:00007f5a0fb49a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 362.254409] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413ce1 [ 362.254413] RDX: 00007f5a0fb49b0a RSI: 0000000000000002 RDI: 00007f5a0fb49b00 [ 362.254418] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 362.254423] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 362.254428] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 362.302887] CPU: 1 PID: 21657 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 362.309927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.319376] Call Trace: [ 362.321976] dump_stack+0x138/0x197 [ 362.325622] should_fail.cold+0x10f/0x159 [ 362.329786] should_failslab+0xdb/0x130 [ 362.333778] kmem_cache_alloc+0x2d7/0x780 [ 362.337937] ? wait_for_completion+0x420/0x420 [ 362.342540] __kernfs_new_node+0x70/0x420 [ 362.346711] kernfs_new_node+0x80/0xf0 [ 362.350623] __kernfs_create_file+0x46/0x323 [ 362.355028] sysfs_add_file_mode_ns+0x1e4/0x450 [ 362.359682] internal_create_group+0x232/0x7b0 [ 362.364252] sysfs_create_group+0x20/0x30 [ 362.368397] lo_ioctl+0x1176/0x1ce0 [ 362.372010] ? loop_probe+0x160/0x160 [ 362.375799] blkdev_ioctl+0x96b/0x1860 [ 362.379672] ? blkpg_ioctl+0x980/0x980 [ 362.383547] ? __might_sleep+0x93/0xb0 [ 362.387418] ? __fget+0x210/0x370 [ 362.390872] block_ioctl+0xde/0x120 [ 362.394481] ? blkdev_fallocate+0x3b0/0x3b0 [ 362.398788] do_vfs_ioctl+0x7ae/0x1060 [ 362.402680] ? selinux_file_mprotect+0x5d0/0x5d0 [ 362.407462] ? lock_downgrade+0x740/0x740 [ 362.411606] ? ioctl_preallocate+0x1c0/0x1c0 [ 362.416003] ? __fget+0x237/0x370 [ 362.419458] ? security_file_ioctl+0x89/0xb0 [ 362.423854] SyS_ioctl+0x8f/0xc0 [ 362.427207] ? do_vfs_ioctl+0x1060/0x1060 [ 362.431343] do_syscall_64+0x1e8/0x640 [ 362.435216] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 362.440052] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 362.445240] RIP: 0033:0x459db7 [ 362.448416] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 362.456129] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 362.463387] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 362.470644] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 362.477917] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 362.485171] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:24 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, 0x0, 0x0) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:24 executing program 2: membarrier(0x10, 0x0) membarrier(0x100000008, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000300)={'bcsh0\x00', {0x2, 0x4e23, @local}}) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f0000000340)=""/8) mount$overlay(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x684a60409779c641, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]) 17:19:24 executing program 3 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:24 executing program 0 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 362.676663] FAULT_INJECTION: forcing a failure. [ 362.676663] name failslab, interval 1, probability 0, space 0, times 0 [ 362.701479] FAULT_INJECTION: forcing a failure. [ 362.701479] name failslab, interval 1, probability 0, space 0, times 0 [ 362.725635] CPU: 0 PID: 21682 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 362.732689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.742043] Call Trace: [ 362.744633] dump_stack+0x138/0x197 [ 362.748261] should_fail.cold+0x10f/0x159 [ 362.752411] should_failslab+0xdb/0x130 [ 362.756383] kmem_cache_alloc+0x2d7/0x780 [ 362.760531] ? wait_for_completion+0x420/0x420 [ 362.765116] __kernfs_new_node+0x70/0x420 [ 362.769262] kernfs_new_node+0x80/0xf0 [ 362.773154] __kernfs_create_file+0x46/0x323 [ 362.777572] sysfs_add_file_mode_ns+0x1e4/0x450 [ 362.782264] internal_create_group+0x232/0x7b0 [ 362.786870] sysfs_create_group+0x20/0x30 [ 362.791016] lo_ioctl+0x1176/0x1ce0 [ 362.794643] ? loop_probe+0x160/0x160 [ 362.798442] blkdev_ioctl+0x96b/0x1860 [ 362.802341] ? blkpg_ioctl+0x980/0x980 [ 362.806227] ? __might_sleep+0x93/0xb0 [ 362.810107] ? __fget+0x210/0x370 [ 362.813565] block_ioctl+0xde/0x120 [ 362.817183] ? blkdev_fallocate+0x3b0/0x3b0 [ 362.821495] do_vfs_ioctl+0x7ae/0x1060 [ 362.825378] ? selinux_file_mprotect+0x5d0/0x5d0 [ 362.830146] ? lock_downgrade+0x740/0x740 [ 362.834289] ? ioctl_preallocate+0x1c0/0x1c0 [ 362.838688] ? __fget+0x237/0x370 [ 362.842155] ? security_file_ioctl+0x89/0xb0 [ 362.846586] SyS_ioctl+0x8f/0xc0 [ 362.849966] ? do_vfs_ioctl+0x1060/0x1060 [ 362.854119] do_syscall_64+0x1e8/0x640 [ 362.857997] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 362.862839] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 362.868018] RIP: 0033:0x459db7 [ 362.871196] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 362.878894] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 362.886152] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 362.893429] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 362.900696] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 362.907971] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 362.915275] CPU: 1 PID: 21692 Comm: syz-executor.0 Not tainted 4.14.151 #0 [ 362.922308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.931671] Call Trace: [ 362.934273] dump_stack+0x138/0x197 [ 362.937913] should_fail.cold+0x10f/0x159 [ 362.937932] should_failslab+0xdb/0x130 [ 362.937946] kmem_cache_alloc+0x2d7/0x780 [ 362.937958] ? save_stack+0xa9/0xd0 [ 362.937975] get_empty_filp+0x8c/0x3f0 [ 362.946086] path_openat+0x8f/0x3f70 [ 362.946101] ? generic_perform_write+0x34f/0x480 [ 362.946123] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 362.946136] ? save_trace+0x290/0x290 [ 362.946150] ? __alloc_fd+0x1d4/0x4a0 [ 362.946164] do_filp_open+0x18e/0x250 [ 362.982229] ? may_open_dev+0xe0/0xe0 [ 362.986018] ? lock_downgrade+0x740/0x740 [ 362.990157] ? _raw_spin_unlock+0x2d/0x50 [ 362.994289] ? __alloc_fd+0x1d4/0x4a0 [ 362.998084] do_sys_open+0x2c5/0x430 [ 363.001783] ? filp_open+0x70/0x70 [ 363.005321] ? fput+0xd4/0x150 [ 363.008498] ? SyS_pwrite64+0xca/0x140 [ 363.012374] SyS_open+0x2d/0x40 [ 363.015659] ? do_sys_open+0x430/0x430 [ 363.019539] do_syscall_64+0x1e8/0x640 [ 363.023409] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 363.028243] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 363.033416] RIP: 0033:0x413ce1 [ 363.036587] RSP: 002b:00007f5a0fb49a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 363.044279] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413ce1 [ 363.051530] RDX: 00007f5a0fb49b0a RSI: 0000000000000002 RDI: 00007f5a0fb49b00 [ 363.058785] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 363.066055] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 17:19:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000001c0)={0x0, 0x7}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000240)={r2, 0x1, 0x1, 0xcdd, 0x48, 0x1}, 0x14) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r3, 0x4040ae72, &(0x7f00000000c0)={0x401, 0x2, 0x0, 0x1}) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffe000/0x1000)=nil) [ 363.073310] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:24 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96", 0x3) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:24 executing program 0 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:24 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x10000000000, 0xaaaaaaaaaaaaac5, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:24 executing program 3 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:24 executing program 4: [ 363.223551] FAULT_INJECTION: forcing a failure. [ 363.223551] name failslab, interval 1, probability 0, space 0, times 0 [ 363.270480] CPU: 0 PID: 21714 Comm: syz-executor.0 Not tainted 4.14.151 #0 [ 363.277547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.286909] Call Trace: [ 363.289520] dump_stack+0x138/0x197 [ 363.293165] should_fail.cold+0x10f/0x159 [ 363.297332] should_failslab+0xdb/0x130 [ 363.301355] kmem_cache_alloc+0x2d7/0x780 [ 363.305519] ? save_stack+0xa9/0xd0 [ 363.309157] get_empty_filp+0x8c/0x3f0 [ 363.313056] path_openat+0x8f/0x3f70 [ 363.316782] ? trace_hardirqs_on+0x10/0x10 [ 363.321028] ? check_preemption_disabled+0x3c/0x250 [ 363.326092] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 363.330777] ? find_held_lock+0x35/0x130 [ 363.334854] ? save_trace+0x290/0x290 [ 363.338669] ? __alloc_fd+0x1d4/0x4a0 [ 363.342482] do_filp_open+0x18e/0x250 [ 363.346297] ? may_open_dev+0xe0/0xe0 [ 363.350140] ? lock_downgrade+0x740/0x740 [ 363.354301] ? _raw_spin_unlock+0x2d/0x50 [ 363.358456] ? __alloc_fd+0x1d4/0x4a0 [ 363.362276] do_sys_open+0x2c5/0x430 [ 363.366000] ? filp_open+0x70/0x70 [ 363.369546] ? fput+0xd4/0x150 [ 363.372749] ? SyS_pwrite64+0xca/0x140 [ 363.376647] SyS_open+0x2d/0x40 [ 363.379931] ? do_sys_open+0x430/0x430 [ 363.383824] do_syscall_64+0x1e8/0x640 [ 363.387720] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 363.392600] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 363.397789] RIP: 0033:0x413ce1 [ 363.400980] RSP: 002b:00007f5a0fb49a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 363.408696] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413ce1 17:19:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565b, &(0x7f0000000080)={0x6, 0x1048, 0x5}) 17:19:25 executing program 0 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 363.416039] RDX: 00007f5a0fb49b0a RSI: 0000000000000002 RDI: 00007f5a0fb49b00 [ 363.423310] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 363.430610] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 363.437911] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:25 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, 0x0, 0x0) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 363.500881] FAULT_INJECTION: forcing a failure. [ 363.500881] name failslab, interval 1, probability 0, space 0, times 0 [ 363.522814] CPU: 1 PID: 21729 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 363.529881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.539241] Call Trace: [ 363.541837] dump_stack+0x138/0x197 [ 363.545483] should_fail.cold+0x10f/0x159 [ 363.549644] should_failslab+0xdb/0x130 [ 363.553460] FAULT_INJECTION: forcing a failure. [ 363.553460] name failslab, interval 1, probability 0, space 0, times 0 [ 363.553653] kmem_cache_alloc+0x2d7/0x780 [ 363.553668] ? wait_for_completion+0x420/0x420 [ 363.553686] __kernfs_new_node+0x70/0x420 [ 363.553700] kernfs_new_node+0x80/0xf0 [ 363.581659] __kernfs_create_file+0x46/0x323 [ 363.586074] sysfs_add_file_mode_ns+0x1e4/0x450 [ 363.590765] internal_create_group+0x232/0x7b0 [ 363.595353] sysfs_create_group+0x20/0x30 [ 363.599502] lo_ioctl+0x1176/0x1ce0 [ 363.603132] ? loop_probe+0x160/0x160 [ 363.606939] blkdev_ioctl+0x96b/0x1860 [ 363.610824] ? blkpg_ioctl+0x980/0x980 [ 363.610841] ? __might_sleep+0x93/0xb0 [ 363.610851] ? __fget+0x210/0x370 [ 363.610865] block_ioctl+0xde/0x120 [ 363.610875] ? blkdev_fallocate+0x3b0/0x3b0 [ 363.610886] do_vfs_ioctl+0x7ae/0x1060 [ 363.610899] ? selinux_file_mprotect+0x5d0/0x5d0 [ 363.610908] ? lock_downgrade+0x740/0x740 [ 363.610917] ? ioctl_preallocate+0x1c0/0x1c0 [ 363.610927] ? __fget+0x237/0x370 [ 363.610943] ? security_file_ioctl+0x89/0xb0 [ 363.618707] SyS_ioctl+0x8f/0xc0 [ 363.618716] ? do_vfs_ioctl+0x1060/0x1060 [ 363.618730] do_syscall_64+0x1e8/0x640 [ 363.618740] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 363.618759] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 363.618768] RIP: 0033:0x459db7 [ 363.618774] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 363.618784] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 363.618789] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 363.618798] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 363.709110] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 363.716371] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 363.723657] CPU: 0 PID: 21741 Comm: syz-executor.0 Not tainted 4.14.151 #0 [ 363.730680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.740029] Call Trace: [ 363.742614] dump_stack+0x138/0x197 [ 363.746231] should_fail.cold+0x10f/0x159 [ 363.750366] should_failslab+0xdb/0x130 [ 363.754330] kmem_cache_alloc+0x2d7/0x780 [ 363.758463] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 363.763902] ? check_preemption_disabled+0x3c/0x250 [ 363.768924] selinux_file_alloc_security+0xb4/0x190 [ 363.773926] security_file_alloc+0x6d/0xa0 [ 363.778147] get_empty_filp+0x162/0x3f0 [ 363.782127] path_openat+0x8f/0x3f70 [ 363.785838] ? trace_hardirqs_on+0x10/0x10 [ 363.790070] ? check_preemption_disabled+0x3c/0x250 [ 363.795087] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 363.799742] ? find_held_lock+0x35/0x130 [ 363.803789] ? save_trace+0x290/0x290 [ 363.807666] ? __alloc_fd+0x1d4/0x4a0 [ 363.811483] do_filp_open+0x18e/0x250 [ 363.815295] ? may_open_dev+0xe0/0xe0 [ 363.819089] ? lock_downgrade+0x740/0x740 [ 363.823232] ? _raw_spin_unlock+0x2d/0x50 [ 363.827393] ? __alloc_fd+0x1d4/0x4a0 [ 363.831206] do_sys_open+0x2c5/0x430 [ 363.834906] ? filp_open+0x70/0x70 [ 363.838488] ? fput+0xd4/0x150 [ 363.841750] ? SyS_pwrite64+0xca/0x140 [ 363.845623] SyS_open+0x2d/0x40 [ 363.848886] ? do_sys_open+0x430/0x430 [ 363.852758] do_syscall_64+0x1e8/0x640 [ 363.856628] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 363.861459] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 363.866633] RIP: 0033:0x413ce1 [ 363.869805] RSP: 002b:00007f5a0fb49a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 363.877583] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413ce1 [ 363.884840] RDX: 00007f5a0fb49b0a RSI: 0000000000000002 RDI: 00007f5a0fb49b00 [ 363.892093] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 17:19:25 executing program 2: socket$caif_seqpacket(0x25, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat(r1, &(0x7f00000000c0)='./file0\x00', 0x10000, 0xa2) read$rfkill(r2, &(0x7f0000000100), 0x8) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:25 executing program 0 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 363.899551] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 363.906805] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:25 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(0x0) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:25 executing program 4: r0 = inotify_init() fsetxattr$security_capability(r0, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x308, 0x6d13}, {0x4, 0x8}]}, 0x18, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) ioctl$UI_DEV_DESTROY(r2, 0x5502) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/validatetrans\x00', 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0xffff}], 0x0, 0x0) [ 364.042574] FAULT_INJECTION: forcing a failure. [ 364.042574] name failslab, interval 1, probability 0, space 0, times 0 [ 364.060364] CPU: 1 PID: 21755 Comm: syz-executor.0 Not tainted 4.14.151 #0 [ 364.067423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.076780] Call Trace: [ 364.079378] dump_stack+0x138/0x197 [ 364.083053] should_fail.cold+0x10f/0x159 [ 364.087217] should_failslab+0xdb/0x130 [ 364.091201] kmem_cache_alloc_trace+0x2e9/0x790 [ 364.095880] ? __lockdep_init_map+0x10c/0x570 [ 364.100568] ? loop_get_status64+0x120/0x120 [ 364.104986] __kthread_create_on_node+0xe3/0x3e0 [ 364.109753] ? kthread_park+0x140/0x140 [ 364.113529] FAULT_INJECTION: forcing a failure. [ 364.113529] name failslab, interval 1, probability 0, space 0, times 0 [ 364.113731] ? __fget+0x210/0x370 [ 364.128428] ? loop_get_status64+0x120/0x120 [ 364.132846] kthread_create_on_node+0xa8/0xd0 [ 364.137337] ? __kthread_create_on_node+0x3e0/0x3e0 [ 364.142351] ? __lockdep_init_map+0x10c/0x570 [ 364.146848] lo_ioctl+0xcf7/0x1ce0 [ 364.150387] ? debug_check_no_obj_freed+0x2aa/0x7b7 [ 364.155433] ? loop_probe+0x160/0x160 [ 364.159236] blkdev_ioctl+0x96b/0x1860 [ 364.163116] ? blkpg_ioctl+0x980/0x980 [ 364.167031] ? __might_sleep+0x93/0xb0 [ 364.170914] ? __fget+0x210/0x370 [ 364.174363] block_ioctl+0xde/0x120 [ 364.177983] ? blkdev_fallocate+0x3b0/0x3b0 [ 364.182297] do_vfs_ioctl+0x7ae/0x1060 [ 364.186179] ? selinux_file_mprotect+0x5d0/0x5d0 [ 364.190933] ? lock_downgrade+0x740/0x740 [ 364.195080] ? ioctl_preallocate+0x1c0/0x1c0 [ 364.199481] ? __fget+0x237/0x370 [ 364.202936] ? security_file_ioctl+0x89/0xb0 [ 364.207343] SyS_ioctl+0x8f/0xc0 [ 364.210701] ? do_vfs_ioctl+0x1060/0x1060 [ 364.214847] do_syscall_64+0x1e8/0x640 [ 364.218732] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 364.223576] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 364.228759] RIP: 0033:0x459db7 [ 364.231940] RSP: 002b:00007f5a0fb49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 17:19:25 executing program 3 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 364.239657] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 364.247011] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 364.254298] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 364.261625] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 364.268895] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 364.276176] CPU: 0 PID: 21768 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 364.283203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.283208] Call Trace: [ 364.283225] dump_stack+0x138/0x197 [ 364.283242] should_fail.cold+0x10f/0x159 [ 364.283255] should_failslab+0xdb/0x130 [ 364.283266] kmem_cache_alloc+0x2d7/0x780 [ 364.283276] ? wait_for_completion+0x420/0x420 [ 364.283293] __kernfs_new_node+0x70/0x420 [ 364.283306] kernfs_new_node+0x80/0xf0 [ 364.283318] __kernfs_create_file+0x46/0x323 [ 364.283330] sysfs_add_file_mode_ns+0x1e4/0x450 [ 364.283345] internal_create_group+0x232/0x7b0 [ 364.283362] sysfs_create_group+0x20/0x30 [ 364.283372] lo_ioctl+0x1176/0x1ce0 [ 364.283385] ? loop_probe+0x160/0x160 [ 364.283395] blkdev_ioctl+0x96b/0x1860 [ 364.283404] ? blkpg_ioctl+0x980/0x980 [ 364.283419] ? __might_sleep+0x93/0xb0 [ 364.283427] ? __fget+0x210/0x370 [ 364.295536] block_ioctl+0xde/0x120 [ 364.295547] ? blkdev_fallocate+0x3b0/0x3b0 [ 364.295557] do_vfs_ioctl+0x7ae/0x1060 [ 364.295570] ? selinux_file_mprotect+0x5d0/0x5d0 [ 364.303346] ? lock_downgrade+0x740/0x740 [ 364.303359] ? ioctl_preallocate+0x1c0/0x1c0 [ 364.303369] ? __fget+0x237/0x370 [ 364.303385] ? security_file_ioctl+0x89/0xb0 [ 364.303395] SyS_ioctl+0x8f/0xc0 [ 364.303406] ? do_vfs_ioctl+0x1060/0x1060 [ 364.311512] do_syscall_64+0x1e8/0x640 [ 364.311522] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 364.311539] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 364.311546] RIP: 0033:0x459db7 [ 364.311551] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 364.311560] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 17:19:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f00000001c0)={{0x8, 0x3, 0x88a6, 0x7, 'syz1\x00', 0x7}, 0x0, [0xe3, 0x0, 0x400000, 0x2, 0x80000001, 0x4, 0x5, 0x3, 0x3, 0x9, 0x3ff, 0x3f, 0x7ff, 0x40, 0x9, 0x5, 0xffff, 0x0, 0x3ff, 0x5c, 0x60, 0x5, 0x10000, 0x10001, 0x5, 0x3, 0x7, 0xf, 0x1176, 0xfff, 0xce1, 0x0, 0x5, 0x2, 0xd1, 0x3, 0x3, 0x100, 0x9, 0x3f, 0xed9, 0x9, 0x1, 0xd60, 0xc08, 0x3, 0x8, 0x7, 0x7, 0x7d89, 0x3, 0x0, 0x2, 0x4, 0xffff, 0x8001, 0xfffffffffffffffd, 0x70f, 0xfffffffffffffff7, 0x7f8000, 0x1ff, 0x0, 0xb19, 0x60, 0x27b, 0xffffffffffffff3e, 0x3ff, 0x0, 0x0, 0x6, 0x7, 0x1, 0x4, 0x1323, 0x80000000, 0x7fff, 0x10001, 0x1, 0x8, 0x80000001, 0x3ff, 0x80000001, 0x5, 0x100000000, 0x8, 0xfffffffffffffffd, 0x8220, 0x4, 0x1ff, 0x4, 0x5, 0x2, 0x2723, 0x5, 0x100000001, 0x7ff, 0x4, 0xffffffffffff8000, 0x4, 0xff, 0xf3b2, 0x8, 0xe5, 0x2, 0x101, 0x6, 0x100000000, 0x9, 0x7fffffff, 0x6b53cee7, 0x7ff, 0x3, 0x2, 0x8395, 0x6, 0x2, 0x8001, 0x10000, 0x2, 0x5, 0x6, 0x4, 0x2, 0x8, 0x1, 0x3, 0x836a, 0x7]}) r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x1, 0x1) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f00000006c0)=""/27) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x7) 17:19:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) 17:19:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x19, 0x0, &(0x7f0000000040)) fcntl$setsig(r0, 0xa, 0x31) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0x576, 0x146) connect(r1, &(0x7f00000001c0)=@in={0x2, 0x4e20, @remote}, 0x80) sendmmsg(r1, &(0x7f00000002c0), 0x4000000000000d7, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') r2 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) 17:19:26 executing program 0 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 364.311566] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 364.311570] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 364.311575] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 364.311580] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:26 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) read$usbmon(r1, &(0x7f00000000c0)=""/10, 0xa) 17:19:26 executing program 3 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 364.606065] FAULT_INJECTION: forcing a failure. [ 364.606065] name failslab, interval 1, probability 0, space 0, times 0 [ 364.634720] CPU: 1 PID: 21786 Comm: syz-executor.0 Not tainted 4.14.151 #0 [ 364.641783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.651128] Call Trace: [ 364.653709] dump_stack+0x138/0x197 [ 364.657329] should_fail.cold+0x10f/0x159 [ 364.661471] should_failslab+0xdb/0x130 [ 364.665431] kmem_cache_alloc+0x2d7/0x780 [ 364.669564] ? trace_hardirqs_on+0x10/0x10 [ 364.673801] ? save_trace+0x290/0x290 [ 364.677600] __kernfs_new_node+0x70/0x420 [ 364.681732] kernfs_new_node+0x80/0xf0 [ 364.685609] kernfs_create_dir_ns+0x41/0x140 [ 364.690003] internal_create_group+0xea/0x7b0 [ 364.694514] sysfs_create_group+0x20/0x30 [ 364.698740] lo_ioctl+0x1176/0x1ce0 [ 364.702358] ? loop_probe+0x160/0x160 [ 364.706145] blkdev_ioctl+0x96b/0x1860 [ 364.710018] ? blkpg_ioctl+0x980/0x980 [ 364.713899] ? __might_sleep+0x93/0xb0 [ 364.717773] ? __fget+0x210/0x370 [ 364.721212] block_ioctl+0xde/0x120 [ 364.724823] ? blkdev_fallocate+0x3b0/0x3b0 [ 364.729131] do_vfs_ioctl+0x7ae/0x1060 [ 364.733010] ? selinux_file_mprotect+0x5d0/0x5d0 [ 364.737774] ? lock_downgrade+0x740/0x740 [ 364.741910] ? ioctl_preallocate+0x1c0/0x1c0 [ 364.746302] ? __fget+0x237/0x370 [ 364.749750] ? security_file_ioctl+0x89/0xb0 [ 364.754146] SyS_ioctl+0x8f/0xc0 [ 364.757497] ? do_vfs_ioctl+0x1060/0x1060 [ 364.761635] do_syscall_64+0x1e8/0x640 [ 364.765511] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 364.770347] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 364.775522] RIP: 0033:0x459db7 [ 364.778708] RSP: 002b:00007f5a0fb49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 364.786416] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 364.793794] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 364.801061] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 364.808316] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 364.815570] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:26 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0), 0x0) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:26 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(0x0) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 364.885707] FAULT_INJECTION: forcing a failure. [ 364.885707] name failslab, interval 1, probability 0, space 0, times 0 [ 364.939581] CPU: 1 PID: 21799 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 364.946644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.956005] Call Trace: [ 364.958600] dump_stack+0x138/0x197 [ 364.962222] should_fail.cold+0x10f/0x159 [ 364.966378] should_failslab+0xdb/0x130 [ 364.970342] __kmalloc+0x2f0/0x7a0 [ 364.973869] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 364.979304] ? kobject_uevent_env+0x378/0xc23 [ 364.983782] ? rcu_read_lock_sched_held+0x110/0x130 [ 364.988781] ? kobject_get_path+0xbb/0x1a0 [ 364.993000] kobject_get_path+0xbb/0x1a0 [ 364.997054] ? devm_device_remove_groups+0x50/0x50 [ 365.001967] kobject_uevent_env+0x39c/0xc23 [ 365.006273] ? internal_create_group+0x49a/0x7b0 [ 365.011021] kobject_uevent+0x20/0x26 [ 365.014807] lo_ioctl+0x11e7/0x1ce0 [ 365.018419] ? loop_probe+0x160/0x160 [ 365.022205] blkdev_ioctl+0x96b/0x1860 [ 365.026089] ? blkpg_ioctl+0x980/0x980 [ 365.029964] ? __might_sleep+0x93/0xb0 [ 365.033832] ? __fget+0x210/0x370 [ 365.037270] block_ioctl+0xde/0x120 [ 365.040885] ? blkdev_fallocate+0x3b0/0x3b0 [ 365.045191] do_vfs_ioctl+0x7ae/0x1060 [ 365.049149] ? selinux_file_mprotect+0x5d0/0x5d0 [ 365.053885] ? lock_downgrade+0x740/0x740 [ 365.058018] ? ioctl_preallocate+0x1c0/0x1c0 [ 365.062423] ? __fget+0x237/0x370 [ 365.065865] ? security_file_ioctl+0x89/0xb0 [ 365.070273] SyS_ioctl+0x8f/0xc0 [ 365.073623] ? do_vfs_ioctl+0x1060/0x1060 [ 365.077759] do_syscall_64+0x1e8/0x640 [ 365.081644] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 365.086473] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 365.091646] RIP: 0033:0x459db7 [ 365.094817] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 365.102509] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 365.109763] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 365.117015] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 365.124265] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 365.131518] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:26 executing program 3 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:26 executing program 0 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:26 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x4}, 0x10) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x10001, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f00000002c0)={{0x4, 0x87}, 'port0\x00', 0x9615e2b8cd32a6e0, 0x120060, 0x6, 0x0, 0x5, 0x2, 0x6, 0x0, 0x2, 0x80}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0xfc7dff7f3aced4cc, 0x0) getsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000200), &(0x7f0000000240)=0x4) [ 365.353412] FAULT_INJECTION: forcing a failure. [ 365.353412] name failslab, interval 1, probability 0, space 0, times 0 [ 365.369361] CPU: 0 PID: 21825 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 365.372911] FAULT_INJECTION: forcing a failure. [ 365.372911] name failslab, interval 1, probability 0, space 0, times 0 [ 365.376406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 365.397004] Call Trace: [ 365.399597] dump_stack+0x138/0x197 [ 365.403226] should_fail.cold+0x10f/0x159 [ 365.407376] should_failslab+0xdb/0x130 [ 365.411361] kmem_cache_alloc_node+0x287/0x780 [ 365.416014] __alloc_skb+0x9c/0x500 [ 365.419637] ? skb_scrub_packet+0x4b0/0x4b0 [ 365.424043] ? netlink_has_listeners+0x20a/0x330 [ 365.428803] kobject_uevent_env+0x781/0xc23 [ 365.433139] ? internal_create_group+0x49a/0x7b0 [ 365.437894] kobject_uevent+0x20/0x26 [ 365.441699] lo_ioctl+0x11e7/0x1ce0 [ 365.445338] ? loop_probe+0x160/0x160 [ 365.449142] blkdev_ioctl+0x96b/0x1860 [ 365.453027] ? blkpg_ioctl+0x980/0x980 [ 365.456915] ? __might_sleep+0x93/0xb0 [ 365.460796] ? __fget+0x210/0x370 [ 365.464248] block_ioctl+0xde/0x120 [ 365.467866] ? blkdev_fallocate+0x3b0/0x3b0 [ 365.472179] do_vfs_ioctl+0x7ae/0x1060 [ 365.476060] ? selinux_file_mprotect+0x5d0/0x5d0 [ 365.480831] ? lock_downgrade+0x740/0x740 [ 365.484970] ? ioctl_preallocate+0x1c0/0x1c0 [ 365.489375] ? __fget+0x237/0x370 [ 365.492825] ? security_file_ioctl+0x89/0xb0 [ 365.497245] SyS_ioctl+0x8f/0xc0 [ 365.500603] ? do_vfs_ioctl+0x1060/0x1060 [ 365.504743] do_syscall_64+0x1e8/0x640 [ 365.508645] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 365.513495] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 365.518685] RIP: 0033:0x459db7 [ 365.520101] net_ratelimit: 16 callbacks suppressed [ 365.520105] protocol 88fb is buggy, dev hsr_slave_0 [ 365.521871] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 365.521884] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 365.521890] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 365.521896] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 365.521902] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 365.521908] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 365.522140] protocol 88fb is buggy, dev hsr_slave_0 [ 365.526891] protocol 88fb is buggy, dev hsr_slave_1 [ 365.531912] protocol 88fb is buggy, dev hsr_slave_1 [ 365.539647] protocol 88fb is buggy, dev hsr_slave_0 [ 365.546915] protocol 88fb is buggy, dev hsr_slave_0 [ 365.554148] protocol 88fb is buggy, dev hsr_slave_1 [ 365.561796] protocol 88fb is buggy, dev hsr_slave_1 [ 365.570343] CPU: 1 PID: 21824 Comm: syz-executor.0 Not tainted 4.14.151 #0 [ 365.618302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 365.627659] Call Trace: [ 365.630260] dump_stack+0x138/0x197 [ 365.633881] should_fail.cold+0x10f/0x159 [ 365.638022] should_failslab+0xdb/0x130 [ 365.642011] kmem_cache_alloc+0x2d7/0x780 [ 365.646161] ? __mutex_unlock_slowpath+0x71/0x800 [ 365.651008] ? __lock_is_held+0xb6/0x140 [ 365.655059] __kernfs_new_node+0x70/0x420 [ 365.659190] kernfs_new_node+0x80/0xf0 [ 365.663061] __kernfs_create_file+0x46/0x323 [ 365.667454] sysfs_add_file_mode_ns+0x1e4/0x450 [ 365.672110] internal_create_group+0x232/0x7b0 [ 365.676788] sysfs_create_group+0x20/0x30 [ 365.680922] lo_ioctl+0x1176/0x1ce0 [ 365.684536] ? loop_probe+0x160/0x160 [ 365.688320] blkdev_ioctl+0x96b/0x1860 [ 365.692204] ? blkpg_ioctl+0x980/0x980 [ 365.696086] ? __might_sleep+0x93/0xb0 [ 365.699970] ? __fget+0x210/0x370 [ 365.703411] block_ioctl+0xde/0x120 [ 365.707024] ? blkdev_fallocate+0x3b0/0x3b0 [ 365.711331] do_vfs_ioctl+0x7ae/0x1060 [ 365.715221] ? selinux_file_mprotect+0x5d0/0x5d0 [ 365.719965] ? lock_downgrade+0x740/0x740 [ 365.724095] ? ioctl_preallocate+0x1c0/0x1c0 [ 365.728486] ? __fget+0x237/0x370 [ 365.731930] ? security_file_ioctl+0x89/0xb0 [ 365.736323] SyS_ioctl+0x8f/0xc0 [ 365.739685] ? do_vfs_ioctl+0x1060/0x1060 [ 365.743820] do_syscall_64+0x1e8/0x640 [ 365.747690] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 365.752522] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 365.757697] RIP: 0033:0x459db7 [ 365.760870] RSP: 002b:00007f5a0fb49a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 365.768561] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 365.775833] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 365.783103] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 365.790364] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 365.797619] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:27 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0), 0x0) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 365.812911] print_req_error: I/O error, dev loop4, sector 128 17:19:27 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=[&(0x7f0000000100)='btrfs\x00', &(0x7f00000001c0)='\x13\x00', &(0x7f0000000200)='\'.\x00', &(0x7f0000000240)='\x00'], &(0x7f0000000300)=[&(0x7f00000002c0)='proc\\\x95(\x00']) getxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=@random={'user.', '$\xee&+mime_type\x00'}, &(0x7f00000003c0), 0x0) 17:19:27 executing program 3 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 365.920095] protocol 88fb is buggy, dev hsr_slave_0 [ 365.925275] protocol 88fb is buggy, dev hsr_slave_1 [ 365.969554] FAULT_INJECTION: forcing a failure. [ 365.969554] name failslab, interval 1, probability 0, space 0, times 0 [ 365.985015] CPU: 0 PID: 21850 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 365.992078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 366.001435] Call Trace: [ 366.004022] dump_stack+0x138/0x197 [ 366.004043] should_fail.cold+0x10f/0x159 [ 366.004060] should_failslab+0xdb/0x130 [ 366.004077] __kmalloc+0x2f0/0x7a0 [ 366.004087] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 366.024749] ? kobject_uevent_env+0x378/0xc23 [ 366.029257] ? rcu_read_lock_sched_held+0x110/0x130 [ 366.034258] ? kobject_get_path+0xbb/0x1a0 [ 366.038476] kobject_get_path+0xbb/0x1a0 [ 366.042526] ? devm_device_remove_groups+0x50/0x50 [ 366.047451] kobject_uevent_env+0x39c/0xc23 [ 366.051758] ? internal_create_group+0x49a/0x7b0 [ 366.056521] kobject_uevent+0x20/0x26 [ 366.060306] lo_ioctl+0x11e7/0x1ce0 [ 366.063917] ? loop_probe+0x160/0x160 [ 366.067701] blkdev_ioctl+0x96b/0x1860 [ 366.071572] ? blkpg_ioctl+0x980/0x980 [ 366.075447] ? __might_sleep+0x93/0xb0 [ 366.079315] ? __fget+0x210/0x370 [ 366.082752] block_ioctl+0xde/0x120 [ 366.086364] ? blkdev_fallocate+0x3b0/0x3b0 [ 366.090669] do_vfs_ioctl+0x7ae/0x1060 [ 366.094542] ? selinux_file_mprotect+0x5d0/0x5d0 [ 366.099281] ? lock_downgrade+0x740/0x740 [ 366.103413] ? ioctl_preallocate+0x1c0/0x1c0 [ 366.107803] ? __fget+0x237/0x370 [ 366.111246] ? security_file_ioctl+0x89/0xb0 [ 366.115654] SyS_ioctl+0x8f/0xc0 [ 366.119010] ? do_vfs_ioctl+0x1060/0x1060 [ 366.123150] do_syscall_64+0x1e8/0x640 [ 366.127035] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 366.131884] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 366.137057] RIP: 0033:0x459db7 [ 366.140255] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 366.147947] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 366.155200] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 366.162462] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 17:19:27 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(0x0) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc7431a571977000000007a0000000000fff6f2a2299748aeb81e2900920efd9a00000100000078000001fffffff60000005f42485266535f", 0x48, 0x10000}], 0x3000000, 0x0) [ 366.169719] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 366.176990] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = getpid() sched_setattr(r1, 0x0, 0x0) r2 = getpid() sched_setattr(r2, 0x0, 0x0) getpgid(r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x19, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCDELDLCI(r3, 0x8981, &(0x7f0000000080)={'bond_slave_0\x00', 0x6}) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000200)={0x3ff, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x88) r4 = getpid() sched_setattr(r4, 0x0, 0x0) ptrace$poke(0x1, r4, &(0x7f00000001c0), 0x14) 17:19:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video0\x00', 0x2, 0x0) 17:19:27 executing program 3 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 366.412924] print_req_error: I/O error, dev loop4, sector 128 [ 366.437341] FAULT_INJECTION: forcing a failure. [ 366.437341] name failslab, interval 1, probability 0, space 0, times 0 [ 366.461747] CPU: 0 PID: 21885 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 366.468798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 366.478355] Call Trace: [ 366.480954] dump_stack+0x138/0x197 [ 366.484577] should_fail.cold+0x10f/0x159 [ 366.488714] should_failslab+0xdb/0x130 [ 366.492696] kmem_cache_alloc_node_trace+0x280/0x770 [ 366.497787] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 366.503228] __kmalloc_node_track_caller+0x3d/0x80 [ 366.508211] __kmalloc_reserve.isra.0+0x40/0xe0 [ 366.512917] __alloc_skb+0xcf/0x500 [ 366.516561] ? skb_scrub_packet+0x4b0/0x4b0 [ 366.520907] ? netlink_has_listeners+0x20a/0x330 [ 366.525649] kobject_uevent_env+0x781/0xc23 [ 366.529966] ? internal_create_group+0x49a/0x7b0 [ 366.534726] kobject_uevent+0x20/0x26 [ 366.538508] lo_ioctl+0x11e7/0x1ce0 [ 366.542119] ? loop_probe+0x160/0x160 [ 366.545903] blkdev_ioctl+0x96b/0x1860 [ 366.549772] ? blkpg_ioctl+0x980/0x980 [ 366.553663] ? __might_sleep+0x93/0xb0 [ 366.557532] ? __fget+0x210/0x370 [ 366.560985] block_ioctl+0xde/0x120 [ 366.564610] ? blkdev_fallocate+0x3b0/0x3b0 [ 366.568937] do_vfs_ioctl+0x7ae/0x1060 [ 366.572810] ? selinux_file_mprotect+0x5d0/0x5d0 [ 366.577554] ? lock_downgrade+0x740/0x740 [ 366.581685] ? ioctl_preallocate+0x1c0/0x1c0 [ 366.586077] ? __fget+0x237/0x370 [ 366.589518] ? security_file_ioctl+0x89/0xb0 [ 366.593909] SyS_ioctl+0x8f/0xc0 [ 366.597259] ? do_vfs_ioctl+0x1060/0x1060 [ 366.601411] do_syscall_64+0x1e8/0x640 [ 366.605302] ? trace_hardirqs_off_thunk+0x1a/0x1c 17:19:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x0, 0x20000) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r1, 0xc0406619, &(0x7f0000000280)={{0x5, 0x0, @descriptor="e3fd72f0451e771a"}}) r2 = dup(r0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@initdev}}, &(0x7f0000000380)=0x378) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$inet_int(r2, 0x0, 0xf, &(0x7f00000001c0)=0x7fff, 0x4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r4, &(0x7f0000000000)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @dev}, 0x14) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r7, 0x0, 0x19, 0x0, &(0x7f0000000040)) fcntl$setstatus(r7, 0x4, 0x1000) getsockname$packet(r4, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x3b6) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x3c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="98000000640000032dbd7000fcdbdf250000000000000000", @ANYRES32=r8, @ANYBLOB="10000f00090003001000faff080005008d040000080005004003003443708b89a0374c38000c000100666c6f77657200005400020008001a000080000008001300000000000c003f00aaaaaaaaaaaa000008003800000000000800080088f7000008004a000100000014006100514d7002eb32d0d6ae391bdc3fa602cb080035000000000062e8beb0d14d71393afe4535e159f35d6933501e191cf929b7dc144437885bb63ae641325527a834a1a720ee9b2e8c9a1f0d585248c26e02816ef191140e4604a742b15d4bc3cf91c2875eb5b71a272b85b511447857478b6c4944896e88329508883a2f1a"], 0x98}, 0x1, 0x0, 0x0, 0x8000}, 0x400c0) [ 366.610138] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 366.615312] RIP: 0033:0x459db7 [ 366.618499] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 366.626264] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 366.633586] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 366.640866] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 366.648128] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 366.655382] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:28 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0), 0x0) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:28 executing program 4: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x3, 0x10, 0x1, 0x80000001}, &(0x7f00000001c0)=0x18) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x19, 0x0, &(0x7f0000000040)) accept4$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000002c0)=0x1c, 0x80800) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x19, 0x0, &(0x7f0000000040)) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000300)=0x3, 0x4) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r5, 0x0, 0x19, 0x0, &(0x7f0000000040)) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r6, 0x0, 0x19, 0x0, &(0x7f0000000040)) r7 = timerfd_create(0x9, 0x80000) r8 = dup(r7) ioctl$sock_SIOCETHTOOL(r8, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="37000000000000000600000000000000"]}) ioctl$DRM_IOCTL_GET_MAGIC(r8, 0x80046402, &(0x7f0000000240)=0x5) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000200)={0x100, 0x4, 0x4, 0x7, r1}, 0x10) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:28 executing program 3 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 366.909065] audit: type=1400 audit(1572542368.436:91): avc: denied { wake_alarm } for pid=21908 comm="syz-executor.4" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 17:19:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsj', &(0x7f0000000100)='./file0\x00', 0x7, 0xaaaaaaaaaaaab80, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 367.026961] FAULT_INJECTION: forcing a failure. [ 367.026961] name failslab, interval 1, probability 0, space 0, times 0 [ 367.042903] CPU: 0 PID: 21924 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 367.050068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.059437] Call Trace: [ 367.062020] dump_stack+0x138/0x197 [ 367.065668] should_fail.cold+0x10f/0x159 [ 367.069829] should_failslab+0xdb/0x130 [ 367.073810] kmem_cache_alloc_node_trace+0x280/0x770 [ 367.078903] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 367.084345] __kmalloc_node_track_caller+0x3d/0x80 [ 367.089265] __kmalloc_reserve.isra.0+0x40/0xe0 [ 367.093919] __alloc_skb+0xcf/0x500 [ 367.097533] ? skb_scrub_packet+0x4b0/0x4b0 [ 367.101843] ? netlink_has_listeners+0x20a/0x330 [ 367.106589] kobject_uevent_env+0x781/0xc23 [ 367.110997] kobject_uevent+0x20/0x26 [ 367.114784] lo_ioctl+0x11e7/0x1ce0 [ 367.118400] ? loop_probe+0x160/0x160 [ 367.122186] blkdev_ioctl+0x96b/0x1860 [ 367.126074] ? blkpg_ioctl+0x980/0x980 [ 367.129949] ? __might_sleep+0x93/0xb0 [ 367.133835] ? __fget+0x210/0x370 [ 367.137279] block_ioctl+0xde/0x120 [ 367.140892] ? blkdev_fallocate+0x3b0/0x3b0 [ 367.145202] do_vfs_ioctl+0x7ae/0x1060 [ 367.149079] ? selinux_file_mprotect+0x5d0/0x5d0 [ 367.153828] ? lock_downgrade+0x740/0x740 [ 367.157967] ? ioctl_preallocate+0x1c0/0x1c0 [ 367.162368] ? __fget+0x237/0x370 [ 367.165817] ? security_file_ioctl+0x89/0xb0 [ 367.170214] SyS_ioctl+0x8f/0xc0 [ 367.173570] ? do_vfs_ioctl+0x1060/0x1060 [ 367.177721] do_syscall_64+0x1e8/0x640 [ 367.181593] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 367.186427] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 367.191601] RIP: 0033:0x459db7 [ 367.194788] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 367.202481] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 367.209751] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 367.217023] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 17:19:28 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(0xffffffffffffffff, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 367.224284] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 367.231537] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:28 executing program 4: socket$unix(0x1, 0x2, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x1bee02b2294cd8b6, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x19, 0x0, &(0x7f0000000040)) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000001c0)={r1, r2}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x9}], 0x0, 0x0) 17:19:28 executing program 3 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:28 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) remap_file_pages(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2, 0x80000000, 0x60004) [ 367.427501] FAULT_INJECTION: forcing a failure. [ 367.427501] name failslab, interval 1, probability 0, space 0, times 0 [ 367.439048] CPU: 0 PID: 21950 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 367.446094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.455448] Call Trace: [ 367.458052] dump_stack+0x138/0x197 [ 367.461705] should_fail.cold+0x10f/0x159 [ 367.465888] should_failslab+0xdb/0x130 [ 367.469870] kmem_cache_alloc_node+0x287/0x780 [ 367.474462] __alloc_skb+0x9c/0x500 [ 367.478077] ? skb_scrub_packet+0x4b0/0x4b0 [ 367.482393] ? netlink_has_listeners+0x20a/0x330 [ 367.487148] kobject_uevent_env+0x781/0xc23 [ 367.491476] kobject_uevent+0x20/0x26 [ 367.495258] lo_ioctl+0x11e7/0x1ce0 [ 367.498870] ? loop_probe+0x160/0x160 [ 367.502655] blkdev_ioctl+0x96b/0x1860 [ 367.506525] ? blkpg_ioctl+0x980/0x980 [ 367.510399] ? __might_sleep+0x93/0xb0 [ 367.514267] ? __fget+0x210/0x370 [ 367.517707] block_ioctl+0xde/0x120 [ 367.521322] ? blkdev_fallocate+0x3b0/0x3b0 [ 367.525630] do_vfs_ioctl+0x7ae/0x1060 [ 367.529520] ? selinux_file_mprotect+0x5d0/0x5d0 [ 367.534260] ? lock_downgrade+0x740/0x740 [ 367.538391] ? ioctl_preallocate+0x1c0/0x1c0 [ 367.542785] ? __fget+0x237/0x370 [ 367.546224] ? security_file_ioctl+0x89/0xb0 [ 367.550618] SyS_ioctl+0x8f/0xc0 [ 367.553967] ? do_vfs_ioctl+0x1060/0x1060 [ 367.558102] do_syscall_64+0x1e8/0x640 [ 367.561975] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 367.566807] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 367.571982] RIP: 0033:0x459db7 [ 367.575157] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 367.582864] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 367.590122] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 367.597375] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 367.604632] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 367.611888] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:29 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb", 0x2) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x592efa616bcfe577, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r3}}, 0x48) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000140), r3, 0x4}}, 0x18) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x80100, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x4e23, @local}, @in={0x2, 0x4e22, @empty}], 0x20) 17:19:29 executing program 3 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000240)="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", 0x2d8, 0x10000}], 0x0, 0x0) 17:19:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x200000, 0x100) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x4, 0x802000) write$selinux_create(r0, &(0x7f00000001c0)=@access={'system_u:object_r:gpg_exec_t:s0', 0x20, '/usr/sbin/cupsd', 0x20, 0x8ab}, 0x45) [ 367.883811] FAULT_INJECTION: forcing a failure. [ 367.883811] name failslab, interval 1, probability 0, space 0, times 0 [ 367.904689] CPU: 0 PID: 21981 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 367.911748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.921101] Call Trace: [ 367.921126] dump_stack+0x138/0x197 [ 367.921150] should_fail.cold+0x10f/0x159 [ 367.921166] should_failslab+0xdb/0x130 [ 367.921179] kmem_cache_alloc_node_trace+0x280/0x770 [ 367.927575] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 367.927595] __kmalloc_node_track_caller+0x3d/0x80 [ 367.927611] __kmalloc_reserve.isra.0+0x40/0xe0 [ 367.927622] __alloc_skb+0xcf/0x500 [ 367.959432] ? skb_scrub_packet+0x4b0/0x4b0 [ 367.963743] ? netlink_has_listeners+0x20a/0x330 [ 367.968606] kobject_uevent_env+0x781/0xc23 [ 367.972930] kobject_uevent+0x20/0x26 [ 367.976717] lo_ioctl+0x11e7/0x1ce0 [ 367.980340] ? loop_probe+0x160/0x160 [ 367.984144] blkdev_ioctl+0x96b/0x1860 [ 367.988026] ? blkpg_ioctl+0x980/0x980 [ 367.991921] ? __might_sleep+0x93/0xb0 [ 367.995798] ? __fget+0x210/0x370 [ 367.999249] block_ioctl+0xde/0x120 [ 368.002877] ? blkdev_fallocate+0x3b0/0x3b0 [ 368.007208] do_vfs_ioctl+0x7ae/0x1060 [ 368.011087] ? selinux_file_mprotect+0x5d0/0x5d0 [ 368.015832] ? lock_downgrade+0x740/0x740 [ 368.019972] ? ioctl_preallocate+0x1c0/0x1c0 [ 368.024375] ? __fget+0x237/0x370 [ 368.027834] ? security_file_ioctl+0x89/0xb0 [ 368.032237] SyS_ioctl+0x8f/0xc0 [ 368.035593] ? do_vfs_ioctl+0x1060/0x1060 [ 368.039726] do_syscall_64+0x1e8/0x640 [ 368.043597] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 368.048442] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 368.053628] RIP: 0033:0x459db7 [ 368.056824] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 368.064528] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 368.071789] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 368.079063] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 368.086321] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 368.093595] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:29 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(0xffffffffffffffff, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:29 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0xe) 17:19:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) keyctl$get_keyring_id(0x0, 0x0, 0x5) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f00000001c0)={{0x9, 0x4}, {0xd0, 0x4}, 0x40000000, 0x820823989b938cdf, 0xf7}) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) flock(r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400203) ioctl$UFFDIO_ZEROPAGE(r3, 0xc020aa04, &(0x7f0000000280)={{&(0x7f0000ffa000/0x3000)=nil, 0x3000}}) r4 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r6 = dup(r5) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r6, 0x800442d2, &(0x7f0000000440)={0x9, &(0x7f0000000300)=[{0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @dev}, {}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @remote}]}) r7 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2d003, 0x58) write$FUSE_DIRENT(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="0090c79d403bb365cd96a60abcb49920f27179102c7300000000000000"], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r4, r7, 0x0, 0x7fffffff) tee(r4, r7, 0x7, 0x8) sendfile(r7, r7, &(0x7f0000000140)=0x8800, 0x8800000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:29 executing program 3 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 368.302464] audit: type=1804 audit(1572542369.836:92): pid=22022 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir334423083/syzkaller.aOA31u/503/file0" dev="sda1" ino=17906 res=1 [ 368.330222] FAULT_INJECTION: forcing a failure. [ 368.330222] name failslab, interval 1, probability 0, space 0, times 0 [ 368.345626] CPU: 0 PID: 22018 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 368.352703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 368.363190] Call Trace: [ 368.365785] dump_stack+0x138/0x197 [ 368.369432] should_fail.cold+0x10f/0x159 [ 368.373610] should_failslab+0xdb/0x130 [ 368.377600] kmem_cache_alloc_node_trace+0x280/0x770 [ 368.382739] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 368.388207] __kmalloc_node_track_caller+0x3d/0x80 [ 368.393146] __kmalloc_reserve.isra.0+0x40/0xe0 [ 368.397816] __alloc_skb+0xcf/0x500 [ 368.397827] ? skb_scrub_packet+0x4b0/0x4b0 [ 368.397840] ? netlink_has_listeners+0x20a/0x330 [ 368.397855] kobject_uevent_env+0x781/0xc23 [ 368.414850] kobject_uevent+0x20/0x26 [ 368.418653] lo_ioctl+0x11e7/0x1ce0 [ 368.422282] ? loop_probe+0x160/0x160 [ 368.426085] blkdev_ioctl+0x96b/0x1860 [ 368.429981] ? blkpg_ioctl+0x980/0x980 [ 368.433884] ? __might_sleep+0x93/0xb0 [ 368.437775] ? __fget+0x210/0x370 [ 368.441263] block_ioctl+0xde/0x120 [ 368.444888] ? blkdev_fallocate+0x3b0/0x3b0 [ 368.449210] do_vfs_ioctl+0x7ae/0x1060 [ 368.453108] ? selinux_file_mprotect+0x5d0/0x5d0 [ 368.457868] ? lock_downgrade+0x740/0x740 [ 368.462026] ? ioctl_preallocate+0x1c0/0x1c0 [ 368.466435] ? __fget+0x237/0x370 [ 368.469897] ? security_file_ioctl+0x89/0xb0 [ 368.469913] SyS_ioctl+0x8f/0xc0 [ 368.469922] ? do_vfs_ioctl+0x1060/0x1060 [ 368.469936] do_syscall_64+0x1e8/0x640 [ 368.477692] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 368.477712] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 368.477720] RIP: 0033:0x459db7 17:19:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0xffffffffffffffff, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r3, 0x800442d2, &(0x7f0000000200)={0x5, &(0x7f0000000380)=[{0x0, 0x0, 0x0, @link_local}, {}, {}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @local}]}) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r3, 0x800442d2, &(0x7f00000001c0)={0x6, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @random}, {0x0, 0x0, 0x0, @link_local}]}) r4 = getgid() r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0xffffffffffffffff, r6) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r7, 0x0, 0x19, 0x0, &(0x7f0000000040)) r8 = getpid() sched_setattr(r8, 0x0, 0x0) ioctl$sock_SIOCSPGRP(r7, 0x8902, &(0x7f0000000440)=r8) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000080)={{0x2, r1, r4, r6, 0x0, 0xe0, 0x9}, 0x2, 0xc77, 0x9987}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) ioctl$KVM_GET_MP_STATE(r1, 0x8004ae98, &(0x7f0000000080)) 17:19:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0xffffff67, 0x10000}], 0x0, 0x0) [ 368.477726] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 368.477736] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 368.477744] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 368.521104] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 368.528374] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 368.535632] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:30 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb", 0x2) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) mknodat(r1, &(0x7f00000000c0)='./file0\x00', 0x8000, 0x7) [ 368.631731] audit: type=1804 audit(1572542370.166:93): pid=22022 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir334423083/syzkaller.aOA31u/503/file0" dev="sda1" ino=17906 res=1 17:19:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x10000, 0x80) 17:19:30 executing program 3 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 368.827635] FAULT_INJECTION: forcing a failure. [ 368.827635] name failslab, interval 1, probability 0, space 0, times 0 [ 368.855927] CPU: 1 PID: 22067 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 368.862980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 368.872328] Call Trace: [ 368.874912] dump_stack+0x138/0x197 [ 368.878531] should_fail.cold+0x10f/0x159 [ 368.882668] should_failslab+0xdb/0x130 [ 368.886634] kmem_cache_alloc_node+0x287/0x780 [ 368.891229] __alloc_skb+0x9c/0x500 [ 368.895015] ? skb_scrub_packet+0x4b0/0x4b0 [ 368.899319] ? netlink_has_listeners+0x20a/0x330 [ 368.904062] kobject_uevent_env+0x781/0xc23 [ 368.908372] kobject_uevent+0x20/0x26 [ 368.912155] lo_ioctl+0x11e7/0x1ce0 [ 368.915781] ? loop_probe+0x160/0x160 [ 368.919565] blkdev_ioctl+0x96b/0x1860 [ 368.923439] ? blkpg_ioctl+0x980/0x980 [ 368.927314] ? __might_sleep+0x93/0xb0 [ 368.931184] ? __fget+0x210/0x370 [ 368.934621] block_ioctl+0xde/0x120 [ 368.938229] ? blkdev_fallocate+0x3b0/0x3b0 [ 368.942535] do_vfs_ioctl+0x7ae/0x1060 [ 368.946405] ? selinux_file_mprotect+0x5d0/0x5d0 [ 368.951142] ? lock_downgrade+0x740/0x740 [ 368.955273] ? ioctl_preallocate+0x1c0/0x1c0 [ 368.959662] ? __fget+0x237/0x370 [ 368.963104] ? security_file_ioctl+0x89/0xb0 [ 368.967497] SyS_ioctl+0x8f/0xc0 [ 368.970847] ? do_vfs_ioctl+0x1060/0x1060 [ 368.974981] do_syscall_64+0x1e8/0x640 [ 368.978867] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 368.983698] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 368.988871] RIP: 0033:0x459db7 [ 368.992044] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 368.999735] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 369.006994] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 369.014259] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 17:19:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="c0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001ffff12f60000405f42485266535f4d", 0x44, 0x10000}], 0x0, 0x0) 17:19:30 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(0xffffffffffffffff, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 369.021512] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 369.028770] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:30 executing program 3 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:30 executing program 4: setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x10000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x80000, 0xa, &(0x7f00000017c0)=[{&(0x7f0000000300)="bcb5f8053581a5bed76465da22fedb0c85fd2ddcddbfcc6ef3b983d5fd701a1577db04e091251a4fa7e539289023506c7d8048f65bb045099412d6244ba48ac015f88b683e0b2c3fd4c58a7ca89a8acf7a437b3103fa9eb131dd523a2df842a160c95fa7f1fcd35701840ead1aef6b0e8540c729f8be73e7da7f6e973bec828d1f5c372f6958cadfcc61e4773300fc995263e73425d6fa95a382fa0893d5c453be6a528e68dacf374c3fc74c53232bab643b9c701fed341d0deb349ddd4cdae631b4e14fd7676685e5398fbccf435a1c2dec7558e35f6b23ac3cbe8299b6", 0xde, 0x40}, {&(0x7f0000000400)="cfe2d1934ca62f8e2f82b86e1a78b4c5b0483e2a679e541cf7d421332971402e6f764390980aadfba3d06aad757d558f83d09192151d8ede00db87a7feeb56e588e290bbd44a7bdd69bcfbc07e4a58d5d02fb1f2f1d82ebfe5e3", 0x5a}, {&(0x7f0000000480)="0bfb18746ab5bccbc319c25fd4fadec86f7e5065b33c60a853c7ef100c7838346ec870125f7e317a796cea270d3ba39951623143c67580ef983b39f9961c06686832bed67f97f1f2d83004e3f331f34dbecacf001bd2284e868cfac0789187fe013c880ab68eb091fc38069fbedda92630b6d541aab835caffb489c209c58800695fc412bc0e2c1735400ca26e7327cd208f416704f5490e9a39076be6c6a6a0471746bcc4ef2d8452cec5bdbfcdc7cb234b4969d1e91e60cf0152b4", 0xbc, 0x347c}, {&(0x7f0000000540)="229e2524b9472575241b364ecbf914d43f7aff14aa82ab5e1ee760cb7b58b65f026bea492ca99bfcaceb66d3de7b6da96a5e33a1ae7f3cea65b16bac7e3b85155579013304b0fee2f298946daeb997937881bb1ff7e07ab8b62dd55872648e48e6a581a4cccfd9e72bedf19e6e827993a8557e4d7c4d288b4b7e8a8bc16716e2fd70e13295a9dc259a7a3f56097b0a5806eb649842ee1f70c8134846779ba5a1a39101befdba1743b8dc5476b603f82f115b5ce0f79c9235", 0xb8, 0x7}, {&(0x7f0000000600)="c7ba0bc7dd82817cac6380d8f7fffe3e9b4b746d6f", 0x15, 0x6}, {&(0x7f0000000640)="077467018e", 0x5, 0x101}, {&(0x7f0000000680)="22421fd9928942ebeea55d2d988e05130bea979c8cfc94839c6b7271a10a41b15be9572a4a71f6ead77f75fc20adaa5b5dabf21d0f5331022bef57f709edcf0b5ba5e26532c866e5b173b5db52046bdf7d7fb27a0d099d2c23cc4d1a6344ed32a3dbd24bd2577de976ac2aa545df6e5835282c775bb53a64e22e319c4d6ffd8848c0eb7601428f236d4d7f8f23b561c9bba8c6e8ea5fe250a416fc97d522f8bafc717b63f026fbc50c4265d9840899319593b4c1be37d51b20adc36d3ccde8e04664aef9b4fb4df56a8012ca75f34bb1814c66d5343473a97d4683ee32402b860edc822a65b0055ff644c0749f87e515963eae7696f030747c795063a6ee8610befe0522478f4f15286c41e7bfc9e05e87ab4dd668431b3f24f5451c0b41b535c9e12b4155c2c79437262e7c372a0bab1120fb133977892b2ae322e36f477acbea9f12f6135862cb3c335b3dbeb08d1722a162a7555f4db8b4773075a819cf8f2ac6e883632c6a6c2e7581243e08b5a2ecf0d9695b8b7a1c0e9a6671cabb03898e84f4258c30f4b564f7d9b348ab8ee4e9133b442d6145fb0eb779292b1f614d308f87425693ca408345c57cd4bf88a925a9f0b6e9057b75c7404716d867fb31c503416d5852b057d73fa5a3e7f58415b69fd71288fde1f3760f4de1a45c1e39a31fbbe84ec8ddc827cac2d116bd8baa10999eea4048ad754028da6a51c5216055ec482a81eff71bd815bb3f8217b799590476a0c8e933e116e66afcfe0282bcb2fd6150cf9754769b04ece1ae40ec61742dd15c571c7cd25b15a8aff9e38e8b83081ffa51d5c3fd989a581d1bc23ba9d0f21379f8a2f4d44daa609d1f1afbb059427bf531984b3c5e12a5c803ae2ddb7ac2637580f7b006d8a1e7232f80ba108b431a24da5176529c8396861f7416613580a20379bd321fa4bbeee2a017b7e98acc796e0c9346f66ec492cc2e97ffdecce309954cf3c0ed0dd16028c1c2f22b84f7f5c20e66eef221f2e58df546bf305af27a9c2293b7938508dcf213e57eccd6a115d85518204f40f69f70970526dae26a08a548311882df246297f40e77881c8cfc8e103c0ebab8a6015f72eaf6b7f309ad0761560a17c99b83f80d6bf8fdfd07fe2a9c16de9e6228b1e0ef4ab4030818d396854240d1bc1ff31f22dac6fb3ef657370d5c7c72171c8a4836def924ca327fb6eb82493f76e9feff0ba1d3f9a7d6145a0947b71d418f911f66ff78825ba618e3394cd76f31a32eb00ab9e3f7bca604b938478ce72c071d1e4e3a2ccc308757549b637da135be6606ce993f01004777b55cdb896e52fff9ad922d2ed98aed73cecd594cfa6d9e393ae6fe2629a5b5676dc1b660ee638ff59f317664df1c5d60504e8882fc8c8864af48f8d04db54e1707cc16481b8a5fbb249ea1ca67e011e542399a132f06ba20ca90f853576a69ac5f3913729bc8a4a037567cb89d320c43e5938cb1d6fa00bcdac66d1cbcba3476065a11ade1576e3f6bed9180ae9dd41a86277d0a55adaf0a563c0e835723c301225e620b689c7ff009ddad84d794dce0987fbad2bd9bf186db0d583f4e11135c00a5e29d225432288116c23b2cfe1d77dd443c28cd04ab8b9022e9bb2b80bdf6e87b8dc372741e85dcf0f71b57258d025bd6b419e7fdd5b61602dcc6b0d45082a8295e61163c8edb82c80a4210f314c06f5750b0d619b39d18c88dde871c05e3a4661896aa0d13663de913d9a0ec082be76571bc398f4bb3241feb87f02237813ba2c4db1e80230f83245f5a05ce575191c4ff36edd779415c3b558b5433597ff2d5809181f498864e628fd61f3a74fef852f901806c28cc61f949a83c9527cf514b817ed3c8df8db220859e76ae35d1999912a433ea346153506c5d5650b2ad709e48cd4a4c4c20a15b63e965c12c69495476e5ea8cff16e4185436a063906af1d48e758b649d51f9c5040f3257bf1abe57b0fa67bdd72a36ec0ec03834fc4713f422da8af6b68b7bdad6ecc34354547c2abb5f8092673da7b6b6f2594e7cc50fb852273004871dedf5fb0191e254076d2a739dd8ff3a8ee6239c04eae7086fcab60f6ef165abd3031741103a2e34e91cf13e88c74d3bc370f7cc0a9646f0c2632ef159e940ad6a015f4cb7b877798b1d9f1f6610dde729dd1d64605b4c450cad6c4e6d89ecd026d48a6a2f1542a7284d4c217bff202dd36c4c88b97cd4a1e1c0aeb3e8640f62c7fed85e28c49af5781edace7e0b5b2c8fd6abf0d353c4c63c9eb0e22e2f92a659fff51ad43d6836f5e70ab278d3056c17b099afba54ce6d8ba25dc612ad8e2c366d61d0f269ada775fe7e8664708b21771767e1c0ca67cec575cf059252d5fd4218c76dbd5d0d4f836f91fe78873a010cc88a5d2d10874576b2df3523fcff82701b553b8d86362f1545ca8b10c2228a622b46344a12a43f55ad50c895f20a28bba5a95ec802075ee6b306dfdd729df13bf5edd26c90f8251c64a9b5b1fce6d318b36712242f24494c981748d957bef7c46cde26fc8c08f922b47b0136a29fb869f2e8607453700db464fe1d24863d8ae8ef6168f14b1b254c8f66e2cc8812876bbc802629a585ff8846326aec78afc286e7e95f4e4bfc1c311ae2b5ecfe2f6ab0b33505f6a2aa1657019de6cf05a8d4029555806f0797e828cb679b346c6b8bba794070cef4c8cd65de9c5e467fd55b8e30b6090d87907cf9c17ffd592d5018d3979d05586fff39675f8774397c873750928425c30e10bbbf21b75e49c4d45aa2682c74c3ef3cf18fca29c420b0fb1567896f8bdcf116a020ead33f16745f7384282f5567a1d1bffdac5d4b2f53c9355ea7b36997fdff4f72dad6e16ad328296d15cbda96b0e44ca1472009354363247ace6a596b72ace95804eb3e79dddedce5b968dfb7dfe10f674c2719d935dc2e9f8d8eec4a5c5cdfd76b736d0e8931108dff3071a21f8005413dcdeeaa1ac3d5f862898bbc70964762b7378b532d251ac3e633a117c5c58739d03a49c6cae65848cd17956043e7b7c4c44f0b70bcd5cfa88dff8496b1afc03574ede39b549a3ff80702faeca296a98d149184c356e19d59678edfcea77d099ad48ffe08b45adfee7e8871591c363cd81741b5a3cc23e03645ad58622c4405a2cad42f314e30eb0b3c17e6c8925dc794ec913c71aedd3183c95a61f589988c9f9f7038afa195d68beb0af020cf709734cdb1f09d05500c4d261471c7a54c82bf04d84e69a4d435f1f873f9ea1ef55bfe807d440535c6d43fcf0af7e0a1a1c22e2390fb019b6841072beeb2f25c1e36bcb715bd0be35e98d348ec57ef52bb4293de4b50dfac7b6d057bd19c029a449c69ebf37eea91eddb895f74adbae0b9e2e07aff10e21224ea86a20c302e20bfe73cb4d170eb66824f4b302d8ce9d0509c1cc2e17491ad46bebe0af6f0cfb2d7fb4f9c57b96baddb05fc782d2b9f71a21fefbf7e7efd7318688543c6dc2bcac4ae237d897cfd371f0a9224847f1304328d3e76fe11bb4ca025758cc51d60fa146dd00a65089c9ddaeb654bade5db905fc2a6304ad7bb470a6b623ad267e98506914e1f9cc966ffba686e29f1625f2009d7f6bc41ea6d243ca09fd24bd880d7600ca3766222133dfe779d1d6c36e9270f852628459df4004b2e5daf5be6e9f642c2ac0262a670600fec6a36815654c41b1ce21a024410d518bd4087b28454eea22d1c6abfb52408d5e883d155684de7e7e6e48af428c24db567aaf3b9e01f67ca12e6cbb978eec1ee09a4ef81c30f0f2f263464ceaba6c79421ddd91d78e845b02808902ff0fec3bdd4bdee7c99104fb719391c8a01d32f82d3688503ea9b35b905d6274bd2ab238ddc4eb8e4dea2f052fd7f5ec65046e39067d8aab9e4c2fabcf6528e816ece911b48b374105bcf0fba4ae2beed005c36ddd2f367459988713aedd737b50e2d9de563d3f019a10f668fa065de1da57dc0dfa8e7f79a4a7f965ce1ef3872e5b6900573e64c2bae05c4dd03d678a6947044290ab4b40434c846efa371b764b74cd132cef7b71150708283e1621c3b124705379bd87427a125c45b50e9940aa04960e166e354f87a29a1706132f5b82859f93dc6e0f6cb3f864342e56661cefa5d8822f537b5eb9981c129f83576c7ba145703f53492a2731f2d45ecde4a21d98f0460676ac9310ccba387440653e10f9c7930c34f8f8b7e3355ec21042c9b7493c00b0b33dc32beca5517997fd6382ee5d00d147e5ae912fe61d88eb251ceb1b7c933dc970636a3b51297d8b93302131c144fd953a965e00ea60b0ae6397759ae383cd94a2093e50b2a9029ac56b6b28146056aa699cd446bd314b31eef5a1add9cca72cd6b76ad4eb1239b57ed4a2e3157b67affab6a8ba81a32ae0d3c8042324a2f8e56619adfc5280995d4bc8f20fe563d9508ca1ffad67613d100fee5a112016ea5c4c9d787c12e9c520d2b7f78c5850181382f2d79528aad14d89517cc665871dae44d2db46696c8690eacffc2fba8b67fa4929cd490c484d6fb981d371a24446e2cb5e8f6383b492807e18e31aea7c2a0ef1d4e86fa6dd1a4aec60806177162b495a4f7d8661b3bd1abf9555dc24828b6feedbc51269467fe65384f26f0d3dab103001ef8222e880df380fc75794ceb10b5b47e1fe9663a9f69e92300d7d9e90cc8cf427530c5bf4527713b4b88300ca45e4e0a2e1bc42f6751f72862d50e2353238b786f35bed19411e540a1fd6e04a31c865038a80aa87529d95c18bf4ca069ee1007399b6365146cfb3cdd79101c22f69cfb2251ff15e0cd89cabdbde4ba1085226b2e60651779af1ea36361f1aa569c5f14561d1e108b8a7f103508caf8e7cd64dd323e2f8d848c7e2987108f63258fe982f6fa5539392072634b942e77ae37b6e30c5614a6e6f236ab643d52bf1ce253570dbb938b33bc1282d792900ea6f5e89777276bce039967ee62ff553843aa60e47e1ba800a23279f3b3e6e43d5f6bea873e13508d9d752cf3637df3c90e43a5743d26671b6757145a8b79d9b456dae7c04ac271aa41f34af8c07a089d399c534e76cb1de6c471c2e5ce0b943c4080900dd584335daf3d89260e32e222a2ad0c9e76d10e4c84e5e096f86b314a9ba9532a064b40e361a92ced782d0e26f31254f015dfa66d4b4ee354eb15b5e967438981064ce229c236833b4c03c24e60aa5367d702751836690a3881002c6478c1120d630840b96779d4ad418dbe45f89337ef864d70dd9bc00dc15cd2401eb98729c8471e03eb0df6b09262a2d1c3807856b0b9836ae5a6e5d8d7bd66abf783e6badb183c57e5985e3b8a475d931147d52261ea01d57fa798b03355bb70301d90d8144b14e3110f4e313cef5c9d64e2f107be18039826883592640e87c161f6c42c9bac79708f2248e64609333c79a373286dbbb794155807fc511032dcbc33de942cb49107ee91bdc720a817344a3b2d3de2336aec31c2e78cb016e20d9326a2cc05c0a45a1b3f04e2551044564100502872136c86e04c4bcd2cc452161beec355c921db9fec94bd8a2fdd1b225948b64eb89ccb7c497aba5fe6115a261672ec22c39c95d309291baaac36ef04cf81fe124bb66eb0b6e341d6ec6c8e2d2834089a718be9b2854a97fdea3b6def631455824b1a4634e3b897c06d50465ce149a2e484111f9be495c5893b38af110194e3fa10f8374ce36f186e719312567bdfabb2559f198f590c25c23843e41e96bf0612ce0fa14d1d3282b17dd01dd34b9b98d414152ca97e19bee1f7a16047de444a1b3a574004", 0x1000, 0x59d}, {&(0x7f0000001680)="8b0ba095278697aec0f65e50666a1f6793c312475d92a9200bb17a078d5593b625b57cf684f789a7efdbf02e09ab1bd7cb17092b27c0c173545e6ecfeaf8ac1ce71172358417c7d497438da6ccf050b74111cb953ec1635d57a3583a715862dad9c4233cd0292b8704e06d19f37d", 0x6e, 0x80}, {&(0x7f0000001700), 0x0, 0x80000000}, {&(0x7f0000001740)="d4291896f65112600f2e4f1a7bb4203b88f9b0503257fed32eebe800f05656a69dd68998fc70f61a3bd20d701295bc8c9c09bb868637d14d9ffd0a3c641489c3a7f05d1839f0b45d44c6b0fe51574e0e179b39a20ff72b1a19e71f0a8403d71de9cf5aed128c5b13e215131fa1e053c4f1498e987f125063", 0x78, 0x40}], 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockname$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x412002, 0x0) setsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f0000000200)=0x60, 0x2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000140)={0x5, 0x0, 0x5}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x19, 0x0, &(0x7f0000000040)) getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f0000000240), &(0x7f0000000280)=0xc) [ 369.205426] FAULT_INJECTION: forcing a failure. [ 369.205426] name failslab, interval 1, probability 0, space 0, times 0 [ 369.218800] CPU: 0 PID: 22091 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 369.225848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.235211] Call Trace: [ 369.237821] dump_stack+0x138/0x197 [ 369.241472] should_fail.cold+0x10f/0x159 [ 369.245637] should_failslab+0xdb/0x130 [ 369.249627] kmem_cache_alloc_node_trace+0x280/0x770 [ 369.254742] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 369.260210] __kmalloc_node_track_caller+0x3d/0x80 [ 369.265150] __kmalloc_reserve.isra.0+0x40/0xe0 [ 369.269825] __alloc_skb+0xcf/0x500 [ 369.269835] ? skb_scrub_packet+0x4b0/0x4b0 [ 369.269847] ? netlink_has_listeners+0x20a/0x330 [ 369.277776] kobject_uevent_env+0x781/0xc23 [ 369.277796] kobject_uevent+0x20/0x26 [ 369.290619] lo_ioctl+0x11e7/0x1ce0 [ 369.294240] ? loop_probe+0x160/0x160 [ 369.298021] blkdev_ioctl+0x96b/0x1860 [ 369.301891] ? blkpg_ioctl+0x980/0x980 [ 369.305764] ? __might_sleep+0x93/0xb0 [ 369.309634] ? __fget+0x210/0x370 [ 369.313072] block_ioctl+0xde/0x120 [ 369.316778] ? blkdev_fallocate+0x3b0/0x3b0 [ 369.321113] do_vfs_ioctl+0x7ae/0x1060 [ 369.325032] ? selinux_file_mprotect+0x5d0/0x5d0 [ 369.329775] ? lock_downgrade+0x740/0x740 [ 369.333912] ? ioctl_preallocate+0x1c0/0x1c0 [ 369.338306] ? __fget+0x237/0x370 [ 369.341752] ? security_file_ioctl+0x89/0xb0 [ 369.346159] SyS_ioctl+0x8f/0xc0 [ 369.349512] ? do_vfs_ioctl+0x1060/0x1060 [ 369.353645] do_syscall_64+0x1e8/0x640 [ 369.357523] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 369.362356] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 369.367528] RIP: 0033:0x459db7 [ 369.370713] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 369.378690] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 369.385955] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 369.393210] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 369.400470] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 369.407731] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) 17:19:31 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb", 0x2) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363bc0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5c00, 0x0) r0 = shmget(0x0, 0x1000, 0x318, &(0x7f0000ffd000/0x1000)=nil) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x10000, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r1, 0x10f, 0x86) shmctl$IPC_RMID(r0, 0x0) shmctl$IPC_INFO(r0, 0x3, &(0x7f00000001c0)=""/193) 17:19:31 executing program 3 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:31 executing program 2: 17:19:31 executing program 4: timer_create(0x0, 0x0, &(0x7f0000000040)) timer_create(0x0, 0x0, &(0x7f0000000100)) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='timers\x00') preadv(r0, &(0x7f0000000640)=[{&(0x7f0000000500)=""/172, 0xac}], 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 369.729033] FAULT_INJECTION: forcing a failure. [ 369.729033] name failslab, interval 1, probability 0, space 0, times 0 [ 369.759483] CPU: 0 PID: 22122 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 369.766564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.775927] Call Trace: [ 369.778532] dump_stack+0x138/0x197 [ 369.782180] should_fail.cold+0x10f/0x159 [ 369.786347] should_failslab+0xdb/0x130 [ 369.790336] kmem_cache_alloc_node_trace+0x280/0x770 [ 369.795450] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 369.800906] __kmalloc_node_track_caller+0x3d/0x80 [ 369.800922] __kmalloc_reserve.isra.0+0x40/0xe0 [ 369.800934] __alloc_skb+0xcf/0x500 [ 369.800945] ? skb_scrub_packet+0x4b0/0x4b0 [ 369.800957] ? netlink_has_listeners+0x20a/0x330 [ 369.800971] kobject_uevent_env+0x781/0xc23 17:19:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x19, 0x0, &(0x7f0000000040)) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/relabel\x00', 0x2, 0x0) r1 = dup(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f00000000c0)={0x1bad1ea, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x19, 0x0, &(0x7f0000000040)) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) write$FUSE_NOTIFY_INVAL_ENTRY(r4, &(0x7f0000000600)={0x27, 0x3, 0x0, {0x3, 0x6, 0x0, 'btrfs\x00'}}, 0x27) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000580)={0x0, {0x2, 0x4e22, @empty}, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e20, @rand_addr=0xff}, 0x1e1, 0x0, 0x0, 0x0, 0xff80, &(0x7f0000000540)='nr0\x00', 0x7ff, 0x8, 0x8}) [ 369.800989] kobject_uevent+0x20/0x26 [ 369.801000] lo_ioctl+0x11e7/0x1ce0 [ 369.801013] ? loop_probe+0x160/0x160 [ 369.801028] blkdev_ioctl+0x96b/0x1860 [ 369.810610] ? blkpg_ioctl+0x980/0x980 [ 369.810625] ? __might_sleep+0x93/0xb0 [ 369.810634] ? __fget+0x210/0x370 [ 369.810646] block_ioctl+0xde/0x120 [ 369.810655] ? blkdev_fallocate+0x3b0/0x3b0 [ 369.810665] do_vfs_ioctl+0x7ae/0x1060 [ 369.810675] ? selinux_file_mprotect+0x5d0/0x5d0 [ 369.810689] ? lock_downgrade+0x740/0x740 [ 369.875797] ? ioctl_preallocate+0x1c0/0x1c0 [ 369.875812] ? __fget+0x237/0x370 [ 369.875828] ? security_file_ioctl+0x89/0xb0 [ 369.888077] SyS_ioctl+0x8f/0xc0 [ 369.888088] ? do_vfs_ioctl+0x1060/0x1060 [ 369.888103] do_syscall_64+0x1e8/0x640 [ 369.888114] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 369.904389] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 369.909573] RIP: 0033:0x459db7 [ 369.912757] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 369.920455] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 17:19:31 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 369.927739] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 369.935018] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 369.942278] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 369.949538] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:31 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x30400, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000340)=""/199) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:31 executing program 3 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x19, 0x0, &(0x7f0000000040)) r1 = accept4$inet(r0, &(0x7f00000011c0)={0x2, 0x0, @loopback}, &(0x7f0000001200)=0x10, 0x41c00) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000001240), &(0x7f0000001280)=0x4) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x100800) ioctl$USBDEVFS_BULK(r2, 0xc0185502, &(0x7f00000000c0)={{0xd, 0x1}, 0xf7, 0x4, 0x1000, 0x40, &(0x7f00000001c0)="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"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0xca) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x19, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f00000012c0)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x4e23, @multicast2}, {0x2, 0x4e23, @remote}, 0x140, 0x0, 0x0, 0x0, 0x7, 0x0, 0x9, 0x3ff, 0x9}) [ 370.219314] FAULT_INJECTION: forcing a failure. [ 370.219314] name failslab, interval 1, probability 0, space 0, times 0 [ 370.237438] CPU: 1 PID: 22162 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 370.244515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.253884] Call Trace: [ 370.256504] dump_stack+0x138/0x197 [ 370.260153] should_fail.cold+0x10f/0x159 [ 370.264324] should_failslab+0xdb/0x130 17:19:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r3) [ 370.268316] kmem_cache_alloc_node+0x287/0x780 [ 370.272916] __alloc_skb+0x9c/0x500 [ 370.276608] ? skb_scrub_packet+0x4b0/0x4b0 [ 370.280924] ? netlink_has_listeners+0x20a/0x330 [ 370.285734] kobject_uevent_env+0x781/0xc23 [ 370.290065] kobject_uevent+0x20/0x26 [ 370.293857] lo_ioctl+0x11e7/0x1ce0 [ 370.297473] ? loop_probe+0x160/0x160 [ 370.301261] blkdev_ioctl+0x96b/0x1860 [ 370.305131] ? blkpg_ioctl+0x980/0x980 [ 370.309016] ? __might_sleep+0x93/0xb0 [ 370.312890] ? __fget+0x210/0x370 [ 370.316327] block_ioctl+0xde/0x120 [ 370.319937] ? blkdev_fallocate+0x3b0/0x3b0 [ 370.324287] do_vfs_ioctl+0x7ae/0x1060 [ 370.328156] ? selinux_file_mprotect+0x5d0/0x5d0 [ 370.332910] ? lock_downgrade+0x740/0x740 [ 370.337043] ? ioctl_preallocate+0x1c0/0x1c0 [ 370.341435] ? __fget+0x237/0x370 [ 370.344875] ? security_file_ioctl+0x89/0xb0 [ 370.349264] SyS_ioctl+0x8f/0xc0 [ 370.352613] ? do_vfs_ioctl+0x1060/0x1060 [ 370.356748] do_syscall_64+0x1e8/0x640 [ 370.360617] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 370.365450] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 370.370626] RIP: 0033:0x459db7 [ 370.373796] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 370.381492] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 370.388764] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 370.396033] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 370.403285] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 370.410539] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:31 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96", 0x3) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 370.435260] print_req_error: I/O error, dev loop4, sector 128 17:19:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000100)=0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da41a3ac0ed020000007a00000000fff6f2a20000f60000005f42485241075f4d0000000000000000", 0x29, 0xfffc}], 0x80c800, 0x0) 17:19:32 executing program 3 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 370.614926] FAULT_INJECTION: forcing a failure. [ 370.614926] name failslab, interval 1, probability 0, space 0, times 0 [ 370.631803] CPU: 0 PID: 22196 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 370.638862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.638868] Call Trace: [ 370.638888] dump_stack+0x138/0x197 [ 370.638914] should_fail.cold+0x10f/0x159 [ 370.638929] should_failslab+0xdb/0x130 [ 370.638946] kmem_cache_alloc_node+0x287/0x780 [ 370.658659] __alloc_skb+0x9c/0x500 [ 370.658671] ? skb_scrub_packet+0x4b0/0x4b0 [ 370.658684] ? netlink_has_listeners+0x20a/0x330 [ 370.658699] kobject_uevent_env+0x781/0xc23 [ 370.658715] kobject_uevent+0x20/0x26 [ 370.688127] lo_ioctl+0x11e7/0x1ce0 [ 370.691756] ? loop_probe+0x160/0x160 [ 370.695560] blkdev_ioctl+0x96b/0x1860 [ 370.699439] ? blkpg_ioctl+0x980/0x980 [ 370.703321] ? __might_sleep+0x93/0xb0 [ 370.707193] ? __fget+0x210/0x370 [ 370.710641] block_ioctl+0xde/0x120 [ 370.714271] ? blkdev_fallocate+0x3b0/0x3b0 [ 370.718582] do_vfs_ioctl+0x7ae/0x1060 [ 370.722454] ? selinux_file_mprotect+0x5d0/0x5d0 [ 370.727221] ? lock_downgrade+0x740/0x740 [ 370.731371] ? ioctl_preallocate+0x1c0/0x1c0 [ 370.735772] ? __fget+0x237/0x370 [ 370.739213] ? security_file_ioctl+0x89/0xb0 [ 370.743611] SyS_ioctl+0x8f/0xc0 [ 370.746970] ? do_vfs_ioctl+0x1060/0x1060 [ 370.751124] do_syscall_64+0x1e8/0x640 [ 370.755005] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 370.759949] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 370.765233] RIP: 0033:0x459db7 [ 370.768415] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 370.776116] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 370.783550] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 370.790814] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 370.798080] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 370.800121] net_ratelimit: 23 callbacks suppressed [ 370.800125] protocol 88fb is buggy, dev hsr_slave_0 17:19:32 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x2, &(0x7f00000002c0)=[{&(0x7f00000001c0)="6d8bcd96f43e1c5706b137730969496d601bd53403408d73d720afcc99eebf809f3a0cc5d1f93c599ae4e8b465ebdaf9aeb5ddb6b9baf78431f1388c59a3b6942d4ba27cde8b5cf5ba3721d5812a3de207d629946bee91b54bb1dd", 0x5b, 0x800}, {&(0x7f0000000240)="34ef1ee8b0dd2644b25fe03515b5ed78ad48bdda92019d546c111169c030ac5187938453dcbf54be6c4960e237f53a32859c879aa0b8e566ef4f4a6368cf877ea621cb260993cc567fa5fbfa75a220d82ce377ff7686d73ea40e9f", 0x5b, 0xd00e}], 0x0, 0x0) r0 = shmget$private(0x0, 0x2000, 0x200, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000080)=""/77) [ 370.805337] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 370.822697] protocol 88fb is buggy, dev hsr_slave_1 17:19:32 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_sco(r0, &(0x7f0000000040), 0x8) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f00000000c0)=0x7, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x80000000010000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r1, 0xc040564a, &(0x7f00000002c0)={0x9, 0x0, 0x2003, 0x2, 0x0, 0x0, 0x92, 0x1}) lgetxattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="747275b5653828503762f899333da9716ac49dd7b16673a48c59b754ba5a00"], &(0x7f00000001c0)=""/40, 0x28) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r4, 0x1, &(0x7f0000000240)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) msgctl$MSG_STAT(r4, 0xb, &(0x7f0000000280)=""/28) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x19, 0x0, &(0x7f0000000040)) sendfile(r2, r3, &(0x7f00000000c0), 0x80) 17:19:32 executing program 3 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:32 executing program 0: fstat(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000700)={{{@in6=@loopback, @in=@loopback}}, {{@in=@local}, 0x0, @in=@broadcast}}, &(0x7f0000000840)=0xc4) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f00000000c0)='./file0\x00', 0x400, 0x6, &(0x7f00000005c0)=[{&(0x7f00000001c0), 0x0, 0x8001}, {&(0x7f0000000200)="f4acd03962af36f8f9abb9d4e70e4e7bbfb3574415023170ab7436fcfc38d22ca61a0e488e214a576a7e541bb223ee93cf50a5c09dcef15b01f5c198e723b2085c188b0bf1462470d80d4653417b83dd30c1ea91c8da159ce7fe60f7d8f93c472269964d00bb4352dd774e23d86a11aa2acdbf1a9477e164bba60fbb0350b49f94ecafd199b72908e1f27ca7b34150696ecff097d1e87a35c4988fc8e3e52c2cb311a711978d", 0xa6, 0x400}, {&(0x7f00000002c0)="fd4edc098edef58c1685e5dfed98d7b0792316fd5e694d6ab834e35a38b9c6ddf9d16e4c5bce4d7d08f8d5a031b56ce9ac3d5d597a66d0d8a2e3c44ea0b1c7979cb7973677f24f7e3432330eaf21de0eb9cb13aa67fcc959782c42a11a286616007d4a8b22e8dfadcc2af995df97e4ea2e6ef747b0eaccafdf365d9200743355f5ea81", 0x83, 0x5}, {&(0x7f0000000380)="7bb8e6276aa35283d914fc2896207451b462a91bd2df6c597818533d3e8b5b05d79b94e34fea24d6bd91f02b72c6705c0f2167ec3466c714b85dd46958c2f58a5181b76d45cb2c7f5ed000a7084e0213883ffd7b83efeeab5abea80ef2520df1965867", 0x63, 0xfffffffffffffff9}, {&(0x7f0000000400)="8f56196c6d51f1327f771278ce30f0336e8c48362217f6360f68005927e348f81f93403df3423291ba2549c0bb7f4aed7d52fe47de7896ba18eedb93e6491b9519a8df7ea64c42b1431f2d19588fe4ecffbaac97f6a130980094ff8cd6ea1cd3fe8def361a99225efa8546de404abacb3223d3ec4583c1471622dbb92156766f9ae75634a4699ea37e5e7b38e69d3430cfd160a4003868321a408738b6bac41ab37e60b9eab9aab3d455", 0xaa}, {&(0x7f00000004c0)="28e0111a261d83d60978d31829b17a0273378406bfac82a331cba9d82e01a6f25ce372e4920b1d9fbf600ce22201ecf5b4af2c73de6c33db5cd99b7d251f6ece99634ff7d42026212e8c4b073665b0ee33632a1b38e999e2058a20c731b75185a5f2016ace48ca2bbbbe35e1647df1eeb2df25ae703bcfa120122b27e7fddc6f01f7fbe303fe35e26ec4deac6a51e3a5a75ae03a5a204afb69574a62d7e1ed7d93dea417351525976f4be02b00a17b7afebbee0c0272b69184914d69e079fac88ba3751bf987ba36abff6af43da824199cdc07d09fbb7a", 0xd7, 0x8}], 0x4400, &(0x7f0000000880)={[{@hash_r5='hash=r5'}, {@hash_tea='hash=taa'}, {@notail='notail'}, {@barrier_flush='barrier=flush'}, {@jqfmt_vfsv0='jqfmt=vfsv0'}, {@balloc_test4='block-allocator=test4'}], [{@fowner_gt={'fowner>', 0xee01}}, {@measure='measure'}, {@uid_eq={'uid', 0x3d, r0}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'usrjquota'}}, {@dont_measure='dont_measure'}, {@dont_measure='dont_measure'}, {@obj_type={'obj_type'}}]}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x1c0, 0x0) write$selinux_access(r2, &(0x7f0000000100)={'system_u:object_r:ssh_keygen_exec_t:s0', 0x20, '/usr/sbin/cupsd', 0x20, 0x1}, 0x4c) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) unlink(&(0x7f0000000040)='./file0\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$rxrpc(r4, &(0x7f0000000800)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e23, 0x3, @mcast1, 0xfffffffb}}, 0x24) [ 371.148552] FAULT_INJECTION: forcing a failure. [ 371.148552] name failslab, interval 1, probability 0, space 0, times 0 [ 371.164705] CPU: 0 PID: 22232 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 371.171920] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.171926] Call Trace: [ 371.171946] dump_stack+0x138/0x197 [ 371.171966] should_fail.cold+0x10f/0x159 [ 371.171981] should_failslab+0xdb/0x130 [ 371.171995] kmem_cache_alloc_node+0x287/0x780 [ 371.172010] __alloc_skb+0x9c/0x500 [ 371.172018] ? skb_scrub_packet+0x4b0/0x4b0 [ 371.172029] ? netlink_has_listeners+0x20a/0x330 [ 371.172041] kobject_uevent_env+0x781/0xc23 [ 371.172059] kobject_uevent+0x20/0x26 [ 371.172069] lo_ioctl+0x11e7/0x1ce0 [ 371.172083] ? loop_probe+0x160/0x160 [ 371.172093] blkdev_ioctl+0x96b/0x1860 [ 371.172102] ? blkpg_ioctl+0x980/0x980 [ 371.172117] ? __might_sleep+0x93/0xb0 [ 371.172124] ? __fget+0x210/0x370 [ 371.172136] block_ioctl+0xde/0x120 [ 371.172145] ? blkdev_fallocate+0x3b0/0x3b0 [ 371.172154] do_vfs_ioctl+0x7ae/0x1060 [ 371.172163] ? selinux_file_mprotect+0x5d0/0x5d0 [ 371.172172] ? lock_downgrade+0x740/0x740 [ 371.172182] ? ioctl_preallocate+0x1c0/0x1c0 [ 371.172192] ? __fget+0x237/0x370 [ 371.172206] ? security_file_ioctl+0x89/0xb0 [ 371.279006] SyS_ioctl+0x8f/0xc0 [ 371.282359] ? do_vfs_ioctl+0x1060/0x1060 [ 371.286511] do_syscall_64+0x1e8/0x640 [ 371.290383] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 371.295213] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 371.300383] RIP: 0033:0x459db7 [ 371.303556] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 371.311249] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 371.318509] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 371.325768] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 371.333021] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 371.340273] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:32 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96", 0x3) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x22100, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x19, 0x0, &(0x7f0000000040)) getresuid(&(0x7f0000000200), &(0x7f0000000240)=0x0, &(0x7f0000000280)) r3 = geteuid() mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x200000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@posixacl='posixacl'}, {@access_any='access=any'}, {@cachetag={'cachetag', 0x3d, '-ppp0%'}}, {@access_client='access=client'}, {@afid={'afid', 0x3d, 0x2786ed0b}}, {@access_uid={'access', 0x3d, r2}}, {@mmap='mmap'}], [{@func={'func', 0x3d, 'FILE_MMAP'}}, {@uid_lt={'uid<', r3}}, {@dont_hash='dont_hash'}]}}) r4 = add_key(&(0x7f0000000440)='.request_key_auth\x00', &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) add_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r4) [ 371.401422] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "hash=r5" 17:19:33 executing program 3 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:33 executing program 2: ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 371.509548] REISERFS warning (device loop0): super-6502 reiserfs_getopt: unknown mount option "hash=r5" [ 371.575594] FAULT_INJECTION: forcing a failure. [ 371.575594] name failslab, interval 1, probability 0, space 0, times 0 [ 371.587816] CPU: 1 PID: 22266 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 371.594885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.604313] Call Trace: [ 371.606896] dump_stack+0x138/0x197 [ 371.610519] should_fail.cold+0x10f/0x159 [ 371.614672] should_failslab+0xdb/0x130 [ 371.618637] kmem_cache_alloc_node_trace+0x280/0x770 [ 371.623749] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 371.629197] __kmalloc_node_track_caller+0x3d/0x80 [ 371.634117] __kmalloc_reserve.isra.0+0x40/0xe0 [ 371.638792] __alloc_skb+0xcf/0x500 [ 371.642424] ? skb_scrub_packet+0x4b0/0x4b0 [ 371.646737] ? netlink_has_listeners+0x20a/0x330 [ 371.651478] kobject_uevent_env+0x781/0xc23 [ 371.655841] kobject_uevent+0x20/0x26 [ 371.659628] lo_ioctl+0x11e7/0x1ce0 [ 371.663242] ? loop_probe+0x160/0x160 [ 371.667033] blkdev_ioctl+0x96b/0x1860 [ 371.670910] ? blkpg_ioctl+0x980/0x980 [ 371.674795] ? __might_sleep+0x93/0xb0 [ 371.678675] ? __fget+0x210/0x370 [ 371.682172] block_ioctl+0xde/0x120 [ 371.685781] ? blkdev_fallocate+0x3b0/0x3b0 [ 371.690087] do_vfs_ioctl+0x7ae/0x1060 [ 371.694012] ? selinux_file_mprotect+0x5d0/0x5d0 [ 371.698809] ? lock_downgrade+0x740/0x740 [ 371.702944] ? ioctl_preallocate+0x1c0/0x1c0 [ 371.707340] ? __fget+0x237/0x370 [ 371.710816] ? security_file_ioctl+0x89/0xb0 [ 371.715228] SyS_ioctl+0x8f/0xc0 [ 371.718625] ? do_vfs_ioctl+0x1060/0x1060 [ 371.722779] do_syscall_64+0x1e8/0x640 [ 371.726656] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 371.731532] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 371.736708] RIP: 0033:0x459db7 [ 371.740021] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 371.747727] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 371.755032] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 371.762283] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 371.769577] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 371.776971] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 371.785799] protocol 88fb is buggy, dev hsr_slave_0 [ 371.790924] protocol 88fb is buggy, dev hsr_slave_1 [ 371.791488] protocol 88fb is buggy, dev hsr_slave_0 [ 371.796034] protocol 88fb is buggy, dev hsr_slave_0 [ 371.801037] protocol 88fb is buggy, dev hsr_slave_1 [ 371.806075] protocol 88fb is buggy, dev hsr_slave_1 [ 371.811114] protocol 88fb is buggy, dev hsr_slave_0 [ 371.821163] protocol 88fb is buggy, dev hsr_slave_1 17:19:33 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:33 executing program 3 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:33 executing program 4: prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0xde080, 0x0) [ 372.105954] FAULT_INJECTION: forcing a failure. [ 372.105954] name failslab, interval 1, probability 0, space 0, times 0 [ 372.144783] CPU: 1 PID: 22291 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 372.151848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.161235] Call Trace: [ 372.163842] dump_stack+0x138/0x197 [ 372.167515] should_fail.cold+0x10f/0x159 [ 372.171687] should_failslab+0xdb/0x130 [ 372.175686] kmem_cache_alloc_node+0x287/0x780 [ 372.180286] __alloc_skb+0x9c/0x500 [ 372.183924] ? skb_scrub_packet+0x4b0/0x4b0 [ 372.188260] ? netlink_has_listeners+0x20a/0x330 [ 372.193027] kobject_uevent_env+0x781/0xc23 [ 372.197366] kobject_uevent+0x20/0x26 [ 372.201177] lo_ioctl+0x11e7/0x1ce0 17:19:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ustat(0x2, &(0x7f00000003c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0xffffffffffffffff, r1) setxattr$security_selinux(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='security.selinux\x00', &(0x7f0000000380)='system_u:object_r:chkpwd_exec_t:s0\x00', 0x23, 0x3) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f0000000240)=[{&(0x7f00000001c0)="96e0081e75f476a7419d06ff0645de873105d11a37e076b35240047a3f607961a15b3633f4e44b8f3421856b6e43fe55dcc4a7cbbd092cecfc7bee7c09b8a6822bc99e52f215d7e624513427368a0bd72bdb", 0x52, 0xfffffffffffffffd}], 0x48840, &(0x7f0000000400)=ANY=[@ANYBLOB='jqfmt=vfsold,tails=on,smackfshat=btrfs\x00,euid<', @ANYRESDEC=r1, @ANYBLOB="0300d66e77e74ca1a8090000003d0a339f00000059e5e20700002fec70a34293826408e3452987671b"]) r2 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x20082) ioctl$VIDIOC_S_AUDOUT(r2, 0x40345632, &(0x7f0000000480)={0x9, "c070bbcfbdcf5a07da63afcf8b0056fd5e046e91d54950073c7c2361d6f41444", 0x2, 0x2}) [ 372.204842] ? loop_probe+0x160/0x160 [ 372.208649] blkdev_ioctl+0x96b/0x1860 [ 372.212546] ? blkpg_ioctl+0x980/0x980 [ 372.216440] ? __might_sleep+0x93/0xb0 [ 372.220335] ? __fget+0x210/0x370 [ 372.223796] block_ioctl+0xde/0x120 [ 372.227425] ? blkdev_fallocate+0x3b0/0x3b0 [ 372.231748] do_vfs_ioctl+0x7ae/0x1060 [ 372.235638] ? selinux_file_mprotect+0x5d0/0x5d0 [ 372.240399] ? lock_downgrade+0x740/0x740 [ 372.244548] ? ioctl_preallocate+0x1c0/0x1c0 [ 372.248959] ? __fget+0x237/0x370 [ 372.252420] ? security_file_ioctl+0x89/0xb0 [ 372.256856] SyS_ioctl+0x8f/0xc0 [ 372.260226] ? do_vfs_ioctl+0x1060/0x1060 [ 372.264391] do_syscall_64+0x1e8/0x640 [ 372.268280] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 372.273125] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 372.278309] RIP: 0033:0x459db7 [ 372.281501] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 372.289214] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459db7 [ 372.296480] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 372.303749] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 372.311103] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 372.318377] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:33 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96", 0x3) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:33 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={r0, 0x28, &(0x7f00000004c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000180)={r1}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r1, 0xd6, 0x8}, 0xc) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x3, 0x0) ioctl$RTC_VL_READ(r2, 0x80047013, &(0x7f00000000c0)) r3 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000280)=""/131) r6 = dup(r3) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) getsockopt$inet6_tcp_int(r6, 0x6, 0x22, &(0x7f00000001c0), &(0x7f0000000200)=0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:34 executing program 3 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x10000, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x3c, r2, 0x3, 0x0, 0x0, {}, [{{{{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}}]}, 0x3c}}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)=ANY=[@ANYBLOB="54010000", @ANYRES16=r2, @ANYBLOB="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"], 0x154}, 0x1, 0x0, 0x0, 0x2000}, 0x800) 17:19:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@loopback}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f00000000c0)=0xe8) [ 372.697256] FAULT_INJECTION: forcing a failure. [ 372.697256] name failslab, interval 1, probability 0, space 0, times 0 [ 372.758910] CPU: 0 PID: 22323 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 372.765972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.775337] Call Trace: [ 372.777936] dump_stack+0x138/0x197 [ 372.781582] should_fail.cold+0x10f/0x159 [ 372.785743] should_failslab+0xdb/0x130 [ 372.789729] kmem_cache_alloc+0x2d7/0x780 [ 372.793926] ? selinux_file_mprotect+0x5d0/0x5d0 [ 372.798677] ? lock_downgrade+0x740/0x740 [ 372.802825] ? ioctl_preallocate+0x1c0/0x1c0 [ 372.802838] getname_flags+0xcb/0x580 [ 372.802852] SyS_mkdir+0x7e/0x200 [ 372.802863] ? SyS_mkdirat+0x210/0x210 [ 372.802874] ? do_syscall_64+0x53/0x640 [ 372.802885] ? SyS_mkdirat+0x210/0x210 [ 372.802896] do_syscall_64+0x1e8/0x640 [ 372.802903] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 372.802918] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 372.802926] RIP: 0033:0x459367 [ 372.802931] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 372.802941] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459367 17:19:34 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:34 executing program 3 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 372.802945] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 372.802950] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 372.802955] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 372.802960] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 372.962907] FAULT_INJECTION: forcing a failure. [ 372.962907] name failslab, interval 1, probability 0, space 0, times 0 [ 372.976434] CPU: 0 PID: 22352 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 372.983482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.992858] Call Trace: [ 372.992897] dump_stack+0x138/0x197 [ 372.992916] should_fail.cold+0x10f/0x159 [ 372.992933] should_failslab+0xdb/0x130 [ 372.992947] kmem_cache_alloc+0x2d7/0x780 [ 372.992956] ? __d_lookup+0x3a2/0x670 [ 372.992966] ? mark_held_locks+0xb1/0x100 [ 372.992980] ? d_lookup+0xe5/0x240 [ 372.999201] __d_alloc+0x2d/0x9f0 [ 372.999217] d_alloc+0x4d/0x270 [ 372.999233] __lookup_hash+0x58/0x180 [ 372.999245] filename_create+0x16c/0x430 [ 372.999257] ? kern_path_mountpoint+0x40/0x40 [ 372.999271] SyS_mkdir+0x92/0x200 [ 373.045437] ? SyS_mkdirat+0x210/0x210 [ 373.049433] ? do_syscall_64+0x53/0x640 [ 373.053404] ? SyS_mkdirat+0x210/0x210 [ 373.057287] do_syscall_64+0x1e8/0x640 [ 373.061169] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 373.066128] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 373.071330] RIP: 0033:0x459367 [ 373.074513] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 373.082212] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459367 [ 373.089476] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 373.096856] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 373.104127] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 17:19:34 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x38, 0x4c000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x5e, 0xef, &(0x7f00000001c0)="c56e7e03b9199168f9d22f1da0ea5635461afaf2b175498fd099107a18d9c1dfa4e2e6fcb45da4d5f1a49e24cd09460318d7471783d54e3699ce5fc91865ead5a4fd286b7ae18b5a69cc668580142c7c5b5c5b31a7f27e58fdf3bfa50b90", &(0x7f0000000240)=""/239, 0x0, 0x0, 0x76, 0xbc, &(0x7f0000000340)="63f51e1822e37890fb98ee5946c4610ade308d13c91c0bd713f5cb21a0c1b145973c46e17b3b3da8ca729d38f90c8779fc91c80384aea9398a607503e70acb3a61b998bd5056b0954bf71b5b46fa3607fbc4d45e6fae14b8e73c3fde513af47d273572ff7e52a34ce6c6625d8f7a9783cb16425a8af4", &(0x7f00000003c0)="569fcdfbcf8593763e7d325ea857d45415a4e758d7e50d32878b504a7ee38caedb04877ae02edad276bf15a14e0d8bf04035b555279e448cd1bd04b6fde42586eb248b4c62a59c251f45bfafaafd2245f086b48656fd6fdc8cab400b7e9bfcc1fe9e723253aa5023429fb70c65d2578ae63af0ec7e5f8f7c9055fbb12712c8003b3b3ce14fe6b68c8f87a46666f0b3534d3f884cb5978fabdcf4874f94cf586bbf9c918195a555cc071487d29b54bc9976eb0f1ffee1dbb45c48685f"}, 0x40) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 373.111398] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:34 executing program 3 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:34 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(0xffffffffffffffff, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 373.297843] FAULT_INJECTION: forcing a failure. [ 373.297843] name failslab, interval 1, probability 0, space 0, times 0 [ 373.316878] CPU: 1 PID: 22373 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 373.323942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.333305] Call Trace: [ 373.335884] dump_stack+0x138/0x197 [ 373.339530] should_fail.cold+0x10f/0x159 [ 373.343666] should_failslab+0xdb/0x130 [ 373.347637] kmem_cache_alloc+0x2d7/0x780 [ 373.351772] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 373.357222] ? ext4_sync_fs+0x800/0x800 [ 373.361182] ext4_alloc_inode+0x1d/0x610 [ 373.365229] alloc_inode+0x64/0x180 [ 373.368844] new_inode_pseudo+0x19/0xf0 [ 373.372805] new_inode+0x1f/0x40 [ 373.376158] __ext4_new_inode+0x32c/0x4860 [ 373.380474] ? avc_has_perm+0x2df/0x4b0 [ 373.384438] ? ext4_free_inode+0x1210/0x1210 [ 373.388849] ? dquot_get_next_dqblk+0x160/0x160 [ 373.393521] ext4_mkdir+0x331/0xc20 [ 373.397140] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 373.401810] ? security_inode_mkdir+0xd0/0x110 [ 373.406390] vfs_mkdir+0x3ca/0x610 [ 373.409916] SyS_mkdir+0x1b7/0x200 [ 373.413439] ? SyS_mkdirat+0x210/0x210 [ 373.417321] ? do_syscall_64+0x53/0x640 [ 373.421293] ? SyS_mkdirat+0x210/0x210 [ 373.425184] do_syscall_64+0x1e8/0x640 [ 373.429055] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 373.433885] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 373.439073] RIP: 0033:0x459367 17:19:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x80000001}], 0x309813, 0x0) r0 = add_key(0x0, &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) ioctl$VIDIOC_DECODER_CMD(r2, 0xc0485660, &(0x7f0000000200)={0x5, 0x2, @raw_data=[0x2, 0x5, 0x5c, 0x401, 0x1, 0x1, 0x8, 0x81, 0x10001, 0x2, 0x8, 0x1ff, 0x80000000, 0x20, 0x8, 0xfffffffb]}) keyctl$update(0x2, r0, &(0x7f00000000c0), 0x0) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000040)='syzkaller\x00', &(0x7f0000000140)='btrfs\x00') [ 373.442247] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 373.449940] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459367 [ 373.457222] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 373.464493] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 373.471756] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 373.479022] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:35 executing program 3 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0xffffffffffffffff, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0xffffffffffffffff, r3) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f0000002300)={0x8}) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x2, 0x2, &(0x7f00000021c0)=[{&(0x7f00000001c0)="f946dcdb0d9a4bb5590f57009189bcdbe4d96e7de81d0cfa316c7f7588e8030b16857ece90dbce40197fa8069bd22df9ceded9fbd79d10b534d981face87bb155e7604b716ccc37bee39304a07275f0ffd40282b29d1881c18c5ca0a53efcc62fcb707b17ea73b2ba2165c856acb75c7bc4e59c64340142bf01f7af1aab684bdeff7b67bda66b38d889b67814223b8f7a201a2a9f475557ffbd71efbe06b4256dce9b34516e61305f6c4539759d65be12f7a0833283783cc81dec065819d25d1ed9279fbb1d12abee528cba39d9ed7113eeb1320eb83e04a10ca69645876da5f54a6f87b472b2d9b579399ff58d3a4092b9f93d1275530aab595e5a97968318a2c769337f8832a95658a7df89834a9d8bc1abe2b9500c889df47616691af8cbd54175579a852f7249f7c729a7d75d374246670fbfbc74c0598fe99d2807794ff1e00e63b7bee5138abee87a42c142511f5da40be7662c624b3e81233348c808ee8b19fc749b3a69bc2e47effd9cc625c2bc5cd4a3e89f5aa8a217dcc73e2635872e96bdc44ed4b1e5a649d5cbe02e6458452d1effe7e4f7500a420219d48f0282a664aebef5155a7983c88b573133b41d96ac4a4d588dd2c777a38c78e9c8b029349f12e111b250a9b5abefc499539d4016423cae6a5ade33d7594e7623b1b3fdf18ac9b9026acef1d7bbf0e191da738af93944eec66a75cd1becece90403f882ab8729bb678f0b678a381f9e0ddb0862444009528f766d508cf89d670bc8483783c1872d3e32ae51ea292bca7c8af4ee92a0879395f6cd5314dc4873d7ff6d87fa861cb5f16ea8bf10d1154c5cd891d626f15748e04ecfb90738d15410a091f57d2b64e59c2171f330ae8a4bcf0686567562e88e455add808415906e7ddd879e2a9935d260dc90e293228189fa1dc31364be4427954a27ff8db5e6be47a1845bc880ae8bbc2f93daf31ee2848fd58ee68539273bd776d6d6c6347dba53f7637f8e11b424b10b48042d400a39304644851ec10346f2547152a164b68b3ce5328ccb7dffe309932367fa4f7d60a1b33bd4181c1a111e5a6a7c63c76a0795c74832162d9aa34006b9e20255527a5eb226e0232eb9ad2394571943808029606af9d189d40b16753b64bfed373277448cdc26f8b5d04f6b42e3baf8807ea32812703f4e1a550a566fbc469cb4d1d5be2882278127989218fc19f21d7b78bbdf658b694f6a60df7b89951850d6c2649ebe3c63916fe4b4f214cf76694717a5448aebc7cbcd0d7dadb794d547adbd77cba51fcdf52a48f257212620dc305a88f34a1fa311c876030cb8c4e6e7f808b7f098b0e20fd47814a81e6ac25c26422b5c88b41a0081adb2663132f52eb6221a7079ca1fdc62b5acc40bb3ea2bfa07486f65cd631bcc85422bb44a17ac7730a6b9914d87b9ea6de7c7f0f33da9fc5951ffb435e248c6db1f2668d3ee44ef2eab3b59d4eede506ae33122de31859ede4c331eeb5b8f461fcb6f743e0cb52355298d0dbb0013c6827571536f3c192bad6638f88addb1b26ed2aa2a34cb66e972008d9b9d697892f92b64cc3cc823899dd5e9a6ab3daebad300111463943a2d097686d7d7cfb948ccf055e8ea1210fe3dde2cd6f5b025188d22e7a076a9af8501842039798e78536093747b1ab9a190219567393d0a5401e03a610fe046f1e18ca7619520469469116641dc61cc2fc94c1968928e2e1d64ba04362a019b70e6620131d2ef397cf91fe30d43b1b70acf249fe80807e4b90245267964fe571cad840156228932116fe42a8c43b3c7dd933578483dfd060858662a075bdbf64c9c80d9277eaacb1b6002a295fd4f9a12c2a972a2aec952f092851bfe7936fb719fd80e827793fa2c829d122fd0d6df717bbe820ebf9a768e13a99c1894bb597b869c4f1964dc92f9cbc38d3d0496a882d0e107c7d5dda397033649322ebe3f2d75f3ec981096de6c58680694683db724ca5679e180b961a3b46f322bbaa8d7495365825b08fdee660557f865cb5b6f3a2e3839a6a078b798dd5db70320c1b76e7365dfbdf950ce31fca409367b020db26a9d5c1cecfe7fa105488cffd6f4b292f22deac795062f9df219ac28f5a06ae2888ba68c2daabb067a76cdaaa2190964c836e044f7c60d1f01f49c57af85ca976736875b75c59afa9772f0d3513a9bcfd64b3611092ffcda807d0e38622e381c8eb7dd61eb88ab5cb91268e3c8e26e5044dd19fc6cce95c5b64f4927a25352f588d837745feaafc6a1d4b8c679f88356a21268135c474450fbfb718d0bd26555d4d88c034f572569c4eaf9f600f2eb87b18c2c51acb4ac03f1f6777c006043de0bb236fb836c16248c23c78ac274f2ea79e3e3779c80cd282639d0858ae6b202e6b99e8ad5d6bfa0d4d80212aa86c258ac2eb5c53409e15a9208c2833ff8e530fc595f866926ff7904fcb52d9a0f3c2acbe12433e4bcb7b86df59e75d9f905a0d0c05ab1bd553b482b15014c9faf4ffff41cbbe005ac130e771deb48b55bca99865dae1982022a1f0f3c55ac47e687bc141e981c7bbc5a040bfdc4dd452d5a550bffa3d8af373d519494b3383a0daf1e8e8ff9a0412505a46cac2fbc957ffd2d74e4b512045177a80aecb8be16096000799a2e69fd820c1faacc610c8a31d6168c2a6aa610524facc71602cd69021ef1d6be000aae0a62856c7770e735ab15ae31242edb2affb54e891de4e0a30be1d3b60a44be8f8d98a8c19e53a851a1e66e990bf2a312131ee0d1b2427540e462489f35c3035778d08b74620516b95319a349b3f69b92e7a0f480db3af1417f266b34e8f1601d379357d10b811d5b4133f68135c2a4ed56507c27a011591eb1326916531b63bfabcb30a0138adca7fed96e282db35c58bd44f05c3e110c0a6cba4e0f660b977a503416b30872d0ae4598e249702b851aeb6d6f5c98edabc1f7b04c82f6b748decec53f7b30bdb8d8a4e027aa351c274afc2b801b3a46c1d5aed4b5646539bce8117079aca7346833e090c73700e5942f988c9382abafb2371601bc61c24b63d60d3cd029d54e74fba12e9db9b41feb8349572ba7d55b39d9a3fb5a7b4b209b99c0b56b8dd235973406016aabed8ea4a93f443a8d8a64cd90d4f89881012f4eea56740aec434f5e47a63a37212b39025a7cd295666e58061994eacb2f7615a3404efb92eb08574b51855d222d7be474dc236c1f8ba88653924e3badea64bd6f35ba7e76a60825ac4fd0b42912b4ede14a6f4c9008a22635536a57859cedf2f7664a07d6f92ec15104efadb6976eec74ce69c9391378261cefea6054d37da41031c2a3cb54eb1ec794d7a8911ceda874ae1a16e0547c8d5d582894d434561511c36e0a929df672fc1d90486b03128ecbbf12208fb602437c4ebb9ca4e5df1d615089ac98814778f4ef917b1dac159aeaab136ec164dd0d88729abfad2db354610088fdb3c7c781f0a9c6d1704f306d24ed1178c04846805b90a4068af4da577c26a54eff06ee86ef0f76fb84c2fba73fa13a033b20ef10b85066a810f52125e70ccd023f1cd7459da12f331bff4e413092f59d84a0dfe90a573359033c622a63f264dc2dbddf40e7f588acc4b9dd07cf7244ab5038e88d6680b229536ed5c8356a1afab0f21dc8df887d0d9139937985ef074e98b2341002c02b5ae29f98cf09ac61b1aa449485816e13d0f19aa6229166824edb7b76442d78c730bef428416810694ab6f3df49255c3196cd01f7a27ddf185e56c0bf027d68d7de57c11ea9f91be328e39838d2e1b1e7ade6250164385cbde8f9317ee34afc9fee0e04535e79b96042da022285d62d52c269d249daaf6d3c0908fe0e89579f8e8c45e578ed55366d9b15678caec43c317b4d8bea7e8714b338c19ab6a0ce0501235d470e5f8d3cde0a2d006f540c597f0461c5151cb93063e8aa0468111f419c89be671fd9eaf158611b66e6772d0058ae04f0bb06c3a346af59a822ace1ccfe213dc5d92be225e65f87937836d51ccae94a7e97d822b23ca0511f5a13d27463382d074f36c9d4da9a29a1198f61881d5d785e741dab2d18714d52dae827cf99c1cb565805585be508e4e39112840e2cf04373d2198bd75cf953692a14ac9fa3b733aaf4ef08b7e6ef57758200076d168e75b6bd837862e52c3c5bce45b2dc224c7153d921960af0894dd4403678129530faebbcd80c83c05097568f7fee0ec23706bff76bae1d67dea70f610aa6f7e7e99f5864349c6766ed4127ab08fd7fc8d6512ca94bcf00b14bca0913ab806f801ecf62e1f90a909b9f6f0a0de7d697092c221529762d422e17b0719668cae6131cc8eed444c6fc7a18b961e73217c116d3a2df48373d78e235a6482f11ac58b872e4297d08cd1c39117066a430973bc4dbee7ba48ee4efc47bcd3854f7b501a77f377b487fd9cf626f4b098a13d6a4e11089da78e8000009363f2c93b2eda07c5e7b986e2787acf73541dd6107a33627805f293c177396c20dfb6122099d19ad34e0d7248ade1ff68fa18b9594c032b7f92e1e75b73fda148f60d0e14fa3d6bd23e727766a982849dbf4b4287dbf4f535425132d14e865ce875476afb4dc1f958f38fe62654ab66bce9f5601ee737ec63fbabe025d408f904a757a0a9ccad52daefb6280d1a87cf9aa7d48fc5e98204d8e1322c15bb26ad37591918fe4153959730e6bffd8e3695b2705cf0aee08496258f241dc298b34878f703600bb6e493c646f8d4dcf4bf0b1b3d06ce8fd26bd7c05c9f288fa359b266621efcab08a063026a0f3986dbf48d86e7035497439518b65d64755237132308dc62180a7243f42e60144e14c9b46af62de51c9857fdbc1aa2444b4404d7dfc7ed8ca0446246e2f61fee7015ed9b047232d5585047e0051da4c300dfe5fa8aa2020bb0b072ced803047a22c10e4485b61e24bc9090f3d98788a3f3cdec67d313ebf95d6bc7bec3f96c8073ca8fc456f21e07e8b4c547fd6d92a3ded7b1d21a5b3442156195b9a0d4be668317ab035abdca633bfcd68fd21af02c48416ec98f6478ebd8f64713d613869cffacddf72bb7acc21017df2d7606022f5d79de65b37f22676d9a1e5e03301a156867890e211d8a72b3efe2b372f8d8108d90cdffd3c7bcce408795ca6cc3b68bbeb838ad13a85602fd791479322624bda69c5afdd6088e0169e145a5c7e5454aa9c2c2feb5ae9efbd6398683b12e5c5597c2eb58d8c55ab0d7375de385eb5c3914d816c869f7ce58cfaab81f93a0deda375e63e9e2c045b725d4a06257f894584bfe7cdc217f539badee1ac0e0e1a0ac09a2c20fd7e8a8e85fea6b97b8c0400e856b48bcdb2730c20ad79f2a36c8ebff41eb04fce536a8312781865f1b4c7a05eb8bb8b13b1574ed9b6264c13832b5a6c2f7154d4c51cad87836394161108c6793f1c4f3674fafba73b3ea3c481965b86e4e323ae0a1fe16bd5ed8d9856a95e955b12545219d75838554d20bc1fedbfa3b3c6f8213c9752b1b7f9d358d62af001ea7189d997b9c4b942a0a99a24ef5e3a079dee6e46dc26f013eccaa10620de3ba35d2efb047647eb04965dcca5609620d41750b77adb2ff068d1e1a49f72730318b81f67315cb2940a9a234a3e28a84c9b832c82ecb15ca03d74a1b21feb017601253f16fcac39a4f6869b918b55d0aab82119fe5fde26ba51f320fef41f5efc0d2572d0505cec480b7e828b15b048c538a422884c8b3d1066c1d822156b75c152e87086e170b00816f618b7cbf0f7ae4d18643533e21259e0d303dc43dadd768d13c9a046a", 0x1000, 0x6}, {&(0x7f00000011c0)="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", 0x1000, 0x3ff}], 0x4, &(0x7f0000002200)=ANY=[@ANYBLOB='noextent_cache,appraise_type=imasig,uid=', @ANYRESDEC=r1, @ANYBLOB=',subj_type=btrfs\x00,obj_type=,smackfshat=btrfs\x00,appraise_type=imasig,obj_type=^,obj_role=*+,euid>', @ANYRESDEC=r3, @ANYBLOB="2c736d61636b667374f3696e736d75010000007472287300302d"]) 17:19:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000340)=[{&(0x7f00000001c0)="da09296b810fe594cfffd9d092cb53114a74513092b314dbcb2fb0ffd8f044e53b9f7acf26dacb27353073ce6c7f8f6e56ad4f0fbbd941977a3aded0abed175dca14c3080ab8b55099517fe26e269b47acf518df3381e99e61acbcaaf2153b61cf9816e452faa484b963db2e1766a2893e1a61b7c9451253d8e1193b8d10cecc9116e72c3f071bebdfbf3c75fbb4325e2444020d9ffb4e673550ee7cd9379cff979f9d9771effd2c3bf01eacff2fb921756d6faf005dee", 0xb7, 0xffffffffffffff81}, {&(0x7f0000000280)="c283f777f6a16aa0aa10febb6afabb3c5883ee7b75323c7e1b53bfd766093f556ab58cdc948def3410c0645e8d5da1d3d3703dc168a27eb5f23f1b46b5b43a8d3f08ef8ab0ee368ab18cb20119115e58986f8066552470249eb53ea358cae58fe93a973b2de3152d764ee29c0d2f0b6560e755c9c9bbb1011b2c24f562bc640f8e29fbf016", 0x85, 0x4}], 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="f7641512a20000"]}) connect$vsock_dgram(r1, &(0x7f0000000040)={0x28, 0x0, 0x2710, @my=0x0}, 0x10) 17:19:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f0000000080), 0x0) [ 373.650458] print_req_error: I/O error, dev loop4, sector 128 [ 373.739302] FAULT_INJECTION: forcing a failure. [ 373.739302] name failslab, interval 1, probability 0, space 0, times 0 [ 373.766648] CPU: 0 PID: 22393 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 373.773730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.773735] Call Trace: [ 373.773752] dump_stack+0x138/0x197 [ 373.773769] should_fail.cold+0x10f/0x159 [ 373.793603] should_failslab+0xdb/0x130 [ 373.797587] kmem_cache_alloc+0x2d7/0x780 [ 373.797600] ? __debug_object_init+0x171/0x8e0 [ 373.797611] ? ext4_alloc_inode+0x1d/0x610 [ 373.797627] selinux_inode_alloc_security+0xb6/0x2a0 [ 373.815752] security_inode_alloc+0x94/0xd0 [ 373.820074] inode_init_always+0x552/0xaf0 [ 373.820087] alloc_inode+0x81/0x180 [ 373.820098] new_inode_pseudo+0x19/0xf0 [ 373.820107] new_inode+0x1f/0x40 [ 373.820116] __ext4_new_inode+0x32c/0x4860 [ 373.820135] ? avc_has_perm+0x2df/0x4b0 [ 373.820145] ? ext4_free_inode+0x1210/0x1210 [ 373.820163] ? dquot_get_next_dqblk+0x160/0x160 [ 373.820183] ext4_mkdir+0x331/0xc20 [ 373.820201] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 373.820218] ? security_inode_mkdir+0xd0/0x110 [ 373.865466] vfs_mkdir+0x3ca/0x610 [ 373.869018] SyS_mkdir+0x1b7/0x200 [ 373.872566] ? SyS_mkdirat+0x210/0x210 [ 373.876459] ? do_syscall_64+0x53/0x640 [ 373.880438] ? SyS_mkdirat+0x210/0x210 [ 373.884333] do_syscall_64+0x1e8/0x640 17:19:35 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 373.888254] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 373.893108] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 373.898291] RIP: 0033:0x459367 [ 373.901468] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 373.901479] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459367 [ 373.901486] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 373.901492] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 373.901498] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 17:19:35 executing program 3 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 373.901503] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x8000000, 0x0, &(0x7f00000000c0), 0x200000, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) [ 374.039665] FAULT_INJECTION: forcing a failure. [ 374.039665] name failslab, interval 1, probability 0, space 0, times 0 [ 374.051497] CPU: 0 PID: 22427 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 374.058525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 374.067887] Call Trace: [ 374.070487] dump_stack+0x138/0x197 [ 374.074125] should_fail.cold+0x10f/0x159 [ 374.078295] should_failslab+0xdb/0x130 [ 374.082285] __kmalloc+0x71/0x7a0 [ 374.085748] ? mls_compute_context_len+0x3f6/0x5e0 [ 374.090696] ? context_struct_to_string+0x33a/0x630 [ 374.095724] context_struct_to_string+0x33a/0x630 [ 374.100579] ? security_load_policycaps+0x320/0x320 [ 374.105610] security_sid_to_context_core+0x18a/0x200 [ 374.110805] security_sid_to_context_force+0x2b/0x40 [ 374.110839] selinux_inode_init_security+0x493/0x700 [ 374.110854] ? selinux_inode_create+0x30/0x30 [ 374.110865] ? kfree+0x20a/0x270 [ 374.110880] security_inode_init_security+0x18d/0x360 [ 374.110891] ? ext4_init_acl+0x1f0/0x1f0 [ 374.110902] ? security_kernel_post_read_file+0xd0/0xd0 [ 374.110910] ? posix_acl_create+0xf5/0x3a0 [ 374.110924] ? ext4_set_acl+0x400/0x400 [ 374.110935] ? lock_downgrade+0x740/0x740 [ 374.110949] ext4_init_security+0x34/0x40 [ 374.110960] __ext4_new_inode+0x3385/0x4860 [ 374.110980] ? ext4_free_inode+0x1210/0x1210 [ 374.121212] ? dquot_get_next_dqblk+0x160/0x160 [ 374.173643] ext4_mkdir+0x331/0xc20 [ 374.177270] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 374.181956] ? security_inode_mkdir+0xd0/0x110 [ 374.186537] vfs_mkdir+0x3ca/0x610 [ 374.190089] SyS_mkdir+0x1b7/0x200 [ 374.193636] ? SyS_mkdirat+0x210/0x210 [ 374.197524] ? do_syscall_64+0x53/0x640 [ 374.201607] ? SyS_mkdirat+0x210/0x210 [ 374.205530] do_syscall_64+0x1e8/0x640 [ 374.209403] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 374.214246] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 374.219435] RIP: 0033:0x459367 [ 374.222617] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 374.230314] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459367 [ 374.237575] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 374.244897] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 374.252165] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 374.259426] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:35 executing program 3 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:35 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(0xffffffffffffffff, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) syz_mount_image$bfs(&(0x7f0000000080)='bfs\x00', &(0x7f00000000c0)='./file0\x00', 0x6385, 0x8, &(0x7f00000007c0)=[{&(0x7f00000001c0)="43fb544db11fda1627c1a0e4a00fa896aed38a7f723f3093bc2afb23d22777e2fef27c827103855cc1395e9977d500da477762b42925bae76e133fa1359a4e469b338868c09a9a8f269abd1744bf47b28c8df5", 0x53, 0x80000000}, {&(0x7f0000000240)="d90440525b41807f050849e79dcb38a0d8a915c712dbb771cdac99978c705852412068f06266c8df141c4bde220c65102624549f1752b83c5af1d8c7db7787a49b5772a41e2615931d7bc6da672897c3c493cc1cecbb29e23e0cbbcbb74851ac2c03c8e74b9736d6ed2a897a1239b855201dead07e6dcb5ae4c00c6a9ebaaf7ef594d705a639317684a745352ec695c563f8f2cc0b12aa480904b4be2eaee8fc61e3ee8c3cc08a20ee6a483d208fb72d569d362c59b61e94bc4f3ecf6da5cd01ae456ea94fd2e6", 0xc7, 0x1}, {&(0x7f0000000340)="091c2af3cc0fc765bee83ad276144654ce9db550a81efa56ddc27a4efd0ed7fad9d0ff6a4a38a4193199c8b97f748997a9f3042de026a20c8f2584902ed9cba381f7e82cc32fbf4c66d761604f39dd5bfa2b4de70c3d3dcdb295ced4327e65b6a7ddca924953f1ac3dbfe4473fc600d8a5cb0ed76062a4806452d1fb6905d91228389cd5f4130457fc3d8dbd8b7fd001d26c6f85325044f8a19450371823d5e09eeedc34f9492e2f7f4904d31dbadf993defe3a07f2dd43ac3b4ee3c5e7953", 0xbf, 0x2d13}, {&(0x7f0000000400)="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", 0xfb, 0x8}, {&(0x7f0000000500)="0439f1dbe2745e727c507760146677079c38ce49afb49579339b5eabb9f5c7b49e1928a13a213ecfaccab7d95adc85381abb5963933fbebb96246d59b798ff5d610027af19bb2a256b1c744158141ef2b35ea74e76ee00d3d32b3187b7b6b63321ca2c90e9f94b3705f2246c38a536a8f55f2531d841c9ef761744528d2232f7723d4c022a298f72561361e12e00c52bca02aa0ee2f147eb6fd528e02409aa52fb036541daaac3a96bbcab9263fb2ab897939b6a755746c1527dfeb714ddb8d9f360fc0ab1f4", 0xc6, 0x5}, {&(0x7f0000000600)="58613fa5e7455bf4c32e000ce79dbc5c3862950f82844535ee9222c28a12dd9138437267355c3b0bfe7258981708eeb6f4dca515b2186c10b73b749ae417e4e048190ecbdd4c19137f4a528680a8739da12303876d39a1b51f39c8c97894003f092de0d874fac79016553719dbfa37225eafa2f2f954965276e03de96b5f300da5d45dd7b53e00b619935d76b69dbd3c99d6ef97664a96512306af775501e842b0891914725721cbf1bfc957a87612c7e745e0c89f9d45d1a9076fef0474f891", 0xc0, 0x6}, {&(0x7f00000006c0)="98789005ac66f5f158db7ef50b83b33416c4", 0x12, 0x2}, {&(0x7f0000000700)="a46d46d0a4f1fda92223790d4ed5625ec3b3694f113e86962ea103508677659acd80887f298a7853b4a2dbfa765a8581250d8529a9ad0cae13233cc32e236c94381f1fa682bf79b8363b5577762b93b94cc0fe13f9dab41782174c3e1e911ded1073b30b767008569b0cc6618a7fecb5f11436b0a5d9271b4f5c72a3db057e75e278c82cd276db4ccba4860df574fe6f80f3", 0x92, 0x2}], 0x2000000, 0x0) 17:19:35 executing program 2: prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0xa) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x19, 0x0, &(0x7f0000000040)) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000040)=""/18, &(0x7f00000000c0)=0x12) [ 374.342006] print_req_error: I/O error, dev loop4, sector 128 17:19:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3ff, 0xaaaaaaaaaaaac41, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc7431f5719777a0000020001fff6f20efd9a000001000000000001fffffff600e6ff5f42485266535f4d00"/68, 0xffffff7f, 0x10000}], 0x2480, 0x0) [ 374.431634] FAULT_INJECTION: forcing a failure. [ 374.431634] name failslab, interval 1, probability 0, space 0, times 0 [ 374.482200] CPU: 1 PID: 22455 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 374.489255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 374.498617] Call Trace: [ 374.501217] dump_stack+0x138/0x197 [ 374.504869] should_fail.cold+0x10f/0x159 [ 374.509035] should_failslab+0xdb/0x130 [ 374.513021] kmem_cache_alloc+0x2d7/0x780 [ 374.517174] ? __debug_object_init+0x171/0x8e0 [ 374.521765] ? ext4_alloc_inode+0x1d/0x610 [ 374.526015] selinux_inode_alloc_security+0xb6/0x2a0 [ 374.531148] security_inode_alloc+0x94/0xd0 [ 374.535479] inode_init_always+0x552/0xaf0 [ 374.539723] alloc_inode+0x81/0x180 [ 374.543357] new_inode_pseudo+0x19/0xf0 [ 374.547361] new_inode+0x1f/0x40 [ 374.550739] __ext4_new_inode+0x32c/0x4860 [ 374.554989] ? avc_has_perm+0x2df/0x4b0 [ 374.558969] ? ext4_free_inode+0x1210/0x1210 [ 374.563390] ? dquot_get_next_dqblk+0x160/0x160 [ 374.568076] ext4_mkdir+0x331/0xc20 [ 374.571741] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 374.576544] ? security_inode_mkdir+0xd0/0x110 [ 374.581135] vfs_mkdir+0x3ca/0x610 [ 374.584704] SyS_mkdir+0x1b7/0x200 [ 374.588252] ? SyS_mkdirat+0x210/0x210 [ 374.592147] ? do_syscall_64+0x53/0x640 [ 374.596130] ? SyS_mkdirat+0x210/0x210 [ 374.600028] do_syscall_64+0x1e8/0x640 [ 374.603930] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 374.608811] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 374.613999] RIP: 0033:0x459367 [ 374.617206] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 374.625015] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459367 17:19:36 executing program 2: r0 = syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x1, 0x80800) ioctl$TCSETXF(r0, 0x5434, &(0x7f0000000100)={0x1, 0x70, [0xffdb, 0x81, 0x4, 0x1, 0x1000], 0x8}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 374.625022] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 374.625027] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 374.625033] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 374.625039] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:36 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:36 executing program 3 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 374.741277] print_req_error: I/O error, dev loop4, sector 128 17:19:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000340)) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x3, r3, 0x30, 0x0, @in={0x2, 0x4e22}}}, 0xa0) dup(r0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 374.857238] FAULT_INJECTION: forcing a failure. [ 374.857238] name failslab, interval 1, probability 0, space 0, times 0 [ 374.900837] CPU: 1 PID: 22491 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 374.907902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 374.917262] Call Trace: [ 374.919909] dump_stack+0x138/0x197 [ 374.923550] should_fail.cold+0x10f/0x159 [ 374.923569] should_failslab+0xdb/0x130 [ 374.931694] __kmalloc+0x2f0/0x7a0 [ 374.935252] ? check_preemption_disabled+0x3c/0x250 [ 374.940387] ? ext4_find_extent+0x709/0x960 [ 374.940402] ext4_find_extent+0x709/0x960 [ 374.940414] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 374.940427] ext4_ext_map_blocks+0x1a3/0x4fa0 [ 374.940444] ? save_trace+0x290/0x290 [ 374.954452] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 374.954464] ? __lock_is_held+0xb6/0x140 [ 374.954480] ? lock_acquire+0x16f/0x430 [ 374.975778] ? ext4_map_blocks+0x829/0x17c0 [ 374.980096] ext4_map_blocks+0x881/0x17c0 [ 374.984235] ? ext4_issue_zeroout+0x160/0x160 [ 374.988721] ? __brelse+0x50/0x60 [ 374.992164] ext4_getblk+0xac/0x450 [ 374.995785] ? ext4_iomap_begin+0x8a0/0x8a0 [ 375.000091] ? ext4_free_inode+0x1210/0x1210 [ 375.004505] ext4_bread+0x6e/0x1a0 [ 375.008027] ? ext4_getblk+0x450/0x450 [ 375.011904] ext4_append+0x14b/0x360 [ 375.015605] ext4_mkdir+0x531/0xc20 [ 375.019225] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 375.023884] ? security_inode_mkdir+0xd0/0x110 [ 375.028453] vfs_mkdir+0x3ca/0x610 [ 375.031981] SyS_mkdir+0x1b7/0x200 [ 375.035509] ? SyS_mkdirat+0x210/0x210 [ 375.039394] ? do_syscall_64+0x53/0x640 [ 375.043353] ? SyS_mkdirat+0x210/0x210 [ 375.047232] do_syscall_64+0x1e8/0x640 [ 375.051103] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 375.055936] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 375.061110] RIP: 0033:0x459367 [ 375.064282] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 375.071979] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459367 [ 375.079232] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 375.086485] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 375.093755] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 17:19:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x84, @dev={0xac, 0x14, 0x14, 0x26}, 0x4e20, 0x0, 'sh\x00', 0x20, 0x0, 0xd}, {@dev={0xac, 0x14, 0x14, 0x29}, 0x4e23, 0x4, 0x22, 0x1, 0x9}}, 0x44) [ 375.101028] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap$usbfs(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x10, r1, 0x0) 17:19:36 executing program 3 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:36 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(0xffffffffffffffff, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 375.257077] FAULT_INJECTION: forcing a failure. [ 375.257077] name failslab, interval 1, probability 0, space 0, times 0 [ 375.269008] CPU: 0 PID: 22517 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 375.276040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 375.285406] Call Trace: [ 375.287988] dump_stack+0x138/0x197 [ 375.291605] should_fail.cold+0x10f/0x159 [ 375.295738] ? __es_tree_search.isra.0+0x15f/0x1c0 [ 375.300654] should_failslab+0xdb/0x130 [ 375.304643] kmem_cache_alloc+0x47/0x780 [ 375.308693] ? ext4_es_can_be_merged+0x16e/0x230 [ 375.313441] __es_insert_extent+0x26c/0xe60 [ 375.317754] ext4_es_insert_extent+0x1f0/0x590 [ 375.322354] ? ext4_es_find_delayed_extent_range+0x960/0x960 [ 375.328144] ext4_map_blocks+0xab1/0x17c0 [ 375.332281] ? ext4_issue_zeroout+0x160/0x160 [ 375.336760] ? __brelse+0x50/0x60 [ 375.340203] ext4_getblk+0xac/0x450 [ 375.343817] ? ext4_iomap_begin+0x8a0/0x8a0 [ 375.348131] ? ext4_free_inode+0x1210/0x1210 [ 375.352527] ext4_bread+0x6e/0x1a0 [ 375.356054] ? ext4_getblk+0x450/0x450 [ 375.359941] ext4_append+0x14b/0x360 [ 375.363642] ext4_mkdir+0x531/0xc20 [ 375.367258] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 375.371915] ? security_inode_mkdir+0xd0/0x110 [ 375.376481] vfs_mkdir+0x3ca/0x610 [ 375.380006] SyS_mkdir+0x1b7/0x200 [ 375.383534] ? SyS_mkdirat+0x210/0x210 [ 375.387425] ? do_syscall_64+0x53/0x640 [ 375.391383] ? SyS_mkdirat+0x210/0x210 [ 375.395253] do_syscall_64+0x1e8/0x640 [ 375.399123] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 375.403953] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 375.409126] RIP: 0033:0x459367 [ 375.412296] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 375.419987] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459367 [ 375.427242] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 375.434492] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 375.441748] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 375.449000] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 375.457973] audit: type=1400 audit(1572542376.806:94): avc: denied { map } for pid=22513 comm="syz-executor.0" path="socket:[77092]" dev="sockfs" ino=77092 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=unix_stream_socket permissive=1 17:19:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x4) 17:19:37 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x14000, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f00000001c0)={0x5, 0x1}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/policy\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4400}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="3e0000004e7c59710747fd730e9f92383d5ec7c3b7be13cf2a4a7c0cd602de090a82be2b9dee9dbad55bc399124662533f0dac29a28fdceae8bb0df39e7231987ce42218918f387487e700d71bda", @ANYRES16=r3, @ANYBLOB="000326bd7000ffdbdf2501000000000000000141000000180017000000080000000169623a626174616476300000"], 0x34}, 0x1, 0x0, 0x0, 0x20000008}, 0x200040c0) ioctl$sock_x25_SIOCADDRT(r1, 0x890b, &(0x7f00000001c0)={@remote={[], 0x3}, 0xf, 'gre0\x00'}) open(&(0x7f0000000080)='./file0\x00', 0x200, 0x100) 17:19:37 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:37 executing program 3 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0xdb, 0xfffd}], 0x0, 0x0) [ 375.872830] FAULT_INJECTION: forcing a failure. [ 375.872830] name failslab, interval 1, probability 0, space 0, times 0 [ 375.884218] CPU: 1 PID: 22561 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 375.891246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 375.900605] Call Trace: [ 375.903190] dump_stack+0x138/0x197 [ 375.906805] should_fail.cold+0x10f/0x159 [ 375.910934] ? __es_tree_search.isra.0+0x15f/0x1c0 [ 375.915846] should_failslab+0xdb/0x130 [ 375.919805] kmem_cache_alloc+0x47/0x780 [ 375.923850] ? ext4_es_can_be_merged+0x16e/0x230 [ 375.928592] __es_insert_extent+0x26c/0xe60 [ 375.932904] ext4_es_insert_extent+0x1f0/0x590 [ 375.937471] ? ext4_es_find_delayed_extent_range+0x960/0x960 [ 375.943283] ext4_map_blocks+0xab1/0x17c0 [ 375.947431] ? ext4_issue_zeroout+0x160/0x160 [ 375.951913] ? __brelse+0x50/0x60 [ 375.955367] ext4_getblk+0xac/0x450 [ 375.958979] ? ext4_iomap_begin+0x8a0/0x8a0 [ 375.963287] ? ext4_free_inode+0x1210/0x1210 [ 375.967682] ext4_bread+0x6e/0x1a0 [ 375.971220] ? ext4_getblk+0x450/0x450 [ 375.975179] ext4_append+0x14b/0x360 [ 375.978908] ext4_mkdir+0x531/0xc20 [ 375.982529] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 375.987197] ? security_inode_mkdir+0xd0/0x110 [ 375.991777] vfs_mkdir+0x3ca/0x610 [ 375.995313] SyS_mkdir+0x1b7/0x200 [ 375.998839] ? SyS_mkdirat+0x210/0x210 [ 376.002716] ? do_syscall_64+0x53/0x640 [ 376.006677] ? SyS_mkdirat+0x210/0x210 [ 376.010552] do_syscall_64+0x1e8/0x640 [ 376.014426] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 376.019258] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 376.024429] RIP: 0033:0x459367 [ 376.027600] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 376.035311] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459367 [ 376.042576] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 376.049828] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 376.057099] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 376.064352] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:37 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000180)={0x0, 0x0, @ioapic={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {0x9, 0x0, 0x0, [], 0x6}, {0x4, 0x0, 0x0, [], 0x3}, {}, {}, {0x0, 0x0, 0x3, [], 0x8}, {}, {0x0, 0x6}, {0x0, 0x6, 0x0, [], 0x81}, {0x0, 0x0, 0x0, [], 0x7ba}, {0x0, 0x0, 0x9, [], 0x3657e047}, {0x0, 0x0, 0x3}, {0xa8}, {}, {0x3}]}}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7}, 0x7) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000500)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x19, 0x0, &(0x7f0000000040)=0xffffffffffffffe1) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000000)={0x1, 0x8001}, 0x8) [ 376.071829] net_ratelimit: 16 callbacks suppressed [ 376.071833] protocol 88fb is buggy, dev hsr_slave_0 [ 376.080188] protocol 88fb is buggy, dev hsr_slave_0 [ 376.081865] protocol 88fb is buggy, dev hsr_slave_1 [ 376.086861] protocol 88fb is buggy, dev hsr_slave_1 [ 376.091959] protocol 88fb is buggy, dev hsr_slave_0 [ 376.096934] protocol 88fb is buggy, dev hsr_slave_0 [ 376.101944] protocol 88fb is buggy, dev hsr_slave_1 [ 376.106928] protocol 88fb is buggy, dev hsr_slave_1 [ 376.211763] print_req_error: I/O error, dev loop4, sector 128 17:19:37 executing program 3 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x7040402, 0x0) 17:19:37 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0x13) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000001c0)='/selin^x/user\x00', 0x2, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000700)=[{&(0x7f0000000200)="93c7e3d04b7b5427466c51c3c5579ac67e1bfa771d2e95f0a907a9569f4da5f4cc8b1ad0306670d496b84f3e2ad98e3e377e52b0b7cd1633028e2bdaf9d9d86deadc4c4832cfb78c7c6a11131eefb9d224e231da4eab9ea489c1cd94dd53996abb91c9a71e1854464b4e577f085123aac40277c2a2a9ece228c820745ae28f4d2fd508ccade150add869e140eeacadae2c395cc4ddc0a896a3407525c5bbf789817786550aeaf2f59005d3a02a6b4a4351ffd720817bb5db149873f4def8029175cb6a6a65417dc0", 0xc8, 0x1f}, {&(0x7f0000000300)="18ef7586d7d09ec8cdb52a5fc1a5724971baf7f417695c247564860c0058a1beab4fda547371e39d4e6a054c48919588e2242cab13a36262fe12638226ea2f20fdc42ac9b7fdf52c99827b07e008443f672e1d1738446e42b4566adb05ca09bd73b4913c4d6c00544ca29e1aefb35e789a4c8a352114e36ed063fcc8eacbc699573249512e2408eee4e23473688282e84bc4188c183fec94780d7336d8135e60340f10f3e0c110728cac8f2a39e578", 0xaf, 0x23284113}, {&(0x7f00000003c0)="2df69887e6a100a4bb94f1b121fd6e7104680d9c41d3cbf5f8f5fb474f821d5a7639b5bc7fdcceaaa97a3d8a675fdfa41cbb683be4459deecc95acec5bf6e9636616abb65bb1c2a84e88a01451fad681f1ab20150c2ef1f549ca70c4d221b7d0767d86498d1d9cb9b519478acf1cfe52acf26837d8f376b32ddc6e5635a4fb1fc173ab53ba11fd52061b06251119082767a8b78871e2493a6fd7508c07776e6e5d337b0e0fa92aacb49bedfcbacd914ece59b6ca294d74a4e9e474f6512e1760e38ed90bd7de72e8c63335f92c01", 0xce, 0x5}, {&(0x7f0000000080)="8d7c287dc4a6556b7540a7a78b0e2e009de2c2e1472108e9f43dceacc1dccddfe97b053f7764b458c8c1cad669b8771cf72ea3ddbb9488ed9f3195c807cf0572c2ed48d78b4b7e2e8b0f8290f421dfc12305a544a4939fd0114fb137cad31f", 0x5f, 0x88}, {&(0x7f00000004c0)="b6b65fac6ede1300e6bd609075818f1524175ebd48a5f8e531b98e562fd94dedbbdb17709e59ce41458bb5d2097307681297dc95317510ca05a4f1c3a00c3c1ad5ef9e7c173dac89d8cb9635a8924a6bcd17f0feb9753cc9857c68b84798c6c9e8235bc4f9a121378ad2bfc046a8ee54d52d99ce1ed9ed57816322a0cc0449203031185acfb25889d49c4ef95d5557939f991cad2b1f6f94b9039e94dad7985c2a1476d3023633d35d52a6f235c19b8204f7bbae8894536d68cc00d91a8c8f4b9e4ba8aab18be58b539e0c428ce46508a46b5fe5c5", 0xd5, 0x800}, {&(0x7f00000005c0)="77f6bd022e5db2d3959ec9f4369a06af546c126d43f5f877a3c70de81e315ce48034481ec3e810dd3180ad20b56aa984def661624689e65357eff30daadee5609294d0f2455455d08b9ae5d5752347e1fa4b5c2de07f7d3a9aa10d3b83aacd51c289866d0e164aedf4ec98b04e6c012a749cfa790c5ae55321f126c6972be295ed4055307e06aa6fd1ed8b2dcaf0585ceac0a06a1507e50fae4f287f1b89310b7a100ca6a3175568670bf43a193ce757d4651f82dd0ac3068a4bff88ca2b68b38bfb8fbf5a90587fd980910c09b99a", 0xcf, 0x7}, {&(0x7f00000006c0)="8b8aa8151d97c17e42c1c912f17354ef2996a4fc9814809bc716465cdcec1a", 0x1f, 0x6}], 0x1e08d5, 0x0) 17:19:37 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil}) 17:19:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x8, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvfrom$rose(r1, &(0x7f0000000040)=""/126, 0x7e, 0x4, &(0x7f00000000c0)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @default}, 0x1c) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x0, 0x0) 17:19:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='\x00\x00\x1c\tf\xe9', &(0x7f0000000100)='./file0\x00', 0x6, 0x0, &(0x7f0000000080), 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:removable_device_t:s0\x00', 0x28, 0x4) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000180)={0x80000001, 0x1, 'client1\x00', 0xffffffff80000006, "d8bd750b0e33c3c7", "011fe2bf0f946b73a75b8e1bd67df17ce51c4285e309dc568a62789953420b2e", 0x80000001}) [ 376.461248] FAULT_INJECTION: forcing a failure. [ 376.461248] name failslab, interval 1, probability 0, space 0, times 0 [ 376.472896] CPU: 1 PID: 22606 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 376.479926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.489293] Call Trace: [ 376.491894] dump_stack+0x138/0x197 [ 376.495541] should_fail.cold+0x10f/0x159 [ 376.499707] ? __es_tree_search.isra.0+0x15f/0x1c0 [ 376.504653] should_failslab+0xdb/0x130 [ 376.508639] kmem_cache_alloc+0x47/0x780 [ 376.512714] __es_insert_extent+0x26c/0xe60 [ 376.517041] ext4_es_insert_extent+0x1f0/0x590 [ 376.521614] ? check_preemption_disabled+0x3c/0x250 [ 376.526647] ? ext4_es_find_delayed_extent_range+0x960/0x960 [ 376.532505] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 376.537973] ? ext4_es_find_delayed_extent_range+0x31d/0x960 [ 376.543786] ext4_ext_put_gap_in_cache+0xcb/0x110 [ 376.548641] ? ext4_zeroout_es+0x170/0x170 [ 376.552883] ? ext4_find_extent+0x64c/0x960 [ 376.557221] ext4_ext_map_blocks+0x1d4b/0x4fa0 [ 376.561807] ? save_trace+0x290/0x290 [ 376.565634] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 376.570641] ? __lock_is_held+0xb6/0x140 [ 376.574697] ? lock_acquire+0x16f/0x430 [ 376.578656] ? ext4_map_blocks+0x402/0x17c0 [ 376.582965] ext4_map_blocks+0xd3c/0x17c0 [ 376.587103] ? __lock_is_held+0xb6/0x140 [ 376.591151] ? check_preemption_disabled+0x3c/0x250 [ 376.596191] ? ext4_issue_zeroout+0x160/0x160 [ 376.600685] ? __brelse+0x50/0x60 [ 376.604176] ext4_getblk+0xac/0x450 [ 376.607796] ? ext4_iomap_begin+0x8a0/0x8a0 [ 376.612104] ? ext4_free_inode+0x1210/0x1210 [ 376.616543] ext4_bread+0x6e/0x1a0 [ 376.620074] ? ext4_getblk+0x450/0x450 [ 376.623948] ext4_append+0x14b/0x360 [ 376.627650] ext4_mkdir+0x531/0xc20 [ 376.631282] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 376.635943] ? security_inode_mkdir+0xd0/0x110 [ 376.640513] vfs_mkdir+0x3ca/0x610 [ 376.644040] SyS_mkdir+0x1b7/0x200 [ 376.647565] ? SyS_mkdirat+0x210/0x210 [ 376.651466] ? do_syscall_64+0x53/0x640 [ 376.655423] ? SyS_mkdirat+0x210/0x210 [ 376.659292] do_syscall_64+0x1e8/0x640 [ 376.663160] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 376.668004] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 376.673177] RIP: 0033:0x459367 [ 376.676352] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 376.684046] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459367 [ 376.691301] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 376.698553] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 376.705807] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 376.713061] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 376.721248] protocol 88fb is buggy, dev hsr_slave_0 [ 376.726359] protocol 88fb is buggy, dev hsr_slave_1 17:19:38 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x19, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={0x0, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xd}}, {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e21, @empty}, 0x100, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000080)='caif0\x00', 0x4068, 0x80, 0x68a5}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) recvfrom$inet6(r1, &(0x7f00000000c0)=""/16, 0x10, 0x40000000, &(0x7f0000000240)={0xa, 0x4e20, 0x7f, @local}, 0x1c) 17:19:38 executing program 3 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x400000, 0x0) sendmmsg$sock(r0, &(0x7f0000001880)=[{{&(0x7f00000001c0)=@can, 0x80, &(0x7f0000000400)=[{&(0x7f00000000c0)="a6806196c494d12a53b2e1cdaab3eb79cad6b4a461b01033b5e1898c9364", 0x1e}, {&(0x7f0000000240)="50f0ce3fd823b1e43d07a33f05f3da8c1a0f0106f59fe7c8036c11ed0023f5d70764028818b4799c3c3703fbbbffc8c3bdd87fb8d6ae8f17e2d019aa4dad65b742cb64a5ffc5e3c3fbab763adde74d7375e66f9e0830308e91a14d58baabbe3c2c0b71c1dd3fd0a99fb611a096bbcf1a11521117d7f7c5ebc182901f2f677409fcd991e468389ab9f4036630ca90c5438b33", 0x92}, {&(0x7f0000000300)="318bcc5710959b923213010dd1e458e5fc89917235078c69609e0748861dad6e51fde6b264cb8738b9a8f79db2913feed1efb3bc7e9dbcc1ef50052f31e345e590e707d99c28a4188c9bafca7a326268818a3816c0f421bab29a64e2af5e686af2a94e8ef4d4274b11e9380d51aad96d26456d15d442596c7d4298b140ac62a52bff5d89e54f9a781542c8c3a6fb2ce7edbb45dd4aef08475a4d7e64c7a5c8080a1db91dbea9a329c5f24559277aa84d03fb49fc5e1237871ff97e991c6de3e5cb3a002c4c38ee3b7185680655ec9e64f0ceeb", 0xd3}], 0x3, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x24, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x40}}, @mark={{0x14, 0x1, 0x24, 0x800}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0xa009}}], 0x78}}, {{0x0, 0x0, &(0x7f0000001800)=[{&(0x7f00000004c0)="16f1f0ddce9995bb1566fe810c63e23550922688619854d375db827ca8afdcec361197fb73f70edeeb1fc173aa0ff7607542cabf89c30717fc22ff868ca85b57bfa3f2bcf118415497629ec8a72125257b8fbf5640c0c44ea737d7db53fb9e6a7c524428901ea48a6750afd58917565e957aabf0d5b2", 0x76}, {&(0x7f0000000540)="36a0e4652c443b71af306f376cff4198df4ecfcc372c78cde102a8acfe33e453e6ea47c6be48abda24602c319285e75ef8316600cde0fa8b3a9a325ed09aea695d8ea390c9f9fd892bb981b9dcd388f177707db14a6e685c460697af7707cf8b3de216fe9f78085be23e4cb8d158c142beb578305d950d0cdf3515770192ffe59025e174632f4443f5aa532878dda4255f7688db77192f1c16b6d4a0c9450cf5f34e4bf4814a52d458c35616f339a12c308640b9d4ba4dae135167a513ae1f7e81db918ebb6109784d3a8fab4a4598372c89748f8882ec3c27dc8d76e61ca78462f2630c3254b7b54ec04b2297d15aea3a69ebdd61cc83c2614fceba0354ab17d1b04ddcd19d730c03cba9d78716f66cb6f048db03ded67a60812022f3eb9cfe59ce9ed4fb680fbeb271eaaf859a5b896b7285f791397b0d43a5eb654753790818abcbcbe27c3e62f62c4381ecc46e12b56e78dc9d1aa3d6f752feeeceb116e25ef5b216628b1bcb017106f5395d566a045324dec246743443cffa92961b47ca8a1903f794243ad615e952cf94c03ba20f561726cd8baaec90f8a59d24d6f0dbac7e70077593871202e1f1d4cc167dfa3165d3b4fad737f039499142c648f834af89dc71c45881cd4aee15c1a0fc8345983281e8524680043c5ed09b35c558615a4fbec25bff99dd2d04ab260ba1320e82e3ffc7ef68a549dbd621e4766b47356db6129bb94d02945a5dc2c5c8e13fcbd8445a5dd43213b6d6c3546cde9f13186c3d7cf1375a9e7a6d1d7239644782ff9d2276bffa20e49f7e08b1aa74d442926147c58196fbb6cd516b350909d2bbc9b8ee35e2214111b90de701f5abd142a5b399d4a420d98c530767896bee1049f5302dc1e942db58fcceaa1e05281eb03c544c19e3276d21989570008c177e7a40fbf019d1d78fb074704847226a7f2a9930b2e7e020cb15d5a511b18270adc8674b2a30bb76ddefcd19999169dc9ca2bbdc4863732d0333192f8501629a888ab6e927ba3906d1656102606516549fe1146a79a6e517968975ae8f864979d9eab7d7e32a35dc8b1baf9401a5756b1896255cced88011413cfe0d32ec141d189877bcad70e65606fc16e6c102d573e860c0a66ad315beddab60f1666e9fb177d63fa1e0cc05732397c556fa9358550ccce5f2002fa814b1d6325fca2b497bcfbf7cfb4c24264d19be171c1f25385db4e98c7a06ca0680954d1584b6be880ca13df995fb75d783f754ecd4278a7c568b0fa3c4cf02bd52529a0b6db859a49f83a71bafda43aa1ca27a653e80d548e0908693ecc6bbfc4e16f2a6a0b4c934e7d991df08a88e85fbc4a20c27a4008033878f265dfe40924691a9f13f1f8ecac63306a60e012725baa13876e82917977ee25214cfed1f4f5d40a87a4b552ff9d78f41f06b82a07470c1831a6e532daa2069b5973648ea9fc8639e1d9186d6728be812c88b2f82d358483275479e74b35c154c4701991e343fd8d34604fb82a3d2f62df8f32752265b3fe2e7bec202a46409d9308f60a328040c01c4ca01219ff9871a4ec9f1c71e10b9fbb10881aea1b4c2052c330ee8dd7450ae1875dfe4ee1a9d80c2d1d4639f39934b24d8d9239d2820b9a93612edad322171c1094760eec4d98aacc63a8ffcde36f118131f63cd79e2150963755bd9a6d36fcbd0748ade1a9b5a3f8121a9dc3e5fcf008ea1aa74052a7e4479dc4daf5e8718a973b00fee907d7dbf531ee7836e9f8e779b5e25b6e877705af228e44e93db3acde6e9b62e15f8234d05e9bef7de0db518c392779a78012972a35263c1408696292b20d59d57e8d101c26603617db831b7b622efb30e2da4ef10efa3b0d68b6161fa48010f3be7cc366fbbd22506a539d6a76a12d642b30b98729a0c69bde5b59177450b7b7e4fc1b014ba967fb31fbc95c66f768cb790ad771da172d95f4cb708e4f595ccba4d39c1daa3f53ee4706794d977b458d67a5e262ca4ea227de4f43d8b4778d514fe5f5b8a031761d0c9e7c7bc9c9fb6fb90be7cadf5e3a3aeb46850e23f68de9d395f1156879ba9f264ea8cebf6ade8930427d4464b282a718b7554b64c2ab71542231440efb4d0a6b274ecd1fd2d657aa020418e55db3ad508aafb2ff402c53a90931f3436d301f00d40784ebc3196bf9c8b0f14c0e60c0dd0b455cd8cc75e730ae0311b31d75e86e292bdcd2ca00925e60e2e0002f949f327a970d745ecb6e614d4b2f137155d510e024a8a12e07ff28dfb9c248e0a3066ae1f842bd663e96684a4761a120e7d2b40ff23e5a4ef2be534e7f7f8fe5a5ee3523c4d1b9de10175ca5839a79f74ca2192c2ffa759a8f2e207943b5af9d83416b8b76b905c1a874f0372514e7eca45625fccb3ff8debdddfed2fefbb2d2c1b6dd28db1c9dd3b993e16df876e7414f35ca96671d290e01da1a26692203e6510f9a17d5f6bd0e4c78513c6f8a9a9eb61bdbdb04d2ed9e953d7cfec5a262e9ce6f117737d3332ecf13e044ce77c1d52b970c720be1b92c27ca74f99f694900f79d460d911ecd99a4c321adc0c30be9d246cddd043f77701cc88f24f590e69e035e69e8c066edc1b3187a2a6624ce78567e9819e44cefcfbd52d566fc7dbd586a8398cdce8334140f67815db0086e286e93e1bc7e317a370dceb90f747c87dd44e03c16a2b44ba424613b635a95efc60d817140af36f0b50ef2f19ba69284a4f4b5583f3bc48a868e3d9ae3e04f62d1edfd9508e5ed6a2335d3a5a9ce4eb5be8872a17f144f80a09692da09e44aa51ade03a2a6754213f69f229ec8dfc29e04e734014b24a66675d9b6adb644036157c4981613556d71f28bb42e339f39d93cc6846b2fa3b94a6aefe51372a765e3d8f6db0d9df2f1ad3e8e782fc81f9dc5fc1006ed91703fd83715fb50661ef7d303902debfecc40899c12d505aee225859e80eb0e132878f222f170fac069048c33987e75a8a5d049b4295d1a7e335b828215b70937cce39d1c13566c075a4fdaed776b57a052aa465d700930424f0c16cef94b9f3719570de02e4e6cbc113799fdc5a31967f3857e4c4672d22e435ab574553ffc085e1385cc1360403ccaba13da8a15957ce7ece28285b71d54b6293015e848ef9d4ba35398c9ae1dfd0b6f7f9d814c82a3bd6e9e736ee9d1498974205b09032777783f10341dfbd8225349c9eab7005021359a30f5a3fa2ff16be390f49930139cdc5b3f2a777beb434887268d92ec81366fac980848dec8126e6a48a59fc3f3e8aa80d556c26fe6284ef6ef0521ea9d44aea94dea112021c99812ee24033a45b1f5795ed614640175297cc44baa6cc612f6061797506e6fc072dbee5a92b9f5bd7be8ff08d80991e8f5f530ae2922291529861fc4e6985ffb709340d28acd78f8cf2033fb20a1a701055af5e915b718a36690d71ab8bd63625d07c5ad5c2f8bd9dee1473164b09d384311d31bf2fd49e0453de3431ef8c74caa78127e6e12e354002bf0f1fa0704dd6d14519ea9ca055dcec5da616772ad9279934cc48dcd533557f912c2e4aa5d3bef693a3ddc7a43c6ae78e41f370f977eb4d7fece900f3f9bf5b020cf233eee0040cec58ee23e39098a368e64fe1d15b9920e35bef0445ba575f04d3e9b12e8bc5d138516a9327a692ace7774895128b5faed0bc6493325c1eb151f17a0ced665ccf96ab2bc294d9b2f777bda8a32a7a0af02b98ad0159c79dc4071078c73d1172656b4d525a047e8bf29178d80f7d1b176bbe140a516b3a94501cd25c0370e7ef343a6e10066bc353948cc46c0264099269ae976d423da412c68b3c89ba37ddc66e93b5e1bc1d831aa1895708e7f3ed093c5a3f8c2fc3516c3e25a06997b00218c855589d9b5b335fe567970fb3a4943d973e34aea48f11ea4dcb5f8afc43ececa03911267973556bad6455935c6c89096a4dd9f6dd882a1ea2435078f774c5228c8b278e4258c2778e842a6764083943970d4adc7c1cb84acddcf58031c1a211911abb6fb82e809040473bc187c6c62208d6e9e19c0a9e2a84af2956061838c0fb4c7b2c6a9546b5c2c0ac311c0c032596dee03e2dfc619f65e91e3467585f027d5804c77514bfc166448b9e654864f817efc44a91988f269848fd9fd672010b865c1132b425b524282fbde55e1f09691e177ba1b4628b1be882ed0bad1ab7a15fad693e39a36d04744000426fb73e0a85533de08018f542aa9216d7a205824d5c463dd1aec015e9ce3a730aef97670c4dd57e04752ae725632419a12a23b5e9edf6d090202ec67af7be76ea613369bc68fb0ed41f36104380207aa19d2ff1bb269b0c08cb7c8d7dfdd7743f056b3f6ca4b37108bc7899c4379da4cbd8b1df0b88b1f7e67cd2f9a4a774f26daa0ae83b465d629845eb8300216c7585665a84bcb6acb4b186d97585b8c6a2994f7d038640e8357c206355a2b8cfb3df1ffd101011eecd0321bd9405084c390006c2f27fe6d848080c2f6b1ec6392e3dcdf00e353168595771382b3b0e0f9093b262d1b0db42c1a465104467761aa9cad2c47cd900c9433d368e158293a62a91362825a7ccf75a6a970141310b84b9c77f8129a475d2a697e5fea3e7d4236a2654bd1dee0c70518e3de8546605a096777ad7879c46bbe68470387e7cb128911c0533b61f98846313cdc4418d05344731223efad74f1ddccbf1a251b1cdd72861958b382d1666283ccb1ce9cba39d410cef078407c2fc510d64efd77e2bcfad57706def764abc5f9b768ebc466f07ffefb097f789745784db0b9a5630647700d1f2f064ee0a90a29239b0f718c8083e990e14a09011677678d5e2dbe327e23717e85941a71e5cca4920da0762e1fecc6ac2a8d48399a24701368dc0ac6502fbb5039313170c1a49f6621062afea376697abea23cdfc566f2b3aabc60727224bc6d6d6ea12b8e0077139972e7a6cb1da91e9952ba2ffd1bed07e57c2a77696231e10e37940933a1d373074253b2fd2c3419856c8a34b1da306b4f20d7d95c385f5978340a5b3c15d9ae7fc5467fe9e343e37bcd515cd01c39db73bc8b5cd0676b7e861497f2b8dfe5de3e7e5fc44e3aeca6717d895745337d6fce106b70616a830a45614d2dd4001c7384b143ba34570d87b2657dd6d1a4d7fca3d09b405e5f2602319535f84832ca3121bded650de189e01e4ac8b8a16996e0ec62ef4ef3d4744054d814444837033f06ea61381cbae0fc9c765c9591643471b1a7eafd6d46b7775abe41ae1fc3a8cecba8ee119db8762108850c9c3c0cbd0cfd8951a768cd1b614af7063b531d3908f8f4d7fd6db016bc4e6e7fb0185e4292ece9c36c6a5b2e154db15117b48d9cb00ea7689e1a4d4f00e1f19aba9ed928e6f5caf344bc06575a36906a3e60cc20817f85a83973f8d58ba135d416ff7ff9328fc7ee70d282f6a675d64a10c276b5a9ef86cd33986cef5391205be52d125e45c86ceb920af0903888406e505c6e175bf51470c579c8e22082cf25b8dc3c572ffb6c7c6633562760b3145ef61d02d1a430bca0ee84d17149e1df1a37d614e1e4664cdabae7940ad293a12c2f1b253648af892d292304a374c8a5543419690d422c8edd2e22e231f7cb93eaf86b8b2b9d6d861edb7d5c41c0e6c34597265d8452743ebf25819ad7a5375775a5a66530581c7f05e23b426e0cbb44082ca2ca9a8726b7374620ef3eac4058e0557ccce050336307e359310748a285faeb3c2491059c097dc8bdd5ad883213625c5f3e4f49ed20c996cb2571160c73703fa5637fdb4de0082a5e305642fa4261522", 0x1000}, {&(0x7f0000001540)="2b5777ea99e8ba19ff92006372cbf8eab2619fe36a5da5ded9b35399f96f09555882c2fe8be3f0a15a50285103a9cc9567ccceddd0dd9225a6", 0x39}, {&(0x7f0000001580)="1cea5eac6e541ec66497739933e14712f0256ee4560bc098155f04ff75e79d1c307cbe31052b60118f5c43a7c502cf861529894f4691af98e83a61ef8d605c3283425dc8203703901853079e45d496abcad3387df7df8d66d3a936e73662ccb9dc9f08eb61061a3bd171b8ae5eff000171f3d461ccb0bbdf9c6bf82c2d4cf985053b5f9a17197ef440101dbdb229cee71c9a13ea1f82e60653a00a85206e4341abee4f35cae7", 0xa6}, {&(0x7f0000001640)="133f6b60d3ebfae591c3b4cc34ed82263e686cc1d12aec34cee6c78d015dd65da74ec94a179f279a07a09707c88d3e904bc90ef515a37bab4c97f9d528ea81873e4db3fef25efc878bfe79b107b60ebef158940b60f40e5ec5b1e48ec250661c5e364c39038a419d1c7e87a9ed3b2cee9402dbf69783543a5c800cddc2dffa1fe3553d127aa6efee55601ab8d3e580c09960cc2ccce7d54df79e49a18e9d0735765d691b80bbe9f648b55d7fe8fd67c67aca13d08ac3f8", 0xb7}, {&(0x7f0000001700)="7b88c2ee76b4ebbdd50528054a1b2abd4f4f2eb2c8b5111fe1e870c1f1b4c4585e595e824e10e7a244b6838f3a1b960f826204ec6123632f9a76f1d955a0ce54eac381709ddc18bd19f254c7b6a683337679b5dafbca658e92e0d82e45603897457bbd9311364c1e33210153f419de7659320076bfe5509113ced81df7f3690ca4cd3847c2d2a0c0543755c4563ef55cf1ba6c04765ee216d1d5351824ef6b7f9d4bbda122c01602b85b4263ef6596c366c28e44f54a22c266f05f19acb80655a9de21d8d414a9ad026df6fbf51f3346326d7ca64957c4c22ef065149f5ff7abb89c7ad17064b13bba1d541dea7e", 0xee}], 0x6}}], 0x2, 0x20000000) [ 376.949242] FAULT_INJECTION: forcing a failure. [ 376.949242] name failslab, interval 1, probability 0, space 0, times 0 [ 376.960587] CPU: 1 PID: 22650 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 376.967677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 376.977062] Call Trace: [ 376.979660] dump_stack+0x138/0x197 [ 376.983305] should_fail.cold+0x10f/0x159 [ 376.987486] ? __es_tree_search.isra.0+0x15f/0x1c0 [ 376.992429] should_failslab+0xdb/0x130 17:19:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r3, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x18c01020}, 0xc, &(0x7f0000000480)={&(0x7f0000000880)=ANY=[@ANYBLOB="2e495370438417398a2cc519630300c61dc645ca6d8d936d194aa291d1d03ad552da8479c547761202a81138aab05c420bb64b6db2ec4d985265b932b0abe06628f249247050f519de75de8e4e3cdf8ff8d7938f61e6d2609cbc5bf443f45840615a9748bbe223dbd72e88a9e195982b0061ac95045c957f60006037337313d77925f0094b952b79a9c4583482f959b16d0dcf638097efcf79e15c8530c8f3b2833046b27eb9481445397260e83b1451c39851ae", @ANYRES16=r4, @ANYBLOB="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"], 0x15c}, 0x1, 0x0, 0x0, 0x444}, 0x80) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f0000001780)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x40000220}, 0xc, &(0x7f0000001740)={&(0x7f0000001600)={0x134, r4, 0x4, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}, @TIPC_NLA_NET={0x40, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x20}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xff00000000000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x401}]}, @TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6df}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast2}}}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'hsr0\x00'}}]}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffff01}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_WIN={0x8}]}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x1}, 0x40020) r5 = dup(r2) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r6, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x18c01020}, 0xc, &(0x7f0000000480)={&(0x7f0000000880)=ANY=[@ANYBLOB="2e495370438417398a2cc519630300c61dc645ca6d8d936d194aa291d1d03ad552da8479c547761202a81138aab05c420bb64b6db2ec4d985265b932b0abe06628f249247050f519de75de8e4e3cdf8ff8d7938f61e6d2609cbc5bf443f45840615a9748bbe223dbd72e88a9e195982b0061ac95045c957f60006037337313d77925f0094b952b79a9c4583482f959b16d0dcf638097efcf79e15c8530c8f3b2833046b27eb9481445397260e83b1451c39851ae", @ANYRES16=r7, @ANYBLOB="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"], 0x15c}, 0x1, 0x0, 0x0, 0x444}, 0x80) sendmsg$TIPC_NL_PEER_REMOVE(r5, &(0x7f0000001580)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x201080}, 0xc, &(0x7f0000001540)={&(0x7f0000001380)={0x1a0, r7, 0x800, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8}]}]}, @TIPC_NLA_LINK={0x40, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_BEARER={0x64, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x127}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @local}}, {0x14, 0x2, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}]}, @TIPC_NLA_MEDIA={0xb8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4122}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3c10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf30}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x71df}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x8000}, 0x440) ioctl$SG_IO(r1, 0x2285, &(0x7f00000012c0)={0x7a, 0x7, 0x83, 0x0, @scatter={0x1, 0x0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/4096, 0x1000}]}, &(0x7f00000011c0)="a7f3d1eb1497e63133a761af4ddbdb4305c3fe38b99afc830b8b11cab18593b98b2348bb223667cfc8665a1ca443e38394f264b5d9a91550fb428f50cf6c1f557f88189f6f5afb7e9b47385408cdc173740f0ad213365e2abb2bdb864acf3c144afc86e7d8235a032b4a5274b422821eea0b5a69ab492fd6ab89e92a5d01231c321550", &(0x7f0000000100)=""/39, 0x653, 0x0, 0x1, &(0x7f0000001280)}) [ 376.996499] kmem_cache_alloc+0x47/0x780 [ 377.000570] ? ext4_es_can_be_merged+0x16e/0x230 [ 377.005342] __es_insert_extent+0x26c/0xe60 [ 377.009684] ext4_es_insert_extent+0x1f0/0x590 [ 377.014304] ? ext4_es_find_delayed_extent_range+0x960/0x960 [ 377.020123] ext4_map_blocks+0xab1/0x17c0 [ 377.024284] ? ext4_issue_zeroout+0x160/0x160 [ 377.028786] ? __brelse+0x50/0x60 [ 377.032246] ext4_getblk+0xac/0x450 [ 377.035880] ? ext4_iomap_begin+0x8a0/0x8a0 [ 377.040201] ? ext4_free_inode+0x1210/0x1210 [ 377.040215] ext4_bread+0x6e/0x1a0 [ 377.040227] ? ext4_getblk+0x450/0x450 [ 377.040244] ext4_append+0x14b/0x360 [ 377.040259] ext4_mkdir+0x531/0xc20 [ 377.040277] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 377.040290] ? security_inode_mkdir+0xd0/0x110 [ 377.040302] vfs_mkdir+0x3ca/0x610 [ 377.048235] SyS_mkdir+0x1b7/0x200 [ 377.048247] ? SyS_mkdirat+0x210/0x210 [ 377.048275] ? do_syscall_64+0x53/0x640 [ 377.048286] ? SyS_mkdirat+0x210/0x210 [ 377.048298] do_syscall_64+0x1e8/0x640 [ 377.048307] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 377.048325] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 377.059517] RIP: 0033:0x459367 [ 377.059524] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 377.059540] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000459367 [ 377.059547] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000080 [ 377.059552] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 377.059558] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 377.059564] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:38 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:38 executing program 3 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) ioctl$SIOCAX25ADDFWD(r1, 0x89ea, &(0x7f0000000080)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) [ 377.356040] FAULT_INJECTION: forcing a failure. [ 377.356040] name failslab, interval 1, probability 0, space 0, times 0 [ 377.367513] CPU: 1 PID: 22690 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 377.374516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 377.383877] Call Trace: [ 377.386480] dump_stack+0x138/0x197 [ 377.390099] should_fail.cold+0x10f/0x159 [ 377.394234] should_failslab+0xdb/0x130 [ 377.398193] kmem_cache_alloc+0x47/0x780 [ 377.402241] ? lock_downgrade+0x740/0x740 [ 377.406390] __sigqueue_alloc+0x1da/0x400 [ 377.410525] __send_signal+0x1a2/0x1280 [ 377.414497] ? lock_acquire+0x16f/0x430 [ 377.418459] send_signal+0x49/0xc0 [ 377.421996] force_sig_info+0x243/0x350 [ 377.425979] force_sig_info_fault.constprop.0+0x1c6/0x2b0 [ 377.431504] ? is_prefetch.isra.0+0x350/0x350 [ 377.435988] ? trace_raw_output_x86_exceptions+0x140/0x140 [ 377.441600] __bad_area_nosemaphore+0x1dc/0x2a0 [ 377.446265] bad_area+0x69/0x80 [ 377.449537] __do_page_fault+0x86f/0xb80 [ 377.453585] ? vmalloc_fault+0xe30/0xe30 [ 377.457630] ? page_fault+0x2f/0x50 [ 377.461247] do_page_fault+0x71/0x511 [ 377.465038] ? page_fault+0x2f/0x50 [ 377.468651] page_fault+0x45/0x50 [ 377.472098] RIP: 0033:0x453b4f [ 377.475272] RSP: 002b:00007fc4a2609a88 EFLAGS: 00010283 [ 377.480636] RAX: 00007fc4a2609b40 RBX: 0000000020000068 RCX: 0000000000000000 [ 377.487906] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007fc4a2609b40 [ 377.495160] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a 17:19:39 executing program 2: syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000040)=[{0xfffffffffffffffd, 0x0, 0x10000}], 0x10, 0x0) read$char_usb(0xffffffffffffffff, &(0x7f00000001c0)=""/187, 0xbb) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$isdn_base(r1, &(0x7f0000000000)={0x22, 0x0, 0x0, 0x8, 0x3}, 0x6) 17:19:39 executing program 0: mq_unlink(&(0x7f0000000000)='btrfs\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x9, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="db8e0400f20fe6c40f060f2382b880098ee8f00fc70f0f300f20c06635000000400f22c036672e66f20fd013f2ae", 0x2e}], 0x1, 0x20, &(0x7f0000000100), 0x0) [ 377.502413] R10: 0000000000000075 R11: 00000000004e6a20 R12: 0000000000000004 [ 377.509668] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:39 executing program 3 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:39 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/Dev/vcs#\x00', 0x2, 0x200000) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x16) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) [ 377.649649] FAULT_INJECTION: forcing a failure. [ 377.649649] name failslab, interval 1, probability 0, space 0, times 0 [ 377.660908] CPU: 0 PID: 22708 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 377.660969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 377.660974] Call Trace: [ 377.660991] dump_stack+0x138/0x197 [ 377.661009] should_fail.cold+0x10f/0x159 [ 377.661023] should_failslab+0xdb/0x130 [ 377.691738] kmem_cache_alloc+0x47/0x780 [ 377.691753] ? lock_downgrade+0x740/0x740 17:19:39 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 377.691767] __sigqueue_alloc+0x1da/0x400 [ 377.691779] __send_signal+0x1a2/0x1280 [ 377.691786] ? lock_acquire+0x16f/0x430 [ 377.691799] send_signal+0x49/0xc0 [ 377.691811] force_sig_info+0x243/0x350 [ 377.691829] force_sig_info_fault.constprop.0+0x1c6/0x2b0 [ 377.691841] ? is_prefetch.isra.0+0x350/0x350 [ 377.691855] ? trace_raw_output_x86_exceptions+0x140/0x140 [ 377.700053] __bad_area_nosemaphore+0x1dc/0x2a0 [ 377.700068] bad_area+0x69/0x80 [ 377.700079] __do_page_fault+0x86f/0xb80 [ 377.700093] ? vmalloc_fault+0xe30/0xe30 [ 377.700106] ? page_fault+0x2f/0x50 [ 377.700120] do_page_fault+0x71/0x511 [ 377.715736] ? page_fault+0x2f/0x50 [ 377.715748] page_fault+0x45/0x50 [ 377.715757] RIP: 0033:0x453b4f [ 377.715763] RSP: 002b:00007fc4a2609a88 EFLAGS: 00010283 [ 377.715776] RAX: 00007fc4a2609b40 RBX: 0000000020000068 RCX: 0000000000000000 [ 377.725261] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007fc4a2609b40 [ 377.725266] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a [ 377.725271] R10: 0000000000000075 R11: 00000000004e6a20 R12: 0000000000000004 [ 377.725275] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 377.764590] print_req_error: I/O error, dev loop4, sector 128 17:19:39 executing program 3 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000000c0)) 17:19:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0xaaaaaaaaaaaae6a, &(0x7f0000000500)=[{&(0x7f00000006c0)="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", 0xfffffffffffffdc8, 0xf1}, {&(0x7f0000000080)="8fc59de832c852b9d8e5391ff6cd37f107cd3d029f3546299f15330d8c79989b44bdf01132b3b4932e936e19b936e970eaafe2053f6b", 0x1ad, 0x8eb}, {&(0x7f00000002c0)="48b53a7fe0ba4c20784d87f64170bdf44aa8cbb5635529a87a354f33f8e244a8af7735dc12ae216aa02b19b6b914095c14632fb53a9fabb1d4e22dc17bc9dea685a5521ddbc30d9d7906d1508dcf7632bdd733e7b3e6f3bd1a4133a4a85d404663a1a1ae56bf341234d9bc66c3dc319cec180939443fbd18fcbb3e4caf684f72a61008b34931c51683b8453f0a1be6152a4046a205509427f2b2", 0x8b, 0x3f}, {&(0x7f00000001c0)="674bb2555ace2bb85e6f3434c047d0830cb5025aa6a22ea1c80900000000000000723dcd2f256786db00540d5efaa67280bdfc740f111f7e91deaac55bdbfe88601822d111e28c40fe61c49a00898c46d5b9bfc829660000000000000042bcfaa88c4d8c371e00000000000000000000000000001277c6dfce2693df6f466a17f3aba770ee6b08dd1e851ecbb923c66cd116dd6133", 0xfffffffffffffff9, 0xca06}, {&(0x7f0000000400)="6ceb2f1b274bcd5429aa5e4cdd842b9432dad4ec2398c136faeb1f92fefe09975999d8a3efde6a4d660f4531dee5d0b169a702ce603aa499afcf3cbcee1e7a693403de43667cc51b355521d9dbea13bae315ed4a307121bb73269976d6a696dc10174b6776b2477d1ff9e0c55e3522a60bcc3dad7d57e132efe83b1a6bff4cba8a2d33e18d552313d0ba45ef863f8cc676697652f0b15e72235367c47ea63ce94b36d20144a82bef2090a4d8c5b6d6207de1fcfc8ffdf79ac5d462de53d58fa9159f166128f4898f7e5588006ef828", 0x0, 0x9}], 0x800820, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000140)=@v2={0x5, 0x2, 0x10, 0x492b, 0x59, "c221ba158bb935e7743db151fae5975d5ed0dc77acaccecf89706e1698386e85b91ea24f90b445d8ebfa9be51f8e7859c25902e755541357a72e365f0d06223b0223d40a2e939b0d6ca08c6e963a60d984e68005783cb33b80"}, 0x63, 0x1) prctl$PR_SET_FP_MODE(0x2d, 0x1) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/policy\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000280)='./file0\x00', r2, &(0x7f00000003c0)='./file0\x00') 17:19:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f00000001c0)={0x0, 0xfb, 0xf4, 0x0, 0xec, "4270401fff5645dd29eb4f6a4c432e8a", "5294929b8d9d76b702422e49f55ad24adc457ad8db7653bf7d7ad6af2227f2ab2110886457192b43b3c25a08fce4d73b28fb7bc46af2a584710e708ff0846adae48e8e6bc9d2e6993c2b1659b4ffa059565015334bbf397a10cd0804ffdca297fdbbd7df5e398a94fe4c13cf5992fef5e81ca847bbf69a76027e7865b1a40623ed964364805bbbb193444b3c61b9d9f0c3aa5c9a0146770886a0c23ef3ae36d1587212558bdfad9a73d0443f800c27cdc4bebfb9716adb7778258f458f62b512531c61d54c64deb8803bf2867402ac943eda1ea803f15be97826f17716c7d8"}, 0xf4, 0x2) [ 377.988677] FAULT_INJECTION: forcing a failure. [ 377.988677] name failslab, interval 1, probability 0, space 0, times 0 [ 378.028069] CPU: 1 PID: 22736 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 378.035125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.044490] Call Trace: [ 378.047113] dump_stack+0x138/0x197 [ 378.050756] should_fail.cold+0x10f/0x159 [ 378.054920] should_failslab+0xdb/0x130 [ 378.058907] __kmalloc_track_caller+0x2ec/0x790 [ 378.063609] ? strndup_user+0x62/0xf0 [ 378.063622] memdup_user+0x26/0xa0 [ 378.063634] strndup_user+0x62/0xf0 [ 378.063649] SyS_mount+0x3c/0x120 [ 378.063658] ? copy_mnt_ns+0x8c0/0x8c0 [ 378.063672] do_syscall_64+0x1e8/0x640 [ 378.063679] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 378.063695] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 378.071013] RIP: 0033:0x45c99a [ 378.071019] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 378.071030] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a [ 378.071037] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 [ 378.071043] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 [ 378.071049] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 378.071054] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:39 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:39 executing program 3 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 378.231790] print_req_error: I/O error, dev loop4, sector 128 17:19:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000000300)=[{&(0x7f00000000c0)="6c7e83aaaa376a55592e602fa4163a74e5aed9959b9abb0e8e380fbd67fa5737a76b379b295e37cd69fe6b57cbbfa580c0d8f60789409591b8cdb82851da98e0de7e910fdfaaedb1284672cb5416dec80b5c35acee00a3880d5b94f2b35c959c72a0ed5a8c4554257f5346f8410d1cbd91fba87acfc5e8", 0x77, 0x6}, {&(0x7f00000001c0), 0x0, 0x9}, {&(0x7f0000000200)="fa1fa92a054aaa2373d6e46aa25c4e15020d0ca33f5e7461bbada217fc094e96fabc79bb3ae77cb04fc421393d1cc1ee93796ef0e5dcb35e1961423eba30a219db49b92df95ee039f2e0251e8cf8d9915d08c9a25489e47fb87193e259b6fd711aed24d828479a4b62f2eced73b947d2634a46de335cd7baff65e06830ce4781c711c4720af5fed4c44ecac90501b29af1b75d146b33348d8f2d866fd463eb6e21c733bb924636f0e6a972d3e635ba7f019e9a42892d1318c6974498100bc69252668f9b477355edc8b334bd99291a00162c9834e2dbcfdae7ad67cbad1675528fa4aebffb", 0xe5, 0xefa5}], 0x540008, 0x0) [ 378.362861] FAULT_INJECTION: forcing a failure. [ 378.362861] name failslab, interval 1, probability 0, space 0, times 0 [ 378.390245] CPU: 1 PID: 22768 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 378.397409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.406774] Call Trace: [ 378.409381] dump_stack+0x138/0x197 [ 378.413058] should_fail.cold+0x10f/0x159 [ 378.417200] should_failslab+0xdb/0x130 [ 378.421193] kmem_cache_alloc_trace+0x2e9/0x790 [ 378.425864] ? kasan_check_write+0x14/0x20 [ 378.430088] ? _copy_from_user+0x99/0x110 [ 378.434229] copy_mount_options+0x5c/0x2f0 [ 378.438444] SyS_mount+0x87/0x120 [ 378.441876] ? copy_mnt_ns+0x8c0/0x8c0 [ 378.445747] do_syscall_64+0x1e8/0x640 [ 378.449615] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 378.454453] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 378.459643] RIP: 0033:0x45c99a 17:19:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) sendto$isdn(0xffffffffffffffff, &(0x7f00000000c0)={0x72515340, 0x77dc, "0831c2b210dd4c94e8d749dca02ad4a826762f07525bfa3207f1e68cae"}, 0x25, 0x20000000, &(0x7f00000001c0)={0x22, 0x0, 0x9, 0xff}, 0x6) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000200)={'icmp\x00'}, &(0x7f0000000240)=0x1e) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000080)={0x4, 0x4, 0x8}) [ 378.462814] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 378.470503] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a [ 378.477762] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 [ 378.485013] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 [ 378.492350] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 378.499600] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:40 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:40 executing program 3 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 378.666569] FAULT_INJECTION: forcing a failure. [ 378.666569] name failslab, interval 1, probability 0, space 0, times 0 17:19:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "968e5cd6adf8db33", "ab8279d07812be0a3ea3adf7b7c86ce0", "67271a7c", "6057f1be13a5bc70"}, 0x28) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:40 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x101000, 0x0) syz_open_dev$swradio(&(0x7f0000000240)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000280)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x19, 0x0, &(0x7f0000000040)) write$binfmt_misc(r3, &(0x7f00000007c0)={'syz0', "403a2c29d130cb06b46329fe549363dbec56d0c2739eb9ccaccf2c1584bad878ee7950dc958f89c23a88651185a8b2d171e3a29da46e3bfd04559ccd8dbd5df5b8be0fba05017672c4a4efd2bb94f83e4912247d19b310313d12eeb958e8d30f88d8b63d9e6de92aad0ee02e3bf5bf4add87e8014d13a0ec942aff56d8b659a0d058f40b8c5c67df206e"}, 0x8e) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f00000003c0)={"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"}) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000200)={0x8, 0xe, &(0x7f00000001c0)="910f52b1079332662caddd283b1a"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file1\x00', 0x8000, 0x0) [ 378.732233] CPU: 1 PID: 22794 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 378.739295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.748658] Call Trace: [ 378.751261] dump_stack+0x138/0x197 [ 378.754901] should_fail.cold+0x10f/0x159 [ 378.759064] should_failslab+0xdb/0x130 [ 378.763050] __kmalloc_track_caller+0x2ec/0x790 [ 378.767727] ? unwind_get_return_address+0x61/0xa0 [ 378.772665] ? __save_stack_trace+0x7b/0xd0 [ 378.776997] ? btrfs_parse_early_options+0xa3/0x310 [ 378.782028] kstrdup+0x3a/0x70 [ 378.785235] btrfs_parse_early_options+0xa3/0x310 [ 378.790183] ? btrfs_freeze+0xc0/0xc0 [ 378.793986] ? pcpu_alloc+0xcf0/0x1050 [ 378.794001] ? find_held_lock+0x35/0x130 [ 378.794012] ? pcpu_alloc+0xcf0/0x1050 [ 378.801978] btrfs_mount+0x11d/0x2b28 [ 378.801993] ? lock_downgrade+0x740/0x740 [ 378.802001] ? find_held_lock+0x35/0x130 [ 378.802009] ? pcpu_alloc+0x3af/0x1050 [ 378.802021] ? _find_next_bit+0xee/0x120 [ 378.802030] ? check_preemption_disabled+0x3c/0x250 [ 378.802042] ? btrfs_remount+0x11f0/0x11f0 [ 378.817912] ? rcu_read_lock_sched_held+0x110/0x130 [ 378.817934] ? __lockdep_init_map+0x10c/0x570 [ 378.830880] ? __lockdep_init_map+0x10c/0x570 [ 378.830898] mount_fs+0x97/0x2a1 [ 378.830912] vfs_kern_mount.part.0+0x5e/0x3d0 [ 378.830924] do_mount+0x417/0x27d0 [ 378.830936] ? copy_mount_options+0x5c/0x2f0 [ 378.864921] ? rcu_read_lock_sched_held+0x110/0x130 [ 378.869953] ? copy_mount_string+0x40/0x40 [ 378.874199] ? copy_mount_options+0x1fe/0x2f0 [ 378.878741] SyS_mount+0xab/0x120 [ 378.882202] ? copy_mnt_ns+0x8c0/0x8c0 [ 378.886100] do_syscall_64+0x1e8/0x640 [ 378.889992] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 378.894843] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 378.900058] RIP: 0033:0x45c99a [ 378.903246] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 378.910957] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a [ 378.918226] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 [ 378.925497] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 [ 378.932767] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 378.940035] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:40 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x121400) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f00000000c0), 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:40 executing program 3 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:40 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 379.062874] FAULT_INJECTION: forcing a failure. [ 379.062874] name failslab, interval 1, probability 0, space 0, times 0 [ 379.126695] CPU: 1 PID: 22827 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 379.133755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 379.133762] Call Trace: [ 379.133778] dump_stack+0x138/0x197 [ 379.133796] should_fail.cold+0x10f/0x159 [ 379.153713] should_failslab+0xdb/0x130 [ 379.157707] kmem_cache_alloc+0x2d7/0x780 [ 379.161880] ? lock_downgrade+0x740/0x740 [ 379.166047] alloc_vfsmnt+0x28/0x7d0 [ 379.169753] vfs_kern_mount.part.0+0x2a/0x3d0 [ 379.174237] do_mount+0x417/0x27d0 [ 379.177761] ? copy_mount_options+0x5c/0x2f0 [ 379.182154] ? rcu_read_lock_sched_held+0x110/0x130 [ 379.187159] ? copy_mount_string+0x40/0x40 [ 379.191405] ? copy_mount_options+0x1fe/0x2f0 [ 379.195893] SyS_mount+0xab/0x120 [ 379.199332] ? copy_mnt_ns+0x8c0/0x8c0 [ 379.203206] do_syscall_64+0x1e8/0x640 [ 379.207074] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 379.211906] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 379.217099] RIP: 0033:0x45c99a 17:19:40 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000140)=r2) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000340)=[{&(0x7f0000000080)="6d9125fd6cb4ad6aede86df01dcea98fcae228b4482dc044410e590e7168a8be65a323995ee9fbd145e12348c3e2bfd4b49869d149b19c0638cf187757864b86", 0x40, 0x3}, {&(0x7f00000000c0)="45473d302d246803714ca5180260e8b932b102cb92809932b2b5c97f9748bef1c6578d4a5a2607b35976c0ab677f3a", 0x2f, 0x9}, {&(0x7f00000001c0)="d5c187fa426b5d9a739f6e732aea7b6b68d54c65ce7f0242c4623e956e9461983dc81e12007bc70ff45b9602f2ba98db890deca5b838fd358a7cc3e57e21ae9a38a14a51f321aceb2039cebb816ab213398cc805c57a3d28863f825d30b529561e5b23f95ab051f41d2ff1c44e51ea62ab5f02847c4ef81ff2570f9d22f0ae9cc52c897409fecec5d0f182afd50c1bd6ef6cc6f1c923461b3998c79c0bc3abd98660f1a754c07c5a42bda38e", 0xac, 0x1}, {&(0x7f00000003c0)="05eadba1be06d7fc4eb0837f0c02725c499cb4570dd4a7eac6dda12c3555ade79abd95a71860d57ab235e3780e17b81b7476ff03d9950459dad03f5e6c36f9a6ef87aace182eca0dc05067625ba93916f843dac686093464536fb59dcab687a77eb30d3e87785f7b538c2f9807e193302acdead3db73e9eb8b80fc0bd73f21ff9f059abcfd17bba9e84f540ca69e0dbed7e8c8971b29435fa77e15bdfe12a7f2df663e55ae7bf175404efb26258b43de50cd0539", 0xb4, 0xbab}], 0x0, 0x0) 17:19:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x7, 0x400000) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000100)={0x6, 0x3ea, 0x3, 0x4}, 0x10) [ 379.220297] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 379.228002] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a [ 379.235257] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 [ 379.242536] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 [ 379.249790] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 379.257046] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:40 executing program 3 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 379.445253] FAULT_INJECTION: forcing a failure. [ 379.445253] name failslab, interval 1, probability 0, space 0, times 0 [ 379.473394] CPU: 1 PID: 22857 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 379.480445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 379.480451] Call Trace: [ 379.480470] dump_stack+0x138/0x197 [ 379.480489] should_fail.cold+0x10f/0x159 [ 379.480505] should_failslab+0xdb/0x130 [ 379.496055] __kmalloc+0x2f0/0x7a0 [ 379.504176] ? find_held_lock+0x35/0x130 [ 379.504188] ? pcpu_alloc+0xcf0/0x1050 [ 379.504199] ? btrfs_mount+0x19a/0x2b28 [ 379.504212] btrfs_mount+0x19a/0x2b28 [ 379.523402] ? lock_downgrade+0x740/0x740 [ 379.527549] ? find_held_lock+0x35/0x130 [ 379.527562] ? pcpu_alloc+0x3af/0x1050 [ 379.535509] ? btrfs_remount+0x11f0/0x11f0 [ 379.539756] ? rcu_read_lock_sched_held+0x110/0x130 17:19:41 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f00000000c0)=@ethtool_sset_info={0x37, 0x0, 0x21, [0x1, 0x8, 0x7fff, 0x8]}}) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000080)=0x2) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000000c0)={r5, 0xb21}, 0x14) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f00000001c0)={r5, @in={{0x2, 0x4e24, @multicast1}}}, &(0x7f0000000280)=0x84) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cdffc64312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x8}], 0x0, 0x0) [ 379.544791] ? __lockdep_init_map+0x10c/0x570 [ 379.549294] ? __lockdep_init_map+0x10c/0x570 [ 379.553871] mount_fs+0x97/0x2a1 [ 379.557243] vfs_kern_mount.part.0+0x5e/0x3d0 [ 379.561747] do_mount+0x417/0x27d0 [ 379.565293] ? copy_mount_options+0x5c/0x2f0 [ 379.569709] ? rcu_read_lock_sched_held+0x110/0x130 [ 379.574738] ? copy_mount_string+0x40/0x40 [ 379.578985] ? copy_mount_options+0x1fe/0x2f0 [ 379.583491] SyS_mount+0xab/0x120 [ 379.586947] ? copy_mnt_ns+0x8c0/0x8c0 [ 379.590843] do_syscall_64+0x1e8/0x640 [ 379.594739] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 379.599590] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 379.604767] RIP: 0033:0x45c99a [ 379.607983] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 379.615684] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a [ 379.622940] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 [ 379.630201] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 [ 379.637473] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 17:19:41 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:41 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x703}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x10) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 379.644733] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:41 executing program 3 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 379.827665] FAULT_INJECTION: forcing a failure. [ 379.827665] name failslab, interval 1, probability 0, space 0, times 0 [ 379.839471] CPU: 1 PID: 22888 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 379.846516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 379.855860] Call Trace: [ 379.858443] dump_stack+0x138/0x197 [ 379.862062] should_fail.cold+0x10f/0x159 [ 379.866207] should_failslab+0xdb/0x130 [ 379.870185] __kmalloc_track_caller+0x2ec/0x790 [ 379.874854] ? unwind_get_return_address+0x61/0xa0 [ 379.879780] ? __save_stack_trace+0x7b/0xd0 [ 379.884087] ? btrfs_parse_early_options+0xa3/0x310 [ 379.889091] kstrdup+0x3a/0x70 [ 379.892283] btrfs_parse_early_options+0xa3/0x310 [ 379.897113] ? btrfs_freeze+0xc0/0xc0 [ 379.900895] ? find_next_bit+0x28/0x30 [ 379.904780] ? pcpu_alloc+0xcf0/0x1050 [ 379.908651] ? find_held_lock+0x35/0x130 [ 379.912715] ? pcpu_alloc+0xcf0/0x1050 [ 379.916590] btrfs_mount+0x11d/0x2b28 [ 379.920374] ? lock_downgrade+0x740/0x740 [ 379.924506] ? find_held_lock+0x35/0x130 [ 379.928547] ? pcpu_alloc+0x3af/0x1050 [ 379.932420] ? _find_next_bit+0xee/0x120 [ 379.936483] ? check_preemption_disabled+0x3c/0x250 [ 379.941482] ? btrfs_remount+0x11f0/0x11f0 [ 379.945718] ? rcu_read_lock_sched_held+0x110/0x130 [ 379.950724] ? __lockdep_init_map+0x10c/0x570 [ 379.955205] ? __lockdep_init_map+0x10c/0x570 [ 379.959688] mount_fs+0x97/0x2a1 [ 379.963039] vfs_kern_mount.part.0+0x5e/0x3d0 [ 379.967537] do_mount+0x417/0x27d0 [ 379.971061] ? copy_mount_options+0x5c/0x2f0 [ 379.975451] ? rcu_read_lock_sched_held+0x110/0x130 [ 379.980468] ? copy_mount_string+0x40/0x40 [ 379.984706] ? copy_mount_options+0x1fe/0x2f0 [ 379.989203] SyS_mount+0xab/0x120 [ 379.992638] ? copy_mnt_ns+0x8c0/0x8c0 [ 379.996536] do_syscall_64+0x1e8/0x640 [ 380.000408] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 380.005238] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 380.010415] RIP: 0033:0x45c99a [ 380.013589] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 380.021292] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a [ 380.028547] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 [ 380.035802] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 [ 380.043068] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 380.050328] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:41 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:41 executing program 3 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 380.226491] FAULT_INJECTION: forcing a failure. [ 380.226491] name failslab, interval 1, probability 0, space 0, times 0 [ 380.268680] CPU: 1 PID: 22901 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 380.275752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.285294] Call Trace: [ 380.287907] dump_stack+0x138/0x197 [ 380.291558] should_fail.cold+0x10f/0x159 [ 380.295724] should_failslab+0xdb/0x130 [ 380.299733] __kmalloc_track_caller+0x2ec/0x790 [ 380.304420] ? kstrdup_const+0x48/0x60 [ 380.308327] kstrdup+0x3a/0x70 [ 380.311530] kstrdup_const+0x48/0x60 [ 380.315279] alloc_vfsmnt+0xe5/0x7d0 [ 380.319000] vfs_kern_mount.part.0+0x2a/0x3d0 [ 380.323501] do_mount+0x417/0x27d0 [ 380.327070] ? copy_mount_options+0x5c/0x2f0 [ 380.331487] ? rcu_read_lock_sched_held+0x110/0x130 [ 380.336508] ? copy_mount_string+0x40/0x40 [ 380.340753] ? copy_mount_options+0x1fe/0x2f0 [ 380.345254] SyS_mount+0xab/0x120 [ 380.348707] ? copy_mnt_ns+0x8c0/0x8c0 [ 380.352600] do_syscall_64+0x1e8/0x640 [ 380.356492] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 380.361345] entry_SYSCALL_64_after_hwframe+0x42/0xb7 17:19:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='@\x00\x00\x00 \x00', &(0x7f0000000100)='./file0\x00', 0x475edc1b, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) futimesat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)={{r2, r3/1000+10000}}) [ 380.366538] RIP: 0033:0x45c99a [ 380.369729] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 380.377439] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a [ 380.384708] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 [ 380.391974] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 [ 380.399267] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 380.406533] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:42 executing program 3 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) syz_mount_image$ceph(&(0x7f0000000080)='ceph\x00', &(0x7f00000000c0)='./file0\x00', 0x9, 0x2, &(0x7f00000002c0)=[{&(0x7f00000001c0)="98b4702ff8edf722937c63d2aa4bb5963cde7a38bcd7a8392ab3cf8e3e82a0", 0x1f, 0xe}, {&(0x7f0000000200)="30f4b06798a38a08e2ed46f96207cdb7b55cdec88e443f72bca73aaf0860f131efd4c8e8674056323009b5a246fff180eff1f82ca80347aca810055ed95c899698ebcc97e4b8b27a31c40cc9d78a0398a972505ccfffc99299e8bac1c68f521549e97a25d4785e9dd5773cc45d9593629b6cc54c9ef7e05ce8bf8b7ee18cece783da3f9d08bb8826e3ccaebd912fed", 0x8f, 0x80000000}], 0x2, &(0x7f0000000300)='proc\"trustedselinuxnodevsystemvmnet0\x03(\x95\x00') r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x19, 0x0, &(0x7f0000000040)) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f00000004c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2100000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, r3, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}]}, 0x1c}}, 0x4) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f00000005c0)) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000440)=@ethtool_perm_addr={0x20, 0x2e, "dc1aaacd13c854a6ec69775c8bab289b00859ae7db7c072c4d15b0e182ff9fd2afa30263ac1a446228e4694294da"}}) ioctl$SIOCX25GSUBSCRIP(r1, 0x89e0, &(0x7f0000000340)={'bridge0\x00', 0x7ff, 0xc0000}) 17:19:42 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 380.581199] FAULT_INJECTION: forcing a failure. [ 380.581199] name failslab, interval 1, probability 0, space 0, times 0 [ 380.657617] CPU: 0 PID: 22924 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 380.664685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.674053] Call Trace: [ 380.676669] dump_stack+0x138/0x197 [ 380.680321] should_fail.cold+0x10f/0x159 [ 380.684490] should_failslab+0xdb/0x130 [ 380.688484] kmem_cache_alloc+0x2d7/0x780 [ 380.692646] ? check_preemption_disabled+0x3c/0x250 [ 380.697681] alloc_vfsmnt+0x28/0x7d0 [ 380.701415] vfs_kern_mount.part.0+0x2a/0x3d0 [ 380.705924] ? find_held_lock+0x35/0x130 [ 380.709996] vfs_kern_mount+0x40/0x60 [ 380.713808] btrfs_mount+0x3ce/0x2b28 [ 380.717613] ? lock_downgrade+0x740/0x740 [ 380.721761] ? find_held_lock+0x35/0x130 [ 380.725826] ? pcpu_alloc+0x3af/0x1050 [ 380.729732] ? btrfs_remount+0x11f0/0x11f0 [ 380.733974] ? rcu_read_lock_sched_held+0x110/0x130 [ 380.739007] ? __lockdep_init_map+0x10c/0x570 [ 380.743509] ? __lockdep_init_map+0x10c/0x570 [ 380.748010] mount_fs+0x97/0x2a1 [ 380.751381] vfs_kern_mount.part.0+0x5e/0x3d0 [ 380.755888] do_mount+0x417/0x27d0 [ 380.759431] ? copy_mount_options+0x5c/0x2f0 [ 380.763851] ? rcu_read_lock_sched_held+0x110/0x130 [ 380.768876] ? copy_mount_string+0x40/0x40 [ 380.773124] ? copy_mount_options+0x1fe/0x2f0 [ 380.777622] SyS_mount+0xab/0x120 [ 380.781077] ? copy_mnt_ns+0x8c0/0x8c0 [ 380.784966] do_syscall_64+0x1e8/0x640 [ 380.788857] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 380.793712] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 380.798907] RIP: 0033:0x45c99a [ 380.802100] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 380.809809] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a [ 380.817078] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 [ 380.824352] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 [ 380.831629] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 380.838912] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 380.850294] print_req_error: I/O error, dev loop4, sector 128 17:19:42 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:42 executing program 3 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:42 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) openat$cgroup_subtree(r1, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 380.931065] print_req_error: I/O error, dev loop4, sector 128 17:19:42 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 381.053940] FAULT_INJECTION: forcing a failure. [ 381.053940] name failslab, interval 1, probability 0, space 0, times 0 [ 381.098213] CPU: 0 PID: 22961 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 381.105282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 381.114775] Call Trace: [ 381.117392] dump_stack+0x138/0x197 [ 381.121045] should_fail.cold+0x10f/0x159 [ 381.125217] should_failslab+0xdb/0x130 [ 381.129216] __kmalloc+0x2f0/0x7a0 [ 381.132812] ? find_held_lock+0x35/0x130 [ 381.136886] ? pcpu_alloc+0xcf0/0x1050 [ 381.140792] ? btrfs_mount+0x19a/0x2b28 [ 381.144781] btrfs_mount+0x19a/0x2b28 [ 381.148589] ? lock_downgrade+0x740/0x740 [ 381.152746] ? find_held_lock+0x35/0x130 [ 381.156812] ? pcpu_alloc+0x3af/0x1050 [ 381.160718] ? btrfs_remount+0x11f0/0x11f0 [ 381.164965] ? rcu_read_lock_sched_held+0x110/0x130 [ 381.170000] ? __lockdep_init_map+0x10c/0x570 [ 381.174502] ? __lockdep_init_map+0x10c/0x570 [ 381.179006] mount_fs+0x97/0x2a1 [ 381.182382] vfs_kern_mount.part.0+0x5e/0x3d0 [ 381.186890] do_mount+0x417/0x27d0 [ 381.190459] ? copy_mount_options+0x5c/0x2f0 [ 381.194872] ? rcu_read_lock_sched_held+0x110/0x130 [ 381.199895] ? copy_mount_string+0x40/0x40 [ 381.204143] ? copy_mount_options+0x1fe/0x2f0 [ 381.208649] SyS_mount+0xab/0x120 [ 381.212105] ? copy_mnt_ns+0x8c0/0x8c0 [ 381.216024] do_syscall_64+0x1e8/0x640 [ 381.219916] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 381.224770] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 381.229959] RIP: 0033:0x45c99a [ 381.233147] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 381.240860] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a 17:19:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) accept4$ax25(r2, &(0x7f0000001500)={{0x3, @netrom}, [@bcast, @remote, @remote, @default, @null, @default, @bcast]}, &(0x7f0000001580)=0x48, 0x800) getresuid(&(0x7f00000013c0), &(0x7f0000001400), &(0x7f0000001440)=0x0) r4 = getuid() r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r5, 0x0, 0x19, 0x0, &(0x7f0000000040)) fstat(r5, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0xffffffffffffffff, r8) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0xffffffffffffffff, r10) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x101, 0x3, &(0x7f00000012c0)=[{&(0x7f00000001c0)="d7b6437f1539469f9fccfbb3a72fe71989aa29b5d23d028a51c20109e415a1605edee10cabb200770e09155ba750d2f0", 0x30, 0x8b}, {&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="2003649dadde566025cffe70d9300506dc241356a5182a3eaf85dd0ab573d940bd7dfd0b426684df3df57974fea4d06edea154b8c1438e14d0a5b0ea1cbb351b97f7dff94497b61a638a4bf732c74155f0091848be52dfd459ace03f17f54fb06e08e9bd045faf3a56e631e426c05257fa9c85aa83da5714eba337ca126b12d13b5f3d2989677233f77b4fd429dc33cd0560470c5fc04a808a351fe689c9e5f5b98bbd2382bf69021cdd646ab70bf305d2be5283507b3ad74d24ebb69a", 0xbd}], 0x880010, &(0x7f0000001840)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r0, @ANYBLOB=',shortname=winnt,nonumtail=0,nnonumtail=1,uid>', @ANYRESDEC=r3, @ANYBLOB="2c736d61636b66736861743d6274726673002c657569643e1a90f5b1f6eebd73f89baaa0d90963489cfde399ef6eb68bcf3aaa565883181e8b93af59caa05870d4cc5aa6ee5c0aa4701c51ab95d7ad1d65e393ca5d7d9bdea3dcb863542f002b9a8df4c470d91bd4dbe7242d4fa6ebc5ebef5c66a9cca12af5d5d92bfafa9cbd8bd1179e6534cf19b2ca668bd90efafe8b2ed314813e9c32249e894f334081d16bcaa33048e48477991054a6ab662d5c787ef188", @ANYRESDEC=r4, @ANYBLOB=',pcr=00000000000000000014,fowner<', @ANYRESDEC=r6, @ANYBLOB=',euid=', @ANYRESDEC=r8, @ANYBLOB="2c657569643c36361d70e6ca99d1d17c9453ff2ace9fa26941f9f877f6e27862a2b0e01d9d0f439b144f881a06a8f9e2a8439dc7f8fa9ef1576b9a83", @ANYRESDEC=r10, @ANYBLOB=',\x00']) [ 381.248134] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 [ 381.255409] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 [ 381.262686] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 381.269967] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 381.280102] net_ratelimit: 22 callbacks suppressed [ 381.280106] protocol 88fb is buggy, dev hsr_slave_0 [ 381.290167] protocol 88fb is buggy, dev hsr_slave_1 17:19:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8001, 0xaaaaaaaaaaaa939, &(0x7f0000000040), 0x8000, 0x0) 17:19:42 executing program 3 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 381.370787] FAULT_INJECTION: forcing a failure. [ 381.370787] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 381.396342] CPU: 0 PID: 22981 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 381.403409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 381.403415] Call Trace: [ 381.403433] dump_stack+0x138/0x197 [ 381.403453] should_fail.cold+0x10f/0x159 [ 381.403466] ? __might_sleep+0x93/0xb0 [ 381.403481] __alloc_pages_nodemask+0x1d6/0x7a0 [ 381.403490] ? check_preemption_disabled+0x3c/0x250 [ 381.403501] ? __alloc_pages_slowpath+0x2930/0x2930 [ 381.441713] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 381.447153] ? __alloc_pages_nodemask+0x639/0x7a0 [ 381.452001] alloc_pages_current+0xec/0x1e0 [ 381.456306] ? btrfs_parse_early_options+0x1a2/0x310 [ 381.461394] __get_free_pages+0xf/0x40 [ 381.465262] get_zeroed_page+0x11/0x20 [ 381.469134] selinux_sb_copy_data+0x2a/0x390 [ 381.473531] security_sb_copy_data+0x75/0xb0 [ 381.477923] parse_security_options+0x37/0xa0 [ 381.482402] btrfs_mount+0x2bb/0x2b28 [ 381.486185] ? lock_downgrade+0x740/0x740 [ 381.490315] ? find_held_lock+0x35/0x130 [ 381.494358] ? pcpu_alloc+0x3af/0x1050 [ 381.498233] ? btrfs_remount+0x11f0/0x11f0 [ 381.502456] ? rcu_read_lock_sched_held+0x110/0x130 [ 381.507463] ? __lockdep_init_map+0x10c/0x570 [ 381.511948] mount_fs+0x97/0x2a1 [ 381.515305] vfs_kern_mount.part.0+0x5e/0x3d0 [ 381.519799] ? find_held_lock+0x35/0x130 [ 381.523848] vfs_kern_mount+0x40/0x60 [ 381.527658] btrfs_mount+0x3ce/0x2b28 [ 381.531447] ? lock_downgrade+0x740/0x740 [ 381.535580] ? find_held_lock+0x35/0x130 [ 381.539625] ? pcpu_alloc+0x3af/0x1050 [ 381.543503] ? btrfs_remount+0x11f0/0x11f0 [ 381.548248] ? rcu_read_lock_sched_held+0x110/0x130 [ 381.553254] ? __lockdep_init_map+0x10c/0x570 [ 381.557736] ? __lockdep_init_map+0x10c/0x570 [ 381.562221] mount_fs+0x97/0x2a1 [ 381.565577] vfs_kern_mount.part.0+0x5e/0x3d0 [ 381.570066] do_mount+0x417/0x27d0 [ 381.573592] ? copy_mount_options+0x5c/0x2f0 [ 381.577984] ? rcu_read_lock_sched_held+0x110/0x130 [ 381.582988] ? copy_mount_string+0x40/0x40 [ 381.587226] ? copy_mount_options+0x1fe/0x2f0 [ 381.591725] SyS_mount+0xab/0x120 [ 381.595180] ? copy_mnt_ns+0x8c0/0x8c0 [ 381.599057] do_syscall_64+0x1e8/0x640 [ 381.602932] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 381.607782] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 381.612956] RIP: 0033:0x45c99a [ 381.616130] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 381.623823] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a [ 381.631075] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 [ 381.638329] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 [ 381.645579] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 381.652920] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:43 executing program 0: syz_mount_image$iso9660(&(0x7f0000000140)='iso9660\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="646d6f64653d3078303030302030303030303030303030302c00d9a7ff4a5386851a4abae52a6404b89c640f7283d5cb6c93d708ae683b18cc7ca09e532a52d2830bb9722771699e5208c8d3c8334143f64a612382e8399a0ca70809617c1d5271f617222f301a76188cac031a526a4487ecc4345fec44766c0dc7b6f09cf74805a33a7ad4f8113e968eda5f5adedb1c8a3616f4c157976ea2fe0dbf4fea3ff4dd509c23d8a21a4676c96b54f956d9c9829689b4ad58683490a73acab28632dedeaafa6836b20819944c334edbe57906038093147926aa4d67a8158c566547a6ec1dfc37a59d4ef27f1215ae1f3b25b28b17048dbc"]) lsetxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000400)='security.SMACK64MMAP\x00', &(0x7f0000000440)='\x00', 0x1, 0x2) syz_mount_image$iso9660(&(0x7f0000000080)='iso9660\x00', &(0x7f00000000c0)='./file1\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f00000001c0), 0x0, 0x8}, {&(0x7f0000000200)="6c3a8a45d9d48a25967555d67b45060f53abfcc456ecb350a2001d4434c87ecc829554cd83b75f8cca3ae0536e089299de66b933a62303b24afe387a3124dd255b1b02e7d13e7d64bdfd77e8599b37d2f8b87b7f3e3294c8cadeb184e35fb0730f5ab87f4183a62e6b5006c822e3e2e66663d3dc3ed49fc55945d07593ff", 0x7e, 0x8}, {&(0x7f0000000280)="04730f543ca0f047e8ee", 0xa, 0x2}], 0x8800, &(0x7f0000000340)={[], [{@context={'context', 0x3d, 'user_u'}}, {@measure='measure'}, {@subj_user={'subj_user', 0x3d, 'dmode'}}]}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xaaaaaaaaaaaada9, &(0x7f0000000040), 0x0, 0x0) 17:19:43 executing program 3 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 381.761707] FAULT_INJECTION: forcing a failure. [ 381.761707] name failslab, interval 1, probability 0, space 0, times 0 [ 381.776691] CPU: 1 PID: 22991 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 381.783748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 381.793118] Call Trace: [ 381.795722] dump_stack+0x138/0x197 [ 381.799372] should_fail.cold+0x10f/0x159 [ 381.803546] should_failslab+0xdb/0x130 [ 381.807538] __kmalloc+0x2f0/0x7a0 [ 381.811088] ? match_token+0x22b/0x480 [ 381.814984] ? match_strdup+0x5f/0xa0 [ 381.818789] match_strdup+0x5f/0xa0 [ 381.822424] btrfs_parse_early_options+0x241/0x310 [ 381.827366] ? btrfs_freeze+0xc0/0xc0 [ 381.831167] ? find_next_bit+0x28/0x30 [ 381.835064] ? pcpu_alloc+0xcf0/0x1050 [ 381.838953] ? pcpu_alloc+0xcf0/0x1050 [ 381.842846] btrfs_mount+0x11d/0x2b28 [ 381.846637] ? lock_downgrade+0x740/0x740 [ 381.850784] ? find_held_lock+0x35/0x130 [ 381.854848] ? pcpu_alloc+0x3af/0x1050 [ 381.858758] ? _find_next_bit+0xee/0x120 [ 381.862824] ? check_preemption_disabled+0x3c/0x250 [ 381.867870] ? btrfs_remount+0x11f0/0x11f0 [ 381.872111] ? rcu_read_lock_sched_held+0x110/0x130 [ 381.877143] ? __lockdep_init_map+0x10c/0x570 [ 381.881643] ? __lockdep_init_map+0x10c/0x570 [ 381.886143] mount_fs+0x97/0x2a1 [ 381.889526] vfs_kern_mount.part.0+0x5e/0x3d0 [ 381.894026] ? find_held_lock+0x35/0x130 [ 381.898094] vfs_kern_mount+0x40/0x60 [ 381.901904] btrfs_mount+0x3ce/0x2b28 [ 381.905707] ? lock_downgrade+0x740/0x740 [ 381.909853] ? find_held_lock+0x35/0x130 [ 381.913923] ? pcpu_alloc+0x3af/0x1050 [ 381.917820] ? btrfs_remount+0x11f0/0x11f0 [ 381.922068] ? rcu_read_lock_sched_held+0x110/0x130 [ 381.927095] ? __lockdep_init_map+0x10c/0x570 [ 381.931619] ? __lockdep_init_map+0x10c/0x570 [ 381.936121] mount_fs+0x97/0x2a1 [ 381.939495] vfs_kern_mount.part.0+0x5e/0x3d0 [ 381.944000] do_mount+0x417/0x27d0 [ 381.947562] ? copy_mount_options+0x5c/0x2f0 [ 381.951975] ? rcu_read_lock_sched_held+0x110/0x130 [ 381.956995] ? copy_mount_string+0x40/0x40 [ 381.961235] ? copy_mount_options+0x1fe/0x2f0 [ 381.965743] SyS_mount+0xab/0x120 [ 381.969214] ? copy_mnt_ns+0x8c0/0x8c0 [ 381.973108] do_syscall_64+0x1e8/0x640 [ 381.976998] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 381.981852] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 381.987044] RIP: 0033:0x45c99a [ 381.990230] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 381.997945] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a [ 382.005215] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 17:19:43 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 382.012485] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 [ 382.019758] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 382.027037] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:43 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000140)=[{&(0x7f0000001200)="95f5d75eb7e0d2e35d6230bf7d250000", 0x10, 0x8362}, {&(0x7f00000001c0)="3ba4388f8e6223d0330de42bcf09ad9890969b1fa6b281904950961e46334c0ac3e36cf3c3599634c651075b2b10dd0edb05fc3fd10d01813824a6625cc4c1", 0x3f, 0x5}, {&(0x7f0000001280)="4163a63677d4e9f4e0156bc9508d7371f99a25e3f7b7ec60ece7eee39de4d8e60de26bd30b1b3d89b359289d580d6fe0d4d97ce71cd25eb28652170a3a64081b52eb753983e7bb3e6fbe85698a3d874e5361dc132972f1fbe8195d1cf97e4000742fe3f376d71f0d459cd38f6bd0efce14747128ba4fb115821a6403a6635265b68a0805fd8b8b6973b3117c447d8f43a2980deac8416c50b7cbd3a2007571306f610f7bf1ce620868b1e2bd11efe48e7e9761d8b0e98c556c344b9b3c84dd31e4c1553901603b91a23c2d4f83df5eccc540f888f6bdc88919c14efdffb2", 0x348, 0x7}], 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6000) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x19, 0x0, &(0x7f0000000040)) r4 = socket$inet6(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000003c0)=0x9) r5 = dup(r4) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="37242eb52d97042e20000000"]}) io_cancel(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8, 0x815, r3, &(0x7f0000000200)="6c773b8e0002b0c4fde0da5e58d67365929c1f7e9b059942933ee147d61ca1e3b9ee9567aee5b216d3e1a16fb685b366ccf995bd6d5e20af7e5a47e443fe4525d1b6716859facc90dbb410df1eaf8ecffe4b42df75bef84bbe16313aedcb21ac14ee58dd75d6b979902cd09a3f1c9f99c349b7b24a80cb67e3cfd96918eb7b4f6a1e27fc795f527e673510d1c7696fba26e16a4202f36d632b984bb690a031da6611dbf24cc57d13b5415e31fde371b763e5b01f", 0xb4, 0x80000000, 0x0, 0x2, r5}, &(0x7f0000000300)) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r8 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x50000) ioctl$KVM_SET_MSRS(r8, 0x4008ae89, &(0x7f0000000440)={0x7, 0x0, [{0x176, 0x0, 0x80000000}, {0x928, 0x0, 0xdd}, {0x380, 0x0, 0x10000}, {0x936, 0x0, 0x31f1}, {0x32d, 0x0, 0x3}, {0xf839db5734e992a9, 0x0, 0x3}, {0x8a7, 0x0, 0xffffffffffffffff}]}) ioctl$TIOCGPTLCK(r7, 0x80045439, &(0x7f0000000380)) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x7fffffff, 0x2, 0xff, 0x2, 0x100, 0x2}, &(0x7f0000000080)=0x20) munlockall() syz_open_dev$video(&(0x7f0000000500)='/dev/video#\x00', 0x3, 0x200) 17:19:43 executing program 0: syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x100000001, 0x101000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:43 executing program 3 (fault-call:0 fault-nth:61): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 382.316178] FAULT_INJECTION: forcing a failure. [ 382.316178] name failslab, interval 1, probability 0, space 0, times 0 [ 382.320112] protocol 88fb is buggy, dev hsr_slave_0 [ 382.327682] protocol 88fb is buggy, dev hsr_slave_0 [ 382.332678] protocol 88fb is buggy, dev hsr_slave_1 [ 382.337649] protocol 88fb is buggy, dev hsr_slave_1 [ 382.342737] protocol 88fb is buggy, dev hsr_slave_0 [ 382.347716] protocol 88fb is buggy, dev hsr_slave_0 [ 382.352691] protocol 88fb is buggy, dev hsr_slave_1 [ 382.357701] protocol 88fb is buggy, dev hsr_slave_1 [ 382.368395] CPU: 0 PID: 23029 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 382.375442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.384803] Call Trace: [ 382.387384] dump_stack+0x138/0x197 [ 382.391000] should_fail.cold+0x10f/0x159 [ 382.395136] should_failslab+0xdb/0x130 [ 382.399097] __kmalloc+0x2f0/0x7a0 [ 382.402640] ? match_token+0x22b/0x480 [ 382.406511] ? match_strdup+0x5f/0xa0 [ 382.410294] match_strdup+0x5f/0xa0 [ 382.413924] btrfs_parse_early_options+0x241/0x310 [ 382.418839] ? btrfs_freeze+0xc0/0xc0 [ 382.422622] ? find_next_bit+0x28/0x30 [ 382.426492] ? pcpu_alloc+0xcf0/0x1050 [ 382.430363] ? pcpu_alloc+0xcf0/0x1050 [ 382.434238] btrfs_mount+0x11d/0x2b28 [ 382.438026] ? lock_downgrade+0x740/0x740 [ 382.442156] ? find_held_lock+0x35/0x130 [ 382.446199] ? pcpu_alloc+0x3af/0x1050 [ 382.450072] ? _find_next_bit+0xee/0x120 [ 382.454135] ? check_preemption_disabled+0x3c/0x250 [ 382.459152] ? btrfs_remount+0x11f0/0x11f0 [ 382.463380] ? rcu_read_lock_sched_held+0x110/0x130 [ 382.468391] ? __lockdep_init_map+0x10c/0x570 [ 382.472871] ? __lockdep_init_map+0x10c/0x570 [ 382.477355] mount_fs+0x97/0x2a1 [ 382.480710] vfs_kern_mount.part.0+0x5e/0x3d0 [ 382.485191] ? find_held_lock+0x35/0x130 [ 382.489240] vfs_kern_mount+0x40/0x60 [ 382.493028] btrfs_mount+0x3ce/0x2b28 [ 382.496814] ? lock_downgrade+0x740/0x740 [ 382.500969] ? find_held_lock+0x35/0x130 [ 382.505014] ? pcpu_alloc+0x3af/0x1050 [ 382.508894] ? btrfs_remount+0x11f0/0x11f0 [ 382.513135] ? rcu_read_lock_sched_held+0x110/0x130 [ 382.518145] ? __lockdep_init_map+0x10c/0x570 [ 382.522627] ? __lockdep_init_map+0x10c/0x570 [ 382.527111] mount_fs+0x97/0x2a1 [ 382.530467] vfs_kern_mount.part.0+0x5e/0x3d0 [ 382.534950] do_mount+0x417/0x27d0 [ 382.538508] ? retint_kernel+0x2d/0x2d [ 382.542402] ? copy_mount_string+0x40/0x40 [ 382.546634] ? copy_mount_options+0x17c/0x2f0 [ 382.551118] ? copy_mount_options+0x1fe/0x2f0 [ 382.555620] SyS_mount+0xab/0x120 [ 382.559057] ? copy_mnt_ns+0x8c0/0x8c0 [ 382.562930] do_syscall_64+0x1e8/0x640 [ 382.566816] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 382.571644] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 382.576829] RIP: 0033:0x45c99a [ 382.580125] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 382.587818] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a [ 382.595074] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 [ 382.602330] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 [ 382.609583] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 17:19:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='d\x92\xd3hs\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000040)=[{&(0x7f00000001c0)="8dede2ffff0302000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b005aa3c95181e3287210a36e849a98e99d920efd9a000001000000000001fffffff600005f4d00"/88, 0x58, 0x10000}], 0xdb991d4044fb6e00, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v1={0x1000000, [{0x8, 0xa9}]}, 0xc, 0x2) [ 382.616852] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='\x00\x10\x00', &(0x7f0000000100)='./file1\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) ioctl$VIDIOC_RESERVED(r1, 0x5601, 0x0) 17:19:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x19, 0x0, &(0x7f0000000040)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000080)=0xe8) 17:19:44 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:44 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='bW\tfs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x0, &(0x7f0000000040), 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') 17:19:44 executing program 3 (fault-call:0 fault-nth:62): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xb27, &(0x7f0000000040), 0x0, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x8c1381f97ebbb20d, 0x0) mknodat(r1, &(0x7f0000000140)='./file0\x00', 0x8400, 0x635a) sched_setaffinity(r0, 0x8, &(0x7f0000000080)=0x4) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x3}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000200)={0x2, 0x0, 0x200, 0x2, r3}, &(0x7f0000000240)=0x10) [ 383.262419] FAULT_INJECTION: forcing a failure. [ 383.262419] name failslab, interval 1, probability 0, space 0, times 0 [ 383.300897] CPU: 0 PID: 23094 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 383.307958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.317320] Call Trace: [ 383.319918] dump_stack+0x138/0x197 [ 383.323561] should_fail.cold+0x10f/0x159 [ 383.327729] should_failslab+0xdb/0x130 [ 383.331713] __kmalloc_track_caller+0x2ec/0x790 [ 383.336398] ? kstrdup_const+0x48/0x60 [ 383.340296] kstrdup+0x3a/0x70 [ 383.343494] kstrdup_const+0x48/0x60 [ 383.347216] alloc_vfsmnt+0xe5/0x7d0 [ 383.350932] vfs_kern_mount.part.0+0x2a/0x3d0 [ 383.355429] ? find_held_lock+0x35/0x130 [ 383.359495] vfs_kern_mount+0x40/0x60 [ 383.363308] btrfs_mount+0x3ce/0x2b28 [ 383.367112] ? lock_downgrade+0x740/0x740 [ 383.371258] ? find_held_lock+0x35/0x130 [ 383.375408] ? pcpu_alloc+0x3af/0x1050 [ 383.379309] ? btrfs_remount+0x11f0/0x11f0 [ 383.383552] ? rcu_read_lock_sched_held+0x110/0x130 [ 383.388605] ? __lockdep_init_map+0x10c/0x570 [ 383.393101] ? __lockdep_init_map+0x10c/0x570 [ 383.397600] mount_fs+0x97/0x2a1 [ 383.400974] vfs_kern_mount.part.0+0x5e/0x3d0 [ 383.405475] do_mount+0x417/0x27d0 [ 383.409100] ? retint_kernel+0x2d/0x2d [ 383.412989] ? copy_mount_string+0x40/0x40 [ 383.417225] ? copy_mount_options+0x17c/0x2f0 [ 383.421729] ? copy_mount_options+0x1fe/0x2f0 [ 383.426229] SyS_mount+0xab/0x120 [ 383.429689] ? copy_mnt_ns+0x8c0/0x8c0 [ 383.433584] do_syscall_64+0x1e8/0x640 [ 383.437471] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 383.442320] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 383.447507] RIP: 0033:0x45c99a [ 383.450694] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 17:19:45 executing program 3 (fault-call:0 fault-nth:63): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 383.458441] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a [ 383.465710] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 [ 383.472984] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 [ 383.480251] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 383.487532] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10001}], 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x8d, 0x100000) r1 = socket$inet6(0xa, 0x2, 0x0) dup(r1) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000000c0)={r3, 0xb21}, 0x14) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000001c0)={r3, @in6={{0xa, 0x4e22, 0x1, @local, 0xffffffff}}, 0x200, 0x0, 0x3, 0xe32, 0x6}, &(0x7f0000000280)=0x98) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000002c0)={0x1, 0x8200, 0x2058, 0x6, r4}, 0x10) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x40000, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r6, 0xc0502100, &(0x7f0000000400)={0x0, 0x0}) getpriority(0x2, r7) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000000c0)={r9, 0xb21}, 0x14) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000300)={r9, 0xd, "ed03128ea68f7c92dfce37d121"}, &(0x7f0000000340)=0x15) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000380)={r10, 0x2c1c}, &(0x7f00000003c0)=0x8) [ 383.610619] FAULT_INJECTION: forcing a failure. [ 383.610619] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 383.622464] CPU: 0 PID: 23111 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 383.629528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.638892] Call Trace: [ 383.641497] dump_stack+0x138/0x197 [ 383.645143] should_fail.cold+0x10f/0x159 [ 383.649307] __alloc_pages_nodemask+0x1d6/0x7a0 [ 383.653992] ? __alloc_pages_slowpath+0x2930/0x2930 [ 383.659035] cache_grow_begin+0x80/0x400 [ 383.663117] kmem_cache_alloc+0x6a6/0x780 [ 383.667284] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 383.672401] getname_kernel+0x53/0x350 [ 383.676329] kern_path+0x20/0x40 [ 383.679706] lookup_bdev.part.0+0x63/0x160 [ 383.684120] ? blkdev_open+0x260/0x260 [ 383.688133] ? free_hot_cold_page+0x763/0xca0 [ 383.692639] blkdev_get_by_path+0x76/0xf0 [ 383.696800] btrfs_scan_one_device+0x97/0x400 [ 383.701320] ? device_list_add+0x8d0/0x8d0 [ 383.705557] ? __free_pages+0x54/0x90 [ 383.709362] ? free_pages+0x46/0x50 [ 383.712997] btrfs_mount+0x2e3/0x2b28 [ 383.716803] ? lock_downgrade+0x740/0x740 [ 383.720986] ? find_held_lock+0x35/0x130 [ 383.725071] ? pcpu_alloc+0x3af/0x1050 [ 383.728995] ? btrfs_remount+0x11f0/0x11f0 [ 383.733237] ? rcu_read_lock_sched_held+0x110/0x130 [ 383.738268] ? __lockdep_init_map+0x10c/0x570 [ 383.738298] mount_fs+0x97/0x2a1 [ 383.746142] vfs_kern_mount.part.0+0x5e/0x3d0 [ 383.746154] ? find_held_lock+0x35/0x130 [ 383.746168] vfs_kern_mount+0x40/0x60 17:19:45 executing program 2: r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100)={0xffffffffffffffff}, 0xc) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x210080, 0x1c0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x19, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet6_icmp_ICMP_FILTER(r6, 0x1, 0x1, &(0x7f0000000800)={0xfffffffd}, 0x4) r7 = dup(r3) getsockname$unix(r5, &(0x7f0000000840)=@abs, &(0x7f00000008c0)=0x6e) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r7, 0xc00c642e, &(0x7f0000000200)={0x0, 0x80000, 0xffffffffffffffff}) poll(&(0x7f0000000240)=[{0xffffffffffffffff, 0x1098}, {r0, 0x100}, {r1, 0x100}, {r2, 0x20}, {r8, 0x5}], 0x5, 0x2569) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r9 = socket$inet6(0xa, 0x2, 0x0) r10 = dup(r9) ioctl$sock_SIOCETHTOOL(r10, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) fstat(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfs(&(0x7f0000000280)='hfs\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x6, &(0x7f0000000600)=[{&(0x7f0000000300)="34b7f100014251b410ae01fbc2e0cc6962fd5aa968e8138fe24df632484b18510e206bfa58f5aed2d913a3b50fce0a93513e5204416f5c", 0x37, 0x7}, {&(0x7f0000000340)="079507b1cff285a8753dd4d614c0b20754d57c028eae6c229188b4e2d43eb40ab57eab10adfa39e6d535bdae3f4c1642ab17d79e1967d5959dd6aede3e1bc512dca0c979179705ce8fc8c95c78532904d0de67e6a0d21fcfdfe8e5ed1a5073b247a5c203", 0x64, 0x3}, {&(0x7f00000003c0)="71acf73328c401d11713887845f53ede9aac708d20a7c16cc9c1d9bd1bc080fb4a431a093ff1a60f5f91320d2f3056c344d7d3c13bdde83302a0c4b38a82aebca547df2fafe8951fea9e16f3910bd18370c13ba9c06118512e8181bab97ee934c4532c1733728d5a886a6fa55c607e211cb7235d4f6fdf13782215f642be206073e8cc33fa53f0b73c6ec7398546166eea1162c1b9f5b9b77854158d088b3bd266d8adf629bc67329e54df021feb57ae8a5889784d0207e8b7e83aecd94f2b17b3d8f297b1a23cd2fc5798a6e187716b79039068bd1d69865f35324fbf", 0xdd, 0x20b6}, {&(0x7f00000004c0)="e0377569dca2345957e3cdc02dfb23ca85e4d1eeec128c6c4143b023671f687bc0c72000a3184bf38a2bef81d7b03a0c7c70", 0x32, 0x7fffffff}, {&(0x7f0000000500)="c90ef80a76a4276041c8732354ad24", 0xf, 0x7}, {&(0x7f0000000540)="cf3c7abeffb1ff9ae4822c11b9f2bb577f3d2970e40bc55f3b3554552603561ba7df3549c7b1b19945be391d2144fc97f36dc48ec75dd4f1f831fa28682bb9efcbb25349cd8bad29b562246baa18cc8b54018661df190f132b1eff8c877a7e8bfc2b4c575983a48fd6ac583d1180d2fae539ebd3bdd2f4baa9e7d08460f01f239e562154d4fc05b0861b6a44b765054260502300683279", 0x97, 0x3825}], 0x2000800, &(0x7f0000000740)={[{@dir_umask={'dir_umask', 0x3d, 0x8}}, {@type={'type', 0x3d, "3ddad423"}}, {@part={'part', 0x3d, 0xed}}], [{@appraise='appraise'}, {@euid_eq={'euid', 0x3d, r11}}, {@subj_type={'subj_type', 0x3d, 'trusted.ppp1wlan0keyringuser'}}, {@smackfsroot={'smackfsroot', 0x3d, '/$'}}]}) setsockopt$packet_tx_ring(r10, 0x107, 0xd, &(0x7f00000000c0)=@req3={0xb1, 0x8, 0x4, 0x6, 0x0, 0x1, 0x2}, 0x1c) [ 383.758518] btrfs_mount+0x3ce/0x2b28 [ 383.762322] ? lock_downgrade+0x740/0x740 [ 383.766476] ? find_held_lock+0x35/0x130 [ 383.770540] ? pcpu_alloc+0x3af/0x1050 [ 383.774438] ? btrfs_remount+0x11f0/0x11f0 [ 383.778709] ? rcu_read_lock_sched_held+0x110/0x130 [ 383.783740] ? __lockdep_init_map+0x10c/0x570 [ 383.788243] ? __lockdep_init_map+0x10c/0x570 [ 383.792739] mount_fs+0x97/0x2a1 [ 383.796097] vfs_kern_mount.part.0+0x5e/0x3d0 [ 383.800580] do_mount+0x417/0x27d0 [ 383.804107] ? copy_mount_options+0x5c/0x2f0 [ 383.808506] ? rcu_read_lock_sched_held+0x110/0x130 [ 383.813508] ? copy_mount_string+0x40/0x40 [ 383.817727] ? copy_mount_options+0x1fe/0x2f0 [ 383.822228] SyS_mount+0xab/0x120 [ 383.825693] ? copy_mnt_ns+0x8c0/0x8c0 [ 383.829570] do_syscall_64+0x1e8/0x640 [ 383.833464] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 383.833484] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 383.833491] RIP: 0033:0x45c99a [ 383.833500] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 [ 383.843517] ORIG_RAX: 00000000000000a5 17:19:45 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x20) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:45 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffff9, 0x0, &(0x7f0000000000), 0x802080, 0x0) [ 383.843523] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a [ 383.843529] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 [ 383.843534] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 [ 383.843540] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 383.843546] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:45 executing program 3 (fault-call:0 fault-nth:64): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 384.012888] FAULT_INJECTION: forcing a failure. [ 384.012888] name failslab, interval 1, probability 0, space 0, times 0 [ 384.025669] CPU: 1 PID: 23143 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 384.032723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.042088] Call Trace: [ 384.044696] dump_stack+0x138/0x197 [ 384.048364] should_fail.cold+0x10f/0x159 [ 384.052675] should_failslab+0xdb/0x130 [ 384.056654] kmem_cache_alloc_trace+0x2e9/0x790 [ 384.061322] selinux_parse_opts_str+0x42c/0xa30 [ 384.065977] ? selinux_sb_show_options+0xd50/0xd50 [ 384.070908] ? free_pages+0x46/0x50 [ 384.074522] ? selinux_sb_copy_data+0x21e/0x390 [ 384.079182] security_sb_parse_opts_str+0x75/0xb0 [ 384.084018] parse_security_options+0x4e/0xa0 [ 384.088590] btrfs_mount+0x2bb/0x2b28 [ 384.092376] ? lock_downgrade+0x740/0x740 [ 384.096508] ? find_held_lock+0x35/0x130 [ 384.100555] ? pcpu_alloc+0x3af/0x1050 [ 384.104432] ? btrfs_remount+0x11f0/0x11f0 [ 384.108660] ? rcu_read_lock_sched_held+0x110/0x130 [ 384.113670] ? __lockdep_init_map+0x10c/0x570 [ 384.118156] mount_fs+0x97/0x2a1 [ 384.121551] vfs_kern_mount.part.0+0x5e/0x3d0 [ 384.126029] ? find_held_lock+0x35/0x130 [ 384.130077] vfs_kern_mount+0x40/0x60 [ 384.133864] btrfs_mount+0x3ce/0x2b28 [ 384.137650] ? lock_downgrade+0x740/0x740 [ 384.141867] ? find_held_lock+0x35/0x130 [ 384.145932] ? pcpu_alloc+0x3af/0x1050 [ 384.149808] ? btrfs_remount+0x11f0/0x11f0 [ 384.154034] ? rcu_read_lock_sched_held+0x110/0x130 [ 384.159063] ? __lockdep_init_map+0x10c/0x570 [ 384.163544] ? __lockdep_init_map+0x10c/0x570 [ 384.168030] mount_fs+0x97/0x2a1 [ 384.171398] vfs_kern_mount.part.0+0x5e/0x3d0 [ 384.175880] do_mount+0x417/0x27d0 [ 384.179419] ? copy_mount_options+0x5c/0x2f0 [ 384.183813] ? rcu_read_lock_sched_held+0x110/0x130 [ 384.188818] ? copy_mount_string+0x40/0x40 [ 384.193041] ? copy_mount_options+0x1fe/0x2f0 [ 384.197537] SyS_mount+0xab/0x120 [ 384.200976] ? copy_mnt_ns+0x8c0/0x8c0 [ 384.204860] do_syscall_64+0x1e8/0x640 [ 384.208729] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 384.213576] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 384.218749] RIP: 0033:0x45c99a [ 384.221920] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 384.229612] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a [ 384.236968] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 [ 384.244223] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 [ 384.251476] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 384.258728] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x800, 0x400) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000001c0)={0x2, {{0x2, 0x4e22, @rand_addr=0x20}}}, 0x88) 17:19:45 executing program 3 (fault-call:0 fault-nth:65): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 384.366474] FAULT_INJECTION: forcing a failure. [ 384.366474] name failslab, interval 1, probability 0, space 0, times 0 [ 384.379257] CPU: 1 PID: 23159 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 384.386324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.395856] Call Trace: [ 384.398441] dump_stack+0x138/0x197 [ 384.402058] should_fail.cold+0x10f/0x159 [ 384.406260] should_failslab+0xdb/0x130 [ 384.410222] kmem_cache_alloc+0x2d7/0x780 [ 384.414356] ? delete_node+0x1fb/0x690 [ 384.418225] ? save_trace+0x290/0x290 [ 384.422031] alloc_buffer_head+0x24/0xe0 [ 384.426076] alloc_page_buffers+0xb7/0x200 [ 384.430307] create_empty_buffers+0x39/0x480 [ 384.434746] ? __lock_is_held+0xb6/0x140 [ 384.438802] ? check_preemption_disabled+0x3c/0x250 [ 384.443809] create_page_buffers+0x153/0x1c0 [ 384.448206] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 384.453652] block_read_full_page+0xcd/0x960 [ 384.458093] ? set_init_blocksize+0x220/0x220 [ 384.462585] ? __lru_cache_add+0x18a/0x250 [ 384.466819] ? __bread_gfp+0x290/0x290 [ 384.470689] ? add_to_page_cache_lru+0x159/0x310 [ 384.475438] ? add_to_page_cache_locked+0x40/0x40 [ 384.480877] blkdev_readpage+0x1d/0x30 [ 384.484764] do_read_cache_page+0x671/0xfc0 [ 384.489090] ? blkdev_writepages+0xd0/0xd0 [ 384.493313] ? find_get_pages_contig+0xaa0/0xaa0 [ 384.498052] ? blkdev_get+0xb0/0x8e0 [ 384.501752] ? dput.part.0+0x170/0x750 [ 384.505625] ? bd_may_claim+0xd0/0xd0 [ 384.509413] ? path_put+0x50/0x70 [ 384.512848] ? lookup_bdev.part.0+0xe1/0x160 [ 384.517254] read_cache_page_gfp+0x6e/0x90 [ 384.521486] btrfs_read_disk_super+0xdd/0x440 [ 384.521500] btrfs_scan_one_device+0xc6/0x400 [ 384.521515] ? device_list_add+0x8d0/0x8d0 [ 384.521525] ? __free_pages+0x54/0x90 [ 384.521534] ? free_pages+0x46/0x50 [ 384.521550] btrfs_mount+0x2e3/0x2b28 [ 384.521561] ? lock_downgrade+0x740/0x740 [ 384.521572] ? find_held_lock+0x35/0x130 [ 384.530550] ? pcpu_alloc+0x3af/0x1050 [ 384.530571] ? btrfs_remount+0x11f0/0x11f0 [ 384.530589] ? rcu_read_lock_sched_held+0x110/0x130 [ 384.530612] ? __lockdep_init_map+0x10c/0x570 [ 384.530628] mount_fs+0x97/0x2a1 [ 384.530643] vfs_kern_mount.part.0+0x5e/0x3d0 [ 384.530650] ? find_held_lock+0x35/0x130 [ 384.530662] vfs_kern_mount+0x40/0x60 [ 384.587485] btrfs_mount+0x3ce/0x2b28 [ 384.591288] ? lock_downgrade+0x740/0x740 [ 384.595422] ? find_held_lock+0x35/0x130 [ 384.599487] ? pcpu_alloc+0x3af/0x1050 [ 384.603372] ? btrfs_remount+0x11f0/0x11f0 [ 384.607601] ? rcu_read_lock_sched_held+0x110/0x130 [ 384.612628] ? __lockdep_init_map+0x10c/0x570 [ 384.617180] ? __lockdep_init_map+0x10c/0x570 [ 384.621674] mount_fs+0x97/0x2a1 [ 384.625032] vfs_kern_mount.part.0+0x5e/0x3d0 [ 384.629544] do_mount+0x417/0x27d0 [ 384.633084] ? copy_mount_options+0x5c/0x2f0 [ 384.637490] ? rcu_read_lock_sched_held+0x110/0x130 [ 384.642494] ? copy_mount_string+0x40/0x40 [ 384.646713] ? copy_mount_options+0x1fe/0x2f0 [ 384.651194] SyS_mount+0xab/0x120 [ 384.654633] ? copy_mnt_ns+0x8c0/0x8c0 [ 384.658517] do_syscall_64+0x1e8/0x640 [ 384.662386] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 384.667231] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 384.672409] RIP: 0033:0x45c99a [ 384.675598] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 384.683292] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a [ 384.690548] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 [ 384.697820] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 [ 384.705163] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 384.712412] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) chroot(&(0x7f0000000040)='./file0\x00') 17:19:46 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x20) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f00000000c0)) 17:19:46 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040), 0x0, 0x0) 17:19:46 executing program 3 (fault-call:0 fault-nth:66): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 384.974804] FAULT_INJECTION: forcing a failure. [ 384.974804] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 384.986648] CPU: 0 PID: 23199 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 384.993667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.003030] Call Trace: [ 385.005629] dump_stack+0x138/0x197 [ 385.009283] should_fail.cold+0x10f/0x159 [ 385.013454] __alloc_pages_nodemask+0x1d6/0x7a0 [ 385.018140] ? __alloc_pages_slowpath+0x2930/0x2930 [ 385.023200] cache_grow_begin+0x80/0x400 [ 385.027283] kmem_cache_alloc+0x6a6/0x780 [ 385.031449] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 385.036577] getname_kernel+0x53/0x350 [ 385.040479] kern_path+0x20/0x40 [ 385.043849] lookup_bdev.part.0+0x63/0x160 [ 385.048082] ? blkdev_open+0x260/0x260 [ 385.048098] ? free_hot_cold_page+0x763/0xca0 [ 385.048111] blkdev_get_by_path+0x76/0xf0 [ 385.048126] btrfs_scan_one_device+0x97/0x400 [ 385.048138] ? device_list_add+0x8d0/0x8d0 [ 385.048148] ? __free_pages+0x54/0x90 [ 385.073164] ? free_pages+0x46/0x50 [ 385.076813] btrfs_mount+0x2e3/0x2b28 [ 385.080625] ? lock_downgrade+0x740/0x740 [ 385.085213] ? find_held_lock+0x35/0x130 [ 385.089279] ? pcpu_alloc+0x3af/0x1050 [ 385.093180] ? btrfs_remount+0x11f0/0x11f0 [ 385.093199] ? rcu_read_lock_sched_held+0x110/0x130 [ 385.093221] ? __lockdep_init_map+0x10c/0x570 [ 385.093239] mount_fs+0x97/0x2a1 [ 385.110317] vfs_kern_mount.part.0+0x5e/0x3d0 [ 385.114821] ? find_held_lock+0x35/0x130 [ 385.118894] vfs_kern_mount+0x40/0x60 [ 385.122704] btrfs_mount+0x3ce/0x2b28 [ 385.126520] ? lock_downgrade+0x740/0x740 [ 385.130673] ? find_held_lock+0x35/0x130 [ 385.134738] ? pcpu_alloc+0x3af/0x1050 [ 385.138638] ? btrfs_remount+0x11f0/0x11f0 [ 385.142892] ? rcu_read_lock_sched_held+0x110/0x130 [ 385.147928] ? __lockdep_init_map+0x10c/0x570 [ 385.152436] ? __lockdep_init_map+0x10c/0x570 [ 385.156944] mount_fs+0x97/0x2a1 [ 385.160323] vfs_kern_mount.part.0+0x5e/0x3d0 [ 385.164821] do_mount+0x417/0x27d0 [ 385.164832] ? copy_mount_options+0x5c/0x2f0 [ 385.164845] ? rcu_read_lock_sched_held+0x110/0x130 [ 385.164860] ? copy_mount_string+0x40/0x40 [ 385.164875] ? copy_mount_options+0x1fe/0x2f0 [ 385.164887] SyS_mount+0xab/0x120 [ 385.172829] ? copy_mnt_ns+0x8c0/0x8c0 [ 385.172843] do_syscall_64+0x1e8/0x640 [ 385.172851] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 385.172867] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 385.172875] RIP: 0033:0x45c99a [ 385.172880] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 17:19:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getgid() arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) [ 385.172890] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a [ 385.172895] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 [ 385.172900] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 [ 385.172905] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 385.172909] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:46 executing program 3 (fault-call:0 fault-nth:67): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:46 executing program 4: rename(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='./file0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f0000000080)=""/30) [ 385.349512] FAULT_INJECTION: forcing a failure. [ 385.349512] name failslab, interval 1, probability 0, space 0, times 0 [ 385.362393] CPU: 0 PID: 23222 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 385.369423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.378778] Call Trace: [ 385.381375] dump_stack+0x138/0x197 [ 385.385014] should_fail.cold+0x10f/0x159 [ 385.389176] should_failslab+0xdb/0x130 [ 385.393161] kmem_cache_alloc+0x2d7/0x780 [ 385.397327] ? delete_node+0x1fb/0x690 [ 385.401216] ? save_trace+0x290/0x290 [ 385.405015] alloc_buffer_head+0x24/0xe0 [ 385.405028] alloc_page_buffers+0xb7/0x200 [ 385.405042] create_empty_buffers+0x39/0x480 [ 385.413320] ? __lock_is_held+0xb6/0x140 [ 385.413333] ? check_preemption_disabled+0x3c/0x250 [ 385.413350] create_page_buffers+0x153/0x1c0 [ 385.431191] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 385.436644] block_read_full_page+0xcd/0x960 [ 385.441054] ? set_init_blocksize+0x220/0x220 [ 385.445542] ? __lru_cache_add+0x18a/0x250 [ 385.449759] ? __bread_gfp+0x290/0x290 [ 385.453639] ? add_to_page_cache_lru+0x159/0x310 [ 385.458387] ? add_to_page_cache_locked+0x40/0x40 [ 385.463238] blkdev_readpage+0x1d/0x30 [ 385.467166] do_read_cache_page+0x671/0xfc0 [ 385.471604] ? blkdev_writepages+0xd0/0xd0 [ 385.475827] ? find_get_pages_contig+0xaa0/0xaa0 [ 385.480578] ? blkdev_get+0xb0/0x8e0 [ 385.484282] ? dput.part.0+0x170/0x750 [ 385.488155] ? bd_may_claim+0xd0/0xd0 [ 385.492048] ? path_put+0x50/0x70 [ 385.495483] ? lookup_bdev.part.0+0xe1/0x160 [ 385.499876] read_cache_page_gfp+0x6e/0x90 [ 385.504100] btrfs_read_disk_super+0xdd/0x440 [ 385.508607] btrfs_scan_one_device+0xc6/0x400 [ 385.513141] ? device_list_add+0x8d0/0x8d0 [ 385.517365] ? __free_pages+0x54/0x90 [ 385.521160] ? free_pages+0x46/0x50 [ 385.524786] btrfs_mount+0x2e3/0x2b28 [ 385.528572] ? lock_downgrade+0x740/0x740 [ 385.532701] ? find_held_lock+0x35/0x130 [ 385.536742] ? pcpu_alloc+0x3af/0x1050 [ 385.540626] ? btrfs_remount+0x11f0/0x11f0 [ 385.544854] ? rcu_read_lock_sched_held+0x110/0x130 [ 385.549916] ? __lockdep_init_map+0x10c/0x570 [ 385.554403] mount_fs+0x97/0x2a1 [ 385.557754] vfs_kern_mount.part.0+0x5e/0x3d0 [ 385.562238] ? find_held_lock+0x35/0x130 [ 385.566312] vfs_kern_mount+0x40/0x60 [ 385.570107] btrfs_mount+0x3ce/0x2b28 [ 385.573915] ? lock_downgrade+0x740/0x740 [ 385.578052] ? find_held_lock+0x35/0x130 [ 385.582108] ? pcpu_alloc+0x3af/0x1050 [ 385.586021] ? btrfs_remount+0x11f0/0x11f0 [ 385.590259] ? rcu_read_lock_sched_held+0x110/0x130 [ 385.595276] ? __lockdep_init_map+0x10c/0x570 [ 385.599754] ? __lockdep_init_map+0x10c/0x570 [ 385.604294] mount_fs+0x97/0x2a1 [ 385.607660] vfs_kern_mount.part.0+0x5e/0x3d0 [ 385.612154] do_mount+0x417/0x27d0 [ 385.615680] ? retint_kernel+0x2d/0x2d [ 385.619558] ? copy_mount_string+0x40/0x40 [ 385.623789] ? copy_mount_options+0x1a0/0x2f0 [ 385.628270] ? copy_mount_options+0x1fe/0x2f0 [ 385.632749] SyS_mount+0xab/0x120 [ 385.636195] ? copy_mnt_ns+0x8c0/0x8c0 [ 385.640092] do_syscall_64+0x1e8/0x640 [ 385.643971] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 385.648870] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 385.654040] RIP: 0033:0x45c99a [ 385.657207] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 385.664948] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a [ 385.672224] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 [ 385.679475] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 [ 385.686768] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 385.694064] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:47 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x20) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:47 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='`trfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xaaaaaaaaaaaabc8, &(0x7f0000000040)=[{&(0x7f0000000300)="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", 0x119, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000000)={0x9, 0xffffdce4, 0x80, 0x4, 0x20, "688d82a729932177e00825817c0f4b8812cd79", 0x9, 0x4}) lgetxattr(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)=@random={'btrfs.', '`trfs\x00'}, &(0x7f00000001c0)=""/243, 0xf3) 17:19:47 executing program 2: getrusage(0x1, &(0x7f00000000c0)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x31f, 0x55, &(0x7f0000000100), 0x0, 0x0) pkey_alloc(0x0, 0x55e32579d0787cc7) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f00000001c0)=')}\\\\@\x00') 17:19:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getpeername$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000300)=0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) bind$packet(r2, &(0x7f0000000000)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x3c}}, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0xffffffffffffffff, r7) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@multicast2, @in6=@local, 0x4e22, 0x5, 0x4e20, 0x400, 0xa, 0x0, 0x40, 0x89, r5, r7}, {0x6, 0x4, 0xa2ad, 0x6, 0xffffffffffff5ee1, 0x2, 0x100000000, 0x8000}, {0x2, 0x2, 0x80, 0x5}, 0xffffffff, 0x6e6bb2, 0xdbf0b3fc8e21b0e2, 0x0, 0x2}, {{@in=@remote, 0x4d2, 0x6c}, 0x5, @in6=@empty, 0x34ff, 0x2, 0x540c3bdad5af7f36, 0x2, 0x7, 0x0, 0x80000001}}, 0xe8) 17:19:47 executing program 3 (fault-call:0 fault-nth:68): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 386.071101] FAULT_INJECTION: forcing a failure. [ 386.071101] name failslab, interval 1, probability 0, space 0, times 0 [ 386.085429] CPU: 0 PID: 23268 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 386.092477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.101837] Call Trace: [ 386.104440] dump_stack+0x138/0x197 [ 386.108097] should_fail.cold+0x10f/0x159 [ 386.112255] should_failslab+0xdb/0x130 [ 386.116239] __kmalloc+0x2f0/0x7a0 [ 386.119785] ? device_list_add+0x5e0/0x8d0 [ 386.124012] device_list_add+0x5e0/0x8d0 [ 386.124031] ? btrfs_rm_dev_replace_free_srcdev+0x2f0/0x2f0 [ 386.124042] ? btrfs_read_disk_super+0x98/0x440 [ 386.124054] btrfs_scan_one_device+0x267/0x400 [ 386.124068] ? device_list_add+0x8d0/0x8d0 [ 386.124079] ? __free_pages+0x54/0x90 [ 386.124088] ? free_pages+0x46/0x50 [ 386.124101] btrfs_mount+0x2e3/0x2b28 [ 386.124112] ? lock_downgrade+0x740/0x740 [ 386.124119] ? find_held_lock+0x35/0x130 [ 386.124129] ? pcpu_alloc+0x3af/0x1050 [ 386.170602] ? btrfs_remount+0x11f0/0x11f0 [ 386.174832] ? rcu_read_lock_sched_held+0x110/0x130 [ 386.179860] ? __lockdep_init_map+0x10c/0x570 [ 386.184379] mount_fs+0x97/0x2a1 [ 386.187772] vfs_kern_mount.part.0+0x5e/0x3d0 [ 386.192273] ? find_held_lock+0x35/0x130 [ 386.196345] vfs_kern_mount+0x40/0x60 [ 386.200152] btrfs_mount+0x3ce/0x2b28 [ 386.203958] ? lock_downgrade+0x740/0x740 [ 386.208106] ? find_held_lock+0x35/0x130 [ 386.212170] ? pcpu_alloc+0x3af/0x1050 [ 386.216066] ? btrfs_remount+0x11f0/0x11f0 [ 386.220307] ? rcu_read_lock_sched_held+0x110/0x130 [ 386.225327] ? __lockdep_init_map+0x10c/0x570 [ 386.229803] ? __lockdep_init_map+0x10c/0x570 [ 386.234285] mount_fs+0x97/0x2a1 [ 386.237635] vfs_kern_mount.part.0+0x5e/0x3d0 [ 386.242113] do_mount+0x417/0x27d0 [ 386.245646] ? copy_mount_options+0x5c/0x2f0 [ 386.250046] ? rcu_read_lock_sched_held+0x110/0x130 [ 386.255099] ? copy_mount_string+0x40/0x40 [ 386.259322] ? copy_mount_options+0x1fe/0x2f0 [ 386.263802] SyS_mount+0xab/0x120 [ 386.267234] ? copy_mnt_ns+0x8c0/0x8c0 [ 386.271140] do_syscall_64+0x1e8/0x640 [ 386.275017] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 386.279856] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 386.285032] RIP: 0033:0x45c99a [ 386.288202] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 386.295894] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a [ 386.303145] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 [ 386.310402] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 [ 386.317660] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 386.324909] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x3fc, 0xaaaaaaaaaaaad5e, &(0x7f0000000040), 0x0, 0x0) 17:19:47 executing program 3 (fault-call:0 fault-nth:69): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 386.448264] FAULT_INJECTION: forcing a failure. [ 386.448264] name failslab, interval 1, probability 0, space 0, times 0 [ 386.484282] CPU: 1 PID: 23289 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 386.491338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.500701] Call Trace: [ 386.503316] dump_stack+0x138/0x197 [ 386.507010] should_fail.cold+0x10f/0x159 [ 386.511171] should_failslab+0xdb/0x130 [ 386.515164] kmem_cache_alloc_node+0x56/0x780 [ 386.519674] ? mount_fs+0x97/0x2a1 [ 386.523238] create_task_io_context+0x31/0x3d0 [ 386.527831] generic_make_request_checks+0x1505/0x1ac0 [ 386.527845] ? rcu_read_lock_sched_held+0x110/0x130 [ 386.527857] ? blk_cleanup_queue+0x610/0x610 [ 386.527872] ? trace_hardirqs_on+0x10/0x10 17:19:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, &(0x7f00000001c0)=""/4096, &(0x7f00000000c0)=0x1000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000000c0)={r3, 0xb21}, 0x14) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000080)={0x0, 0x205, 0x7, 0x8000, r3}, 0x10) [ 386.538152] generic_make_request+0x7d/0xa40 [ 386.538165] ? save_trace+0x290/0x290 [ 386.538177] ? blk_queue_enter+0x520/0x520 [ 386.538189] ? find_held_lock+0x35/0x130 [ 386.563266] ? guard_bio_eod+0x161/0x530 [ 386.567314] submit_bio+0x1a5/0x3f0 [ 386.570942] ? submit_bio+0x1a5/0x3f0 [ 386.574740] ? generic_make_request+0xa40/0xa40 [ 386.579419] ? guard_bio_eod+0x1fd/0x530 [ 386.583482] submit_bh_wbc+0x550/0x720 [ 386.587363] block_read_full_page+0x7a2/0x960 [ 386.591871] ? set_init_blocksize+0x220/0x220 [ 386.596363] ? __bread_gfp+0x290/0x290 [ 386.600231] ? add_to_page_cache_lru+0x159/0x310 [ 386.604969] ? add_to_page_cache_locked+0x40/0x40 [ 386.609794] blkdev_readpage+0x1d/0x30 [ 386.613673] do_read_cache_page+0x671/0xfc0 [ 386.617986] ? blkdev_writepages+0xd0/0xd0 [ 386.622268] ? find_get_pages_contig+0xaa0/0xaa0 [ 386.627058] ? blkdev_get+0xb0/0x8e0 [ 386.630766] ? dput.part.0+0x170/0x750 [ 386.634646] ? bd_may_claim+0xd0/0xd0 [ 386.638440] ? path_put+0x50/0x70 [ 386.641876] ? lookup_bdev.part.0+0xe1/0x160 [ 386.646268] read_cache_page_gfp+0x6e/0x90 [ 386.650539] btrfs_read_disk_super+0xdd/0x440 [ 386.655060] btrfs_scan_one_device+0xc6/0x400 [ 386.659540] ? device_list_add+0x8d0/0x8d0 [ 386.663758] ? __free_pages+0x54/0x90 [ 386.667541] ? free_pages+0x46/0x50 [ 386.671154] btrfs_mount+0x2e3/0x2b28 [ 386.674935] ? lock_downgrade+0x740/0x740 [ 386.679082] ? find_held_lock+0x35/0x130 [ 386.683130] ? pcpu_alloc+0x3af/0x1050 [ 386.687003] ? btrfs_remount+0x11f0/0x11f0 [ 386.691272] ? rcu_read_lock_sched_held+0x110/0x130 [ 386.696274] ? __lockdep_init_map+0x10c/0x570 [ 386.700754] mount_fs+0x97/0x2a1 [ 386.704107] vfs_kern_mount.part.0+0x5e/0x3d0 [ 386.708592] ? find_held_lock+0x35/0x130 [ 386.712637] vfs_kern_mount+0x40/0x60 [ 386.716422] btrfs_mount+0x3ce/0x2b28 [ 386.720202] ? lock_downgrade+0x740/0x740 [ 386.724326] ? find_held_lock+0x35/0x130 [ 386.728378] ? pcpu_alloc+0x3af/0x1050 [ 386.732258] ? btrfs_remount+0x11f0/0x11f0 [ 386.736475] ? rcu_read_lock_sched_held+0x110/0x130 [ 386.741476] ? __lockdep_init_map+0x10c/0x570 [ 386.746079] ? __lockdep_init_map+0x10c/0x570 [ 386.750593] mount_fs+0x97/0x2a1 [ 386.753983] vfs_kern_mount.part.0+0x5e/0x3d0 [ 386.758471] do_mount+0x417/0x27d0 [ 386.761997] ? copy_mount_options+0x5c/0x2f0 [ 386.766393] ? rcu_read_lock_sched_held+0x110/0x130 [ 386.771398] ? copy_mount_string+0x40/0x40 [ 386.775615] ? copy_mount_options+0x1fe/0x2f0 [ 386.782621] SyS_mount+0xab/0x120 [ 386.786056] ? copy_mnt_ns+0x8c0/0x8c0 [ 386.789942] do_syscall_64+0x1e8/0x640 [ 386.793833] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 386.798662] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 386.803833] RIP: 0033:0x45c99a [ 386.807042] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 386.814731] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a [ 386.821979] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 [ 386.829229] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 [ 386.836477] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 386.843739] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 386.851254] net_ratelimit: 16 callbacks suppressed [ 386.851259] protocol 88fb is buggy, dev hsr_slave_0 [ 386.860252] protocol 88fb is buggy, dev hsr_slave_0 [ 386.861450] protocol 88fb is buggy, dev hsr_slave_1 [ 386.866626] protocol 88fb is buggy, dev hsr_slave_1 [ 386.871750] protocol 88fb is buggy, dev hsr_slave_0 [ 386.876710] protocol 88fb is buggy, dev hsr_slave_0 [ 386.881726] protocol 88fb is buggy, dev hsr_slave_1 [ 386.886685] protocol 88fb is buggy, dev hsr_slave_1 17:19:48 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "05"}, 0x21) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:48 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:48 executing program 4: ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0x5) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btr\xe5s\x02', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 17:19:48 executing program 3 (fault-call:0 fault-nth:70): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 387.094573] FAULT_INJECTION: forcing a failure. [ 387.094573] name failslab, interval 1, probability 0, space 0, times 0 [ 387.109725] CPU: 0 PID: 23325 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 387.116760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 387.126104] Call Trace: [ 387.128687] dump_stack+0x138/0x197 [ 387.132305] should_fail.cold+0x10f/0x159 [ 387.136525] ? __lock_is_held+0xb6/0x140 [ 387.140569] ? mempool_free+0x1d0/0x1d0 [ 387.144525] should_failslab+0xdb/0x130 [ 387.148485] kmem_cache_alloc+0x47/0x780 [ 387.152534] ? mempool_free+0x1d0/0x1d0 [ 387.156487] mempool_alloc_slab+0x47/0x60 [ 387.160614] mempool_alloc+0x138/0x300 [ 387.164484] ? remove_element.isra.0+0x1b0/0x1b0 [ 387.169230] ? find_held_lock+0x35/0x130 [ 387.173272] ? create_empty_buffers+0x2d3/0x480 [ 387.177922] ? save_trace+0x290/0x290 [ 387.181708] bio_alloc_bioset+0x368/0x680 [ 387.185841] ? bvec_alloc+0x2e0/0x2e0 [ 387.189636] submit_bh_wbc+0xf6/0x720 [ 387.193416] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 387.198858] block_read_full_page+0x7a2/0x960 [ 387.203337] ? set_init_blocksize+0x220/0x220 [ 387.207815] ? __bread_gfp+0x290/0x290 [ 387.211684] ? add_to_page_cache_lru+0x159/0x310 [ 387.216425] ? add_to_page_cache_locked+0x40/0x40 [ 387.221248] blkdev_readpage+0x1d/0x30 [ 387.225114] do_read_cache_page+0x671/0xfc0 [ 387.229429] ? blkdev_writepages+0xd0/0xd0 [ 387.233650] ? find_get_pages_contig+0xaa0/0xaa0 [ 387.238385] ? blkdev_get+0xb0/0x8e0 [ 387.242081] ? dput.part.0+0x170/0x750 [ 387.245950] ? bd_may_claim+0xd0/0xd0 [ 387.249736] ? path_put+0x50/0x70 [ 387.253169] ? lookup_bdev.part.0+0xe1/0x160 [ 387.257562] read_cache_page_gfp+0x6e/0x90 [ 387.261782] btrfs_read_disk_super+0xdd/0x440 [ 387.266261] btrfs_scan_one_device+0xc6/0x400 [ 387.270742] ? device_list_add+0x8d0/0x8d0 [ 387.274959] ? __free_pages+0x54/0x90 [ 387.278741] ? free_pages+0x46/0x50 [ 387.282351] btrfs_mount+0x2e3/0x2b28 [ 387.286134] ? lock_downgrade+0x740/0x740 [ 387.290271] ? find_held_lock+0x35/0x130 [ 387.294410] ? pcpu_alloc+0x3af/0x1050 [ 387.298281] ? btrfs_remount+0x11f0/0x11f0 [ 387.302500] ? rcu_read_lock_sched_held+0x110/0x130 [ 387.307503] ? __lockdep_init_map+0x10c/0x570 [ 387.311984] mount_fs+0x97/0x2a1 [ 387.315336] vfs_kern_mount.part.0+0x5e/0x3d0 [ 387.319812] ? find_held_lock+0x35/0x130 [ 387.323858] vfs_kern_mount+0x40/0x60 [ 387.327639] btrfs_mount+0x3ce/0x2b28 [ 387.331422] ? lock_downgrade+0x740/0x740 [ 387.335547] ? find_held_lock+0x35/0x130 [ 387.339587] ? pcpu_alloc+0x3af/0x1050 [ 387.343473] ? btrfs_remount+0x11f0/0x11f0 [ 387.347710] ? rcu_read_lock_sched_held+0x110/0x130 [ 387.352717] ? __lockdep_init_map+0x10c/0x570 [ 387.357198] ? __lockdep_init_map+0x10c/0x570 [ 387.361679] mount_fs+0x97/0x2a1 [ 387.365031] vfs_kern_mount.part.0+0x5e/0x3d0 [ 387.369530] do_mount+0x417/0x27d0 [ 387.373055] ? copy_mount_options+0x5c/0x2f0 [ 387.377447] ? rcu_read_lock_sched_held+0x110/0x130 [ 387.382448] ? copy_mount_string+0x40/0x40 [ 387.386682] ? copy_mount_options+0x1fe/0x2f0 [ 387.391163] SyS_mount+0xab/0x120 [ 387.394597] ? copy_mnt_ns+0x8c0/0x8c0 [ 387.398468] do_syscall_64+0x1e8/0x640 [ 387.402338] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 387.407174] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 387.412350] RIP: 0033:0x45c99a [ 387.415523] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 387.423215] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a [ 387.430469] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 [ 387.437722] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 [ 387.444974] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 387.452238] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 387.459683] protocol 88fb is buggy, dev hsr_slave_0 [ 387.464802] protocol 88fb is buggy, dev hsr_slave_1 17:19:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x83) 17:19:49 executing program 2: syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x9, 0x101000) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000100), 0xfffffffffffffdf8) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 387.512576] print_req_error: I/O error, dev loop4, sector 128 17:19:49 executing program 0: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f00000000c0)={0x6, 0x0, 0xfff, 0x7}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:49 executing program 3 (fault-call:0 fault-nth:71): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 387.699045] FAULT_INJECTION: forcing a failure. [ 387.699045] name failslab, interval 1, probability 0, space 0, times 0 [ 387.712297] CPU: 0 PID: 23358 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 387.719337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 387.728684] Call Trace: [ 387.728702] dump_stack+0x138/0x197 [ 387.728719] should_fail.cold+0x10f/0x159 [ 387.739041] ? __lock_is_held+0xb6/0x140 [ 387.743097] ? mempool_free+0x1d0/0x1d0 [ 387.743109] should_failslab+0xdb/0x130 [ 387.743121] kmem_cache_alloc+0x47/0x780 [ 387.743135] ? mempool_free+0x1d0/0x1d0 [ 387.743143] mempool_alloc_slab+0x47/0x60 [ 387.743154] mempool_alloc+0x138/0x300 [ 387.767042] ? remove_element.isra.0+0x1b0/0x1b0 [ 387.771782] ? find_held_lock+0x35/0x130 [ 387.775826] ? create_empty_buffers+0x2d3/0x480 [ 387.780479] ? save_trace+0x290/0x290 [ 387.784266] bio_alloc_bioset+0x368/0x680 [ 387.788398] ? bvec_alloc+0x2e0/0x2e0 [ 387.792203] submit_bh_wbc+0xf6/0x720 [ 387.795992] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 387.801448] block_read_full_page+0x7a2/0x960 [ 387.805933] ? set_init_blocksize+0x220/0x220 [ 387.810415] ? __bread_gfp+0x290/0x290 [ 387.814294] ? add_to_page_cache_lru+0x159/0x310 [ 387.819051] ? add_to_page_cache_locked+0x40/0x40 [ 387.823883] blkdev_readpage+0x1d/0x30 [ 387.827767] do_read_cache_page+0x671/0xfc0 [ 387.832070] ? blkdev_writepages+0xd0/0xd0 [ 387.836290] ? find_get_pages_contig+0xaa0/0xaa0 [ 387.841036] ? blkdev_get+0xb0/0x8e0 [ 387.844733] ? dput.part.0+0x170/0x750 [ 387.848601] ? bd_may_claim+0xd0/0xd0 [ 387.852383] ? path_put+0x50/0x70 [ 387.855816] ? lookup_bdev.part.0+0xe1/0x160 [ 387.860209] read_cache_page_gfp+0x6e/0x90 [ 387.864427] btrfs_read_disk_super+0xdd/0x440 [ 387.868924] btrfs_scan_one_device+0xc6/0x400 [ 387.873401] ? device_list_add+0x8d0/0x8d0 [ 387.877626] ? __free_pages+0x54/0x90 [ 387.881407] ? free_pages+0x46/0x50 [ 387.885027] btrfs_mount+0x2e3/0x2b28 [ 387.888827] ? lock_downgrade+0x740/0x740 [ 387.892959] ? find_held_lock+0x35/0x130 [ 387.897007] ? pcpu_alloc+0x3af/0x1050 [ 387.900894] ? btrfs_remount+0x11f0/0x11f0 [ 387.905146] ? rcu_read_lock_sched_held+0x110/0x130 [ 387.910154] ? __lockdep_init_map+0x10c/0x570 [ 387.914636] mount_fs+0x97/0x2a1 [ 387.917989] vfs_kern_mount.part.0+0x5e/0x3d0 [ 387.922475] ? find_held_lock+0x35/0x130 [ 387.926521] vfs_kern_mount+0x40/0x60 [ 387.930303] btrfs_mount+0x3ce/0x2b28 [ 387.934087] ? lock_downgrade+0x740/0x740 [ 387.938216] ? find_held_lock+0x35/0x130 [ 387.942263] ? pcpu_alloc+0x3af/0x1050 [ 387.946141] ? btrfs_remount+0x11f0/0x11f0 [ 387.950374] ? rcu_read_lock_sched_held+0x110/0x130 [ 387.955382] ? __lockdep_init_map+0x10c/0x570 [ 387.959865] ? __lockdep_init_map+0x10c/0x570 [ 387.964349] mount_fs+0x97/0x2a1 [ 387.967717] vfs_kern_mount.part.0+0x5e/0x3d0 [ 387.972288] do_mount+0x417/0x27d0 [ 387.975811] ? copy_mount_options+0x5c/0x2f0 [ 387.980202] ? rcu_read_lock_sched_held+0x110/0x130 [ 387.985212] ? copy_mount_string+0x40/0x40 [ 387.989464] ? copy_mount_options+0x1fe/0x2f0 [ 387.993944] SyS_mount+0xab/0x120 [ 387.997378] ? copy_mnt_ns+0x8c0/0x8c0 [ 388.001251] do_syscall_64+0x1e8/0x640 [ 388.005122] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 388.009949] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 388.015121] RIP: 0033:0x45c99a [ 388.018291] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 388.025980] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a [ 388.033231] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 [ 388.040481] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 17:19:49 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "05"}, 0x21) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 388.047735] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 388.054987] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:49 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000000c0)={r5, 0xb21}, 0x14) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f00000000c0)={r5, 0x6}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000001c0)={r6, 0x4000000}, 0x8) 17:19:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) r2 = geteuid() r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0xffffffffffffffff, r4) getresuid(&(0x7f0000000300), &(0x7f0000000340)=0x0, &(0x7f0000000380)) mount$9p_virtio(&(0x7f00000000c0)='loem0proc\xfb&,#\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x800, &(0x7f00000003c0)={'trans=virtio,', {[{@version_L='version=9p2000.L'}, {@cache_mmap='cache=mmap'}, {@cachetag={'cachetag', 0x3d, 'mime_type'}}, {@access_client='access=client'}, {@cachetag={'cachetag'}}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@afid={'afid', 0x3d, 0x4}}, {@access_uid={'access', 0x3d, r2}}, {@access_uid={'access', 0x3d, r4}}, {@dfltgid={'dfltgid', 0x3d, 0xee00}}], [{@dont_measure='dont_measure'}, {@appraise='appraise'}, {@smackfsroot={'smackfsroot', 0x3d, 'wlan1'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@measure='measure'}, {@obj_role={'obj_role', 0x3d, 'ip_vti0\x00'}}, {@fowner_lt={'fowner<', r5}}]}}) getdents64(r1, &(0x7f00000001c0)=""/171, 0xab) 17:19:49 executing program 3 (fault-call:0 fault-nth:72): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 388.282841] FAULT_INJECTION: forcing a failure. [ 388.282841] name failslab, interval 1, probability 0, space 0, times 0 17:19:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000000c0)={r3, 0xb21}, 0x14) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000340)={r3, 0xd0, "e8d2d048cb35e3ffbf300dd4642a22bbdc0a982901b464c4fbb81e6e9271a6e5b955cb3afbac8875fd140bb5b3241753e229c36cb974ce7d3a529e2e073081423e443e07808ae78955c8e724d1ae7cf5e0510ada07ee8cb89c89c72e9ec8106c49d6d291f94bb0a408b71a16a60b56e4429eb9f4d0a3c46daf6910b9fd921e22396adfbf9d14afcb03e6fc2c2d43b423a8fb6db682f833555b824c4acea69785efba7e12a2e44c9dc1698a5fdf07247ee31aa358684081aafb9a8f8d80f000a64156732441ae85326b6bc0dd644a10b5"}, &(0x7f0000000440)=0xd8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000480)={r4, 0x2, 0x7fff}, &(0x7f00000004c0)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x24000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000a6", @ANYRES16=r5, @ANYBLOB="20012dbd7000fbdbdf2501000000100001006e657464657673696d000000100002006e657464657673696d300000100001006e657464657673696d000000100002006e657464657673696d300000100001006e657464657673696d000000100002006e657464657673696d300000100001006e657464657673696d000000100002006e657464657673696d300000100001006e657464657673696d000000100002006e657464657673696d300000100001006e657464657673696d000000100002006e657464657673696d300000100001006e657464657673696d000000100002006e657464657673696d300000"], 0xf4}, 0x1, 0x0, 0x0, 0xc}, 0x34004009) [ 388.335557] CPU: 0 PID: 23394 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 388.342613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.351968] Call Trace: [ 388.351985] dump_stack+0x138/0x197 [ 388.352004] should_fail.cold+0x10f/0x159 [ 388.352021] should_failslab+0xdb/0x130 [ 388.352034] kmem_cache_alloc_node+0x56/0x780 [ 388.352043] ? mount_fs+0x97/0x2a1 [ 388.352059] create_task_io_context+0x31/0x3d0 [ 388.352071] generic_make_request_checks+0x1505/0x1ac0 [ 388.352083] ? rcu_read_lock_sched_held+0x110/0x130 [ 388.352094] ? blk_cleanup_queue+0x610/0x610 [ 388.352108] ? trace_hardirqs_on+0x10/0x10 [ 388.352118] generic_make_request+0x7d/0xa40 [ 388.352128] ? save_trace+0x290/0x290 [ 388.358331] ? blk_queue_enter+0x520/0x520 [ 388.358345] ? find_held_lock+0x35/0x130 [ 388.414377] ? guard_bio_eod+0x161/0x530 [ 388.418428] submit_bio+0x1a5/0x3f0 [ 388.422039] ? submit_bio+0x1a5/0x3f0 [ 388.425835] ? generic_make_request+0xa40/0xa40 [ 388.430489] ? guard_bio_eod+0x1fd/0x530 [ 388.434537] submit_bh_wbc+0x550/0x720 [ 388.438415] block_read_full_page+0x7a2/0x960 [ 388.442895] ? set_init_blocksize+0x220/0x220 [ 388.447374] ? __bread_gfp+0x290/0x290 [ 388.451259] ? add_to_page_cache_lru+0x159/0x310 [ 388.455997] ? add_to_page_cache_locked+0x40/0x40 [ 388.460822] blkdev_readpage+0x1d/0x30 [ 388.464701] do_read_cache_page+0x671/0xfc0 [ 388.469003] ? blkdev_writepages+0xd0/0xd0 [ 388.473227] ? find_get_pages_contig+0xaa0/0xaa0 [ 388.477965] ? blkdev_get+0xb0/0x8e0 [ 388.481663] ? dput.part.0+0x170/0x750 [ 388.485533] ? bd_may_claim+0xd0/0xd0 [ 388.489314] ? path_put+0x50/0x70 [ 388.492747] ? lookup_bdev.part.0+0xe1/0x160 [ 388.497138] read_cache_page_gfp+0x6e/0x90 [ 388.501358] btrfs_read_disk_super+0xdd/0x440 [ 388.505836] btrfs_scan_one_device+0xc6/0x400 [ 388.510314] ? device_list_add+0x8d0/0x8d0 [ 388.514529] ? __free_pages+0x54/0x90 [ 388.518338] ? free_pages+0x46/0x50 [ 388.521957] btrfs_mount+0x2e3/0x2b28 [ 388.525740] ? lock_downgrade+0x740/0x740 [ 388.529868] ? find_held_lock+0x35/0x130 [ 388.533928] ? pcpu_alloc+0x3af/0x1050 [ 388.537803] ? btrfs_remount+0x11f0/0x11f0 [ 388.542021] ? rcu_read_lock_sched_held+0x110/0x130 [ 388.547027] ? __lockdep_init_map+0x10c/0x570 [ 388.551510] mount_fs+0x97/0x2a1 [ 388.554862] vfs_kern_mount.part.0+0x5e/0x3d0 [ 388.559337] ? find_held_lock+0x35/0x130 [ 388.563381] vfs_kern_mount+0x40/0x60 [ 388.567183] btrfs_mount+0x3ce/0x2b28 [ 388.570980] ? lock_downgrade+0x740/0x740 [ 388.575108] ? find_held_lock+0x35/0x130 [ 388.579149] ? pcpu_alloc+0x3af/0x1050 [ 388.583033] ? btrfs_remount+0x11f0/0x11f0 [ 388.587258] ? rcu_read_lock_sched_held+0x110/0x130 [ 388.592268] ? __lockdep_init_map+0x10c/0x570 [ 388.596748] ? __lockdep_init_map+0x10c/0x570 [ 388.601231] mount_fs+0x97/0x2a1 [ 388.604582] vfs_kern_mount.part.0+0x5e/0x3d0 [ 388.609063] do_mount+0x417/0x27d0 [ 388.612584] ? copy_mount_options+0x5c/0x2f0 [ 388.616972] ? rcu_read_lock_sched_held+0x110/0x130 [ 388.621972] ? copy_mount_string+0x40/0x40 [ 388.626193] ? copy_mount_options+0x1fe/0x2f0 [ 388.630689] SyS_mount+0xab/0x120 [ 388.634135] ? copy_mnt_ns+0x8c0/0x8c0 [ 388.638024] do_syscall_64+0x1e8/0x640 [ 388.641898] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 388.646734] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 388.651922] RIP: 0033:0x45c99a [ 388.655090] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 388.662779] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a [ 388.670135] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 [ 388.677399] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 [ 388.684648] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 388.691924] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:50 executing program 0: syz_mount_image$btrfs(&(0x7f00000000c0)='b\x8efs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x0, &(0x7f0000000040), 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="370000006606d118e1319537cde7803000"]}) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000040)=0x10001, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000000)) 17:19:50 executing program 3 (fault-call:0 fault-nth:73): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 388.913462] FAULT_INJECTION: forcing a failure. [ 388.913462] name failslab, interval 1, probability 0, space 0, times 0 [ 388.925551] CPU: 1 PID: 23424 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 388.932582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.941926] Call Trace: [ 388.944569] dump_stack+0x138/0x197 [ 388.948187] should_fail.cold+0x10f/0x159 [ 388.952342] should_failslab+0xdb/0x130 [ 388.956323] kmem_cache_alloc_trace+0x2e9/0x790 [ 388.961007] ? __kmalloc_node+0x51/0x80 [ 388.964977] btrfs_mount+0x1001/0x2b28 [ 388.968851] ? lock_downgrade+0x740/0x740 [ 388.973027] ? find_held_lock+0x35/0x130 [ 388.977072] ? pcpu_alloc+0x3af/0x1050 [ 388.980970] ? btrfs_remount+0x11f0/0x11f0 [ 388.985234] ? rcu_read_lock_sched_held+0x110/0x130 [ 388.990255] ? __lockdep_init_map+0x10c/0x570 [ 388.990276] mount_fs+0x97/0x2a1 [ 388.990293] vfs_kern_mount.part.0+0x5e/0x3d0 [ 388.990300] ? find_held_lock+0x35/0x130 [ 388.990312] vfs_kern_mount+0x40/0x60 [ 388.990325] btrfs_mount+0x3ce/0x2b28 [ 388.990334] ? lock_downgrade+0x740/0x740 [ 388.990345] ? find_held_lock+0x35/0x130 [ 389.018488] ? pcpu_alloc+0x3af/0x1050 [ 389.018512] ? btrfs_remount+0x11f0/0x11f0 [ 389.018529] ? rcu_read_lock_sched_held+0x110/0x130 [ 389.018549] ? __lockdep_init_map+0x10c/0x570 [ 389.026475] ? __lockdep_init_map+0x10c/0x570 [ 389.026494] mount_fs+0x97/0x2a1 [ 389.026511] vfs_kern_mount.part.0+0x5e/0x3d0 [ 389.026524] do_mount+0x417/0x27d0 [ 389.026536] ? copy_mount_options+0x5c/0x2f0 17:19:50 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) tkill(0xffffffffffffffff, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="8da4363ac0ed0200400000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x4}], 0x2240808, 0x0) [ 389.060411] ? rcu_read_lock_sched_held+0x110/0x130 [ 389.065418] ? copy_mount_string+0x40/0x40 [ 389.069648] ? copy_mount_options+0x1fe/0x2f0 [ 389.074127] SyS_mount+0xab/0x120 [ 389.077570] ? copy_mnt_ns+0x8c0/0x8c0 [ 389.081463] do_syscall_64+0x1e8/0x640 [ 389.081473] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 389.081489] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 389.090181] RIP: 0033:0x45c99a [ 389.090187] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 389.090198] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a 17:19:50 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "05"}, 0x21) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:50 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 389.090205] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 [ 389.090211] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 [ 389.090216] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 389.090223] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000100)=0x3f) 17:19:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00'}, 0x10) 17:19:50 executing program 3 (fault-call:0 fault-nth:74): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x1, 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x501081) [ 389.348510] FAULT_INJECTION: forcing a failure. [ 389.348510] name failslab, interval 1, probability 0, space 0, times 0 [ 389.370758] CPU: 1 PID: 23456 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 389.377848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 389.387224] Call Trace: [ 389.387245] dump_stack+0x138/0x197 [ 389.387266] should_fail.cold+0x10f/0x159 [ 389.387282] should_failslab+0xdb/0x130 [ 389.387292] __kmalloc+0x2f0/0x7a0 [ 389.387305] ? device_list_add+0x5e0/0x8d0 [ 389.387316] device_list_add+0x5e0/0x8d0 [ 389.387329] ? btrfs_rm_dev_replace_free_srcdev+0x2f0/0x2f0 [ 389.387340] ? btrfs_read_disk_super+0x98/0x440 [ 389.387352] btrfs_scan_one_device+0x267/0x400 [ 389.387370] ? device_list_add+0x8d0/0x8d0 [ 389.387381] ? __free_pages+0x54/0x90 [ 389.387391] ? free_pages+0x46/0x50 [ 389.387404] btrfs_mount+0x2e3/0x2b28 [ 389.387416] ? lock_downgrade+0x740/0x740 [ 389.409488] ? find_held_lock+0x35/0x130 [ 389.409502] ? pcpu_alloc+0x3af/0x1050 [ 389.409527] ? btrfs_remount+0x11f0/0x11f0 [ 389.409544] ? rcu_read_lock_sched_held+0x110/0x130 [ 389.409562] ? __lockdep_init_map+0x10c/0x570 [ 389.471187] mount_fs+0x97/0x2a1 [ 389.474567] vfs_kern_mount.part.0+0x5e/0x3d0 [ 389.479076] ? find_held_lock+0x35/0x130 [ 389.483145] vfs_kern_mount+0x40/0x60 [ 389.486956] btrfs_mount+0x3ce/0x2b28 [ 389.490764] ? lock_downgrade+0x740/0x740 [ 389.494943] ? find_held_lock+0x35/0x130 [ 389.499009] ? pcpu_alloc+0x3af/0x1050 [ 389.502909] ? btrfs_remount+0x11f0/0x11f0 [ 389.507159] ? rcu_read_lock_sched_held+0x110/0x130 [ 389.512191] ? __lockdep_init_map+0x10c/0x570 [ 389.516693] ? __lockdep_init_map+0x10c/0x570 [ 389.521198] mount_fs+0x97/0x2a1 [ 389.524574] vfs_kern_mount.part.0+0x5e/0x3d0 [ 389.529067] do_mount+0x417/0x27d0 [ 389.532603] ? copy_mount_options+0x5c/0x2f0 [ 389.536995] ? rcu_read_lock_sched_held+0x110/0x130 [ 389.542000] ? copy_mount_string+0x40/0x40 [ 389.546230] ? copy_mount_options+0x1fe/0x2f0 [ 389.550715] SyS_mount+0xab/0x120 [ 389.554147] ? copy_mnt_ns+0x8c0/0x8c0 [ 389.558019] do_syscall_64+0x1e8/0x640 [ 389.561887] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 389.566723] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 389.571902] RIP: 0033:0x45c99a [ 389.575074] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 389.582775] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a [ 389.590139] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 [ 389.597485] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 [ 389.604742] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 389.612008] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:51 executing program 3 (fault-call:0 fault-nth:75): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:51 executing program 0: accept4$tipc(0xffffffffffffffff, &(0x7f0000000140)=@name, &(0x7f0000000000)=0x10, 0xdff456f9bbb211bd) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = getpid() sched_setattr(r1, 0x0, 0x0) r2 = getpgid(r1) setpriority(0x2, r2, 0x81) mq_getsetattr(r0, &(0x7f00000000c0)={0x80000001, 0x3f4, 0xcc, 0x40, 0x1, 0x8, 0x7fffffff, 0xcaeb}, &(0x7f00000001c0)) syz_mount_image$btrfs(&(0x7f0000000280)='b\xe0rfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed0200009eebcca5c10e26b918db5c6362c45d7c01cd9ec74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d7a26242fbfd159170ea93c", 0x5f, 0x4}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x200000, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x8400, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = dup(r5) ioctl$sock_SIOCETHTOOL(r6, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) ioctl$NBD_SET_FLAGS(r6, 0xab0a, 0x8000) [ 389.727796] FAULT_INJECTION: forcing a failure. [ 389.727796] name failslab, interval 1, probability 0, space 0, times 0 [ 389.766076] CPU: 1 PID: 23493 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 389.773141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 389.782499] Call Trace: [ 389.785090] dump_stack+0x138/0x197 [ 389.788714] should_fail.cold+0x10f/0x159 [ 389.792875] should_failslab+0xdb/0x130 [ 389.796847] kmem_cache_alloc_node_trace+0x280/0x770 [ 389.801947] ? mutex_unlock+0xd/0x10 [ 389.805652] ? btrfs_scan_one_device+0xeb/0x400 [ 389.810310] __kmalloc_node+0x3d/0x80 [ 389.814095] kvmalloc_node+0x93/0xe0 [ 389.817793] btrfs_mount+0xf88/0x2b28 [ 389.821578] ? lock_downgrade+0x740/0x740 [ 389.825723] ? find_held_lock+0x35/0x130 [ 389.829764] ? pcpu_alloc+0x3af/0x1050 [ 389.833638] ? btrfs_remount+0x11f0/0x11f0 [ 389.837859] ? rcu_read_lock_sched_held+0x110/0x130 [ 389.842865] ? __lockdep_init_map+0x10c/0x570 [ 389.847351] mount_fs+0x97/0x2a1 [ 389.850703] vfs_kern_mount.part.0+0x5e/0x3d0 [ 389.855188] ? find_held_lock+0x35/0x130 [ 389.859242] vfs_kern_mount+0x40/0x60 [ 389.863054] btrfs_mount+0x3ce/0x2b28 [ 389.866869] ? lock_downgrade+0x740/0x740 [ 389.871006] ? find_held_lock+0x35/0x130 [ 389.875050] ? pcpu_alloc+0x3af/0x1050 [ 389.878926] ? btrfs_remount+0x11f0/0x11f0 [ 389.883161] ? rcu_read_lock_sched_held+0x110/0x130 [ 389.888170] ? __lockdep_init_map+0x10c/0x570 [ 389.892650] ? __lockdep_init_map+0x10c/0x570 [ 389.897132] mount_fs+0x97/0x2a1 [ 389.900485] vfs_kern_mount.part.0+0x5e/0x3d0 [ 389.904964] do_mount+0x417/0x27d0 [ 389.908495] ? retint_kernel+0x2d/0x2d [ 389.912368] ? copy_mount_string+0x40/0x40 [ 389.916586] ? copy_mount_options+0x195/0x2f0 [ 389.921238] ? copy_mount_options+0x1fe/0x2f0 [ 389.925718] SyS_mount+0xab/0x120 [ 389.929155] ? copy_mnt_ns+0x8c0/0x8c0 [ 389.933026] do_syscall_64+0x1e8/0x640 [ 389.936894] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 389.941722] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 389.946901] RIP: 0033:0x45c99a [ 389.950072] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 389.957762] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a [ 389.965017] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 17:19:51 executing program 4: r0 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x8800) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000100)={0x1000, 0x8000, 0x82, 0x12, 0x0, 0x6, 0x81, 0x1, 0x9, 0xfffffffa, 0x6, 0x1}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x118, 0x10000}], 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f0000000040)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) ioctl$LOOP_GET_STATUS(r2, 0x4c03, &(0x7f00000001c0)) getegid() [ 389.972270] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 [ 389.979523] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 389.986785] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:51 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) 17:19:51 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x19, 0x0, &(0x7f0000000040)) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000001c0)="72a6b1f8e65ce36b267cd053ec06eff0921ccfd5d20efd311ea3f230d3676b988d7713bb55fc18acaff32a8429c9b58117441c3a1b6b0cf5af8b3fd4adc56df178ec27fa816dfcff471196b8b1ae0d66d99cb3cf55f60a8e7fe09eced2ef4a99fcfcef5ef80ef91418577d278c3f2517c10e4c8451bc0f6a9cfb7705dd0b2dc5e0e8249c4187b713464058854d5704efd967e72c78d733eb5a59e3d47739f37f3dd6d86476502dad975231fdf696fe14d20a685cf5", 0xb5, r0}, 0x68) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 390.104792] print_req_error: I/O error, dev loop4, sector 128 17:19:51 executing program 3 (fault-call:0 fault-nth:76): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0) [ 390.261813] FAULT_INJECTION: forcing a failure. [ 390.261813] name failslab, interval 1, probability 0, space 0, times 0 [ 390.277234] CPU: 1 PID: 23531 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 390.284276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 390.293624] Call Trace: [ 390.296205] dump_stack+0x138/0x197 [ 390.299834] should_fail.cold+0x10f/0x159 [ 390.303972] should_failslab+0xdb/0x130 [ 390.307928] kmem_cache_alloc+0x2d7/0x780 [ 390.312057] ? save_stack_trace+0x16/0x20 [ 390.316184] ? save_stack+0x45/0xd0 [ 390.319793] ? kasan_kmalloc+0xce/0xf0 [ 390.323667] ? kmem_cache_alloc_trace+0x152/0x790 [ 390.328493] ? btrfs_mount+0x1069/0x2b28 [ 390.332538] ? mount_fs+0x97/0x2a1 [ 390.336061] getname_kernel+0x53/0x350 [ 390.339928] kern_path+0x20/0x40 [ 390.343291] lookup_bdev.part.0+0x63/0x160 [ 390.347526] ? blkdev_open+0x260/0x260 [ 390.351396] ? btrfs_open_devices+0x27/0xb0 [ 390.355701] blkdev_get_by_path+0x76/0xf0 [ 390.359833] btrfs_get_bdev_and_sb+0x38/0x2e0 [ 390.364317] __btrfs_open_devices+0x194/0xab0 [ 390.368803] ? check_preemption_disabled+0x3c/0x250 [ 390.373810] ? find_device+0x100/0x100 [ 390.377689] ? btrfs_mount+0x1069/0x2b28 [ 390.381739] ? rcu_read_lock_sched_held+0x110/0x130 [ 390.386742] btrfs_open_devices+0xa4/0xb0 [ 390.390874] btrfs_mount+0x11b4/0x2b28 [ 390.394746] ? lock_downgrade+0x740/0x740 [ 390.398874] ? find_held_lock+0x35/0x130 [ 390.402917] ? pcpu_alloc+0x3af/0x1050 [ 390.406807] ? btrfs_remount+0x11f0/0x11f0 [ 390.411027] ? rcu_read_lock_sched_held+0x110/0x130 [ 390.416032] ? __lockdep_init_map+0x10c/0x570 [ 390.420515] mount_fs+0x97/0x2a1 [ 390.423865] vfs_kern_mount.part.0+0x5e/0x3d0 [ 390.428343] ? find_held_lock+0x35/0x130 [ 390.432388] vfs_kern_mount+0x40/0x60 [ 390.436173] btrfs_mount+0x3ce/0x2b28 [ 390.439955] ? lock_downgrade+0x740/0x740 [ 390.444084] ? find_held_lock+0x35/0x130 [ 390.448127] ? pcpu_alloc+0x3af/0x1050 [ 390.452001] ? btrfs_remount+0x11f0/0x11f0 [ 390.456233] ? rcu_read_lock_sched_held+0x110/0x130 [ 390.461240] ? __lockdep_init_map+0x10c/0x570 [ 390.465718] ? __lockdep_init_map+0x10c/0x570 [ 390.470199] mount_fs+0x97/0x2a1 [ 390.473560] vfs_kern_mount.part.0+0x5e/0x3d0 [ 390.478036] do_mount+0x417/0x27d0 [ 390.481558] ? copy_mount_options+0x5c/0x2f0 [ 390.485954] ? rcu_read_lock_sched_held+0x110/0x130 [ 390.490953] ? copy_mount_string+0x40/0x40 [ 390.495170] ? copy_mount_options+0x1fe/0x2f0 [ 390.499657] SyS_mount+0xab/0x120 [ 390.503103] ? copy_mnt_ns+0x8c0/0x8c0 [ 390.506975] do_syscall_64+0x1e8/0x640 [ 390.510845] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 390.515674] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 390.520846] RIP: 0033:0x45c99a [ 390.524029] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 390.531732] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a [ 390.538990] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 [ 390.546341] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 [ 390.553606] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 17:19:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x40400, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x19, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'ip_vvi0\x00', &(0x7f0000000340)=@ethtool_sset_info={0x37, 0x0, 0x1f}}) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000200)=0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0xffffffffffffffff, r5) r6 = getuid() mount$9p_rdma(&(0x7f0000000080)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x20000, &(0x7f0000000240)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0xffffffffffffff7f}}], [{@smackfshat={'smackfshat', 0x3d, '#!*Q-'}}, {@uid_lt={'uid<', r3}}, {@fowner_lt={'fowner<', r5}}, {@smackfsdef={'smackfsdef', 0x3d, 'btrfs\x00'}}, {@pcr={'pcr', 0x3d, 0x19}}, {@pcr={'pcr', 0x3d, 0x3f}}, {@euid_eq={'euid', 0x3d, r6}}, {@audit='audit'}]}}) [ 390.560862] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:52 executing program 3 (fault-call:0 fault-nth:77): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 390.697083] FAULT_INJECTION: forcing a failure. [ 390.697083] name failslab, interval 1, probability 0, space 0, times 0 [ 390.708602] CPU: 0 PID: 23548 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 390.715614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 390.724981] Call Trace: [ 390.727565] dump_stack+0x138/0x197 [ 390.731181] should_fail.cold+0x10f/0x159 [ 390.735319] should_failslab+0xdb/0x130 [ 390.739282] kmem_cache_alloc+0x47/0x780 [ 390.743355] radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 390.748963] __radix_tree_create+0x337/0x4d0 [ 390.753361] page_cache_tree_insert+0xa7/0x2d0 [ 390.757939] ? file_check_and_advance_wb_err+0x380/0x380 [ 390.763375] ? debug_smp_processor_id+0x1c/0x20 [ 390.768045] __add_to_page_cache_locked+0x2ab/0x7e0 [ 390.773047] ? find_lock_entry+0x3f0/0x3f0 [ 390.777279] ? lock_downgrade+0x740/0x740 [ 390.781410] add_to_page_cache_lru+0xf4/0x310 [ 390.785901] ? add_to_page_cache_locked+0x40/0x40 [ 390.790726] ? __page_cache_alloc+0xdd/0x3e0 [ 390.795123] pagecache_get_page+0x1f5/0x750 [ 390.799444] __getblk_gfp+0x24b/0x710 [ 390.803256] ? lru_add_drain_all+0x18/0x20 [ 390.807497] __bread_gfp+0x2e/0x290 [ 390.811119] btrfs_read_dev_one_super+0x9f/0x270 [ 390.815872] btrfs_read_dev_super+0x5d/0xb0 [ 390.820178] ? btrfs_read_dev_one_super+0x270/0x270 [ 390.825180] btrfs_get_bdev_and_sb+0xdc/0x2e0 [ 390.829661] __btrfs_open_devices+0x194/0xab0 [ 390.834147] ? check_preemption_disabled+0x3c/0x250 [ 390.839149] ? find_device+0x100/0x100 [ 390.843019] ? btrfs_mount+0x1069/0x2b28 [ 390.847065] ? rcu_read_lock_sched_held+0x110/0x130 [ 390.852067] btrfs_open_devices+0xa4/0xb0 [ 390.856211] btrfs_mount+0x11b4/0x2b28 [ 390.860081] ? lock_downgrade+0x740/0x740 [ 390.864210] ? find_held_lock+0x35/0x130 [ 390.868252] ? pcpu_alloc+0x3af/0x1050 [ 390.872130] ? btrfs_remount+0x11f0/0x11f0 [ 390.876350] ? rcu_read_lock_sched_held+0x110/0x130 [ 390.881359] ? __lockdep_init_map+0x10c/0x570 [ 390.885841] mount_fs+0x97/0x2a1 [ 390.889208] vfs_kern_mount.part.0+0x5e/0x3d0 [ 390.893698] ? find_held_lock+0x35/0x130 [ 390.897745] vfs_kern_mount+0x40/0x60 [ 390.901533] btrfs_mount+0x3ce/0x2b28 [ 390.905318] ? lock_downgrade+0x740/0x740 [ 390.909448] ? find_held_lock+0x35/0x130 [ 390.913492] ? pcpu_alloc+0x3af/0x1050 [ 390.917367] ? btrfs_remount+0x11f0/0x11f0 [ 390.921590] ? rcu_read_lock_sched_held+0x110/0x130 [ 390.926596] ? __lockdep_init_map+0x10c/0x570 [ 390.931072] ? __lockdep_init_map+0x10c/0x570 [ 390.935553] mount_fs+0x97/0x2a1 [ 390.938903] vfs_kern_mount.part.0+0x5e/0x3d0 [ 390.943387] do_mount+0x417/0x27d0 [ 390.946915] ? copy_mount_options+0x5c/0x2f0 [ 390.951304] ? rcu_read_lock_sched_held+0x110/0x130 [ 390.956306] ? copy_mount_string+0x40/0x40 [ 390.960540] ? copy_mount_options+0x1fe/0x2f0 [ 390.965023] SyS_mount+0xab/0x120 [ 390.968489] ? copy_mnt_ns+0x8c0/0x8c0 [ 390.972371] do_syscall_64+0x1e8/0x640 [ 390.976237] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 390.981070] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 390.986240] RIP: 0033:0x45c99a [ 390.989409] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 17:19:52 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) pipe(&(0x7f0000000240)) bind(r2, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}, "0529"}, 0x22) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) [ 390.997099] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a [ 391.004350] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 [ 391.011609] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 [ 391.018868] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 391.026203] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 17:19:52 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r3, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x112, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x20) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffe14) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 17:19:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f00000001c0)="e9fd99dea3f495a1187a3955f382418d0b2e077b5a965cc8c07167fb53af918e448aa2fc356baa1ca411d19cdadde9c64fadb1f06aa7b16d33fa7f27e998f7d6d4a846bf4451246127ea65fcd3f67dc880854022552902e8d710a685c8d8e452ec2ecd7e23ed34d4dfec28e751c414d7ad470a99bcfff872d0bd55485423c56e193b6696d0da471faf7a730cf655447a59397050234ff20a7f42a68b9a274f47ffefb7c16e337e70f01e0b", 0xab, 0x8001}, {&(0x7f0000000280)="eac75aefbfd9bfc0d235c0432bb45f9d1257432b3d70539e91e77b0bccff2dbd18089709749191ad6060408a985de4f0196d7749e7685a446484042b4305874b0a8aee7f23e0b35e247697957f9ae51f7e819274b6a9", 0x56, 0x7f}, {&(0x7f0000000300)="da1432488133e8cdbdf8e37db2837709035854861238eabf87f7c510d77c75c9d3f51e698b1e909ac32bdf9cb9763ab46a2ae2738124", 0x36, 0xfffffffffffffeff}], 0x40000, &(0x7f00000003c0)={[{@resize={'resize', 0x3d, 0x6}}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}, {@nouser_xattr='nouser_xattr'}, {@tails_off='tails=off'}, {@data_journal='data=journal'}, {@usrjquota_file='usrjquota=syz'}, {@balloc_hashed_reloc='block-allocator=hashed_relocation'}], [{@audit='audit'}, {@subj_type={'subj_type', 0x3d, 'btrfs\x00'}}, {@dont_hash='dont_hash'}]}) 17:19:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 17:19:52 executing program 3 (fault-call:0 fault-nth:78): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x100000000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 17:19:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCSRS485(r2, 0x542f, &(0x7f00000000c0)={0x2, 0x1, 0x7ff}) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r5, 0x0, 0x19, 0x0, &(0x7f0000000040)) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r6, 0x0, 0x19, 0x0, &(0x7f0000000040)) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r7, 0x0, 0x19, 0x0, &(0x7f0000000040)) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IP_VS_SO_GET_INFO(r8, 0x0, 0x19, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000080)={'ip_vti0\x00', &(0x7f00000002c0)=ANY=[@ANYRESOCT, @ANYRESDEC, @ANYRESDEC, @ANYRESOCT=r5, @ANYPTR64=&(0x7f0000000500)=ANY=[@ANYRESOCT=r1, @ANYRESDEC=r6, @ANYRESDEC=r7, @ANYRES16, @ANYPTR64=&(0x7f0000000600)=ANY=[@ANYRES64, @ANYBLOB="feeecd6b3dc4be1e9b96e6c7a59ec92ba8d450a3ac2c6f6c3e2abfb6f498ddda24a53b95defbc659f22e97f76000c21603e9513f9fd33e445ac482c76d11afd05d6548248d30986a8d01fcce53d1ac77c054640854d55256227116c7b954738ec9c9ba61469d03c5e0103a08c59e58e6e2afa3b25827f0677f221e5d84ef703eb0bcdb0ff537b233e75560ed089f47338044811195405210fff7ac9c2f3e13dd28614df52a593123c49a494c77f7b4eec79a12379fbaed4e276de784cbc6ec3f0243ad3eb3b8c3f63ea9ce679faeebd8a599c2845e9f0b50", @ANYPTR64, @ANYRES32, @ANYRES32=r4, @ANYRESHEX=r8, @ANYPTR64, @ANYRESHEX], @ANYBLOB="5cab5c9fba69ddd85c09887f61fe11e2c6c3fca36d25ae5188c2003ff631574c4e7432bad72ca3995b00e60581457d4b79df320ab0e262b54731593d405d02ed771ca276a6893c3d048b6d552cfbc4dbddf736bdffbcae8f3c53c6b104dc76e0fd6844fde572f58f3ba3183707d70ddb50fe927552ae570a9775dfd2b3d3becbb56261987184418c007af5c06fee07081193cd6a8ce0a2139d", @ANYRESDEC=r2]]}) r9 = socket$inet_udplite(0x2, 0x2, 0x88) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x8200, 0x0) r11 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r11, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @dev}, r12}}, 0x48) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r13, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}}}, 0x69) write$RDMA_USER_CM_CMD_DESTROY_ID(r11, &(0x7f00000001c0)={0x1, 0xffffffffffffffe2, 0xfa00, {&(0x7f0000000180), r14}}, 0x18) write$RDMA_USER_CM_CMD_SET_OPTION(r10, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000240), r14, 0x0, 0x2, 0x4}}, 0x20) getsockopt$IP_VS_SO_GET_INFO(r9, 0x0, 0x19, 0x0, &(0x7f0000000040)) setsockopt$IP_VS_SO_SET_EDIT(r9, 0x0, 0x483, &(0x7f00000001c0)={0x25, @empty, 0x4e20, 0x4, 'wlc\x00', 0x20, 0x200, 0x2b}, 0x2c) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r4, 0x10e, 0x8, &(0x7f0000000080)=0x8, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001cd0cc74312571977000000007a0000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 391.270553] FAULT_INJECTION: forcing a failure. [ 391.270553] name failslab, interval 1, probability 0, space 0, times 0 [ 391.287205] CPU: 1 PID: 23585 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 391.294272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 391.294284] Call Trace: [ 391.294304] dump_stack+0x138/0x197 [ 391.294320] should_fail.cold+0x10f/0x159 [ 391.294337] should_failslab+0xdb/0x130 [ 391.318010] kmem_cache_alloc_trace+0x2e9/0x790 [ 391.322689] ? mutex_trylock+0x1c0/0x1c0 [ 391.326762] ? btrfs_close_devices+0x21/0x140 [ 391.331273] btrfs_alloc_device+0xa4/0x6a0 [ 391.335519] ? btrfs_find_device_by_devspec+0xf0/0xf0 [ 391.340721] __btrfs_close_devices+0x2c6/0xa90 [ 391.345315] ? __mutex_unlock_slowpath+0x71/0x800 [ 391.350166] ? btrfs_alloc_device+0x6a0/0x6a0 [ 391.354673] btrfs_close_devices+0x29/0x140 [ 391.359003] btrfs_mount+0x1fd9/0x2b28 [ 391.362894] ? lock_downgrade+0x740/0x740 [ 391.367043] ? find_held_lock+0x35/0x130 [ 391.371109] ? pcpu_alloc+0x3af/0x1050 [ 391.375008] ? btrfs_remount+0x11f0/0x11f0 [ 391.379258] ? rcu_read_lock_sched_held+0x110/0x130 [ 391.384368] ? __lockdep_init_map+0x10c/0x570 [ 391.388871] mount_fs+0x97/0x2a1 [ 391.392254] vfs_kern_mount.part.0+0x5e/0x3d0 [ 391.396752] ? find_held_lock+0x35/0x130 [ 391.400823] vfs_kern_mount+0x40/0x60 [ 391.404630] btrfs_mount+0x3ce/0x2b28 [ 391.408433] ? lock_downgrade+0x740/0x740 [ 391.412586] ? find_held_lock+0x35/0x130 [ 391.416654] ? pcpu_alloc+0x3af/0x1050 [ 391.420555] ? btrfs_remount+0x11f0/0x11f0 [ 391.424795] ? rcu_read_lock_sched_held+0x110/0x130 [ 391.429824] ? __lockdep_init_map+0x10c/0x570 [ 391.434322] ? __lockdep_init_map+0x10c/0x570 [ 391.438825] mount_fs+0x97/0x2a1 [ 391.442199] vfs_kern_mount.part.0+0x5e/0x3d0 [ 391.446699] do_mount+0x417/0x27d0 [ 391.450278] ? copy_mount_options+0x5c/0x2f0 [ 391.454692] ? rcu_read_lock_sched_held+0x110/0x130 [ 391.459724] ? copy_mount_string+0x40/0x40 [ 391.463966] ? copy_mount_options+0x1fe/0x2f0 [ 391.468463] SyS_mount+0xab/0x120 [ 391.468474] ? copy_mnt_ns+0x8c0/0x8c0 [ 391.468488] do_syscall_64+0x1e8/0x640 [ 391.468498] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 391.468514] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 391.468523] RIP: 0033:0x45c99a [ 391.475828] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 391.475839] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a [ 391.475845] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 [ 391.475851] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 [ 391.475857] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 391.475863] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 391.482479] ------------[ cut here ]------------ [ 391.541644] kernel BUG at fs/btrfs/volumes.c:890! [ 391.550824] IPVS: set_ctl: invalid protocol: 37 0.0.0.0:20000 [ 391.551586] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 391.557689] kobject: 'loop0' (ffff8880a48ee5e0): kobject_uevent_env [ 391.562084] Modules linked in: [ 391.562097] CPU: 0 PID: 23585 Comm: syz-executor.3 Not tainted 4.14.151 #0 [ 391.562102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 391.562107] task: ffff888067374100 task.stack: ffff888057c80000 [ 391.562122] RIP: 0010:__btrfs_close_devices+0x7d8/0xa90 [ 391.562126] RSP: 0018:ffff888057c87700 EFLAGS: 00010246 [ 391.562134] RAX: 0000000000040000 RBX: ffff88808d57bb40 RCX: ffffc9000803e000 [ 391.562138] RDX: 0000000000040000 RSI: ffffffff82659518 RDI: 0000000000000282 [ 391.562142] RBP: ffff888057c877c8 R08: ffff888067374100 R09: ffff8880673749c8 [ 391.562147] R10: 0000000000000000 R11: 0000000000000000 R12: ffff888067436cc0 [ 391.562152] R13: ffff88808d57bc08 R14: fffffffffffffff4 R15: dffffc0000000000 [ 391.562158] FS: 00007fc4a260a700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 391.562164] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 391.562168] CR2: 0000001b30421000 CR3: 0000000098b74000 CR4: 00000000001406f0 [ 391.562177] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 391.562181] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 391.562183] Call Trace: [ 391.562198] ? __mutex_unlock_slowpath+0x71/0x800 [ 391.562209] ? btrfs_alloc_device+0x6a0/0x6a0 [ 391.562221] btrfs_close_devices+0x29/0x140 [ 391.562233] btrfs_mount+0x1fd9/0x2b28 [ 391.562243] ? lock_downgrade+0x740/0x740 [ 391.562254] ? find_held_lock+0x35/0x130 [ 391.569412] kobject: 'loop0' (ffff8880a48ee5e0): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 391.571827] ? pcpu_alloc+0x3af/0x1050 [ 391.571843] ? btrfs_remount+0x11f0/0x11f0 [ 391.571856] ? rcu_read_lock_sched_held+0x110/0x130 [ 391.571871] ? __lockdep_init_map+0x10c/0x570 [ 391.571885] mount_fs+0x97/0x2a1 [ 391.740832] vfs_kern_mount.part.0+0x5e/0x3d0 [ 391.745319] ? find_held_lock+0x35/0x130 [ 391.749368] vfs_kern_mount+0x40/0x60 [ 391.753154] btrfs_mount+0x3ce/0x2b28 [ 391.757025] ? lock_downgrade+0x740/0x740 [ 391.761168] ? find_held_lock+0x35/0x130 [ 391.765224] ? pcpu_alloc+0x3af/0x1050 [ 391.769104] ? btrfs_remount+0x11f0/0x11f0 [ 391.773339] ? rcu_read_lock_sched_held+0x110/0x130 [ 391.778355] ? __lockdep_init_map+0x10c/0x570 [ 391.782844] ? __lockdep_init_map+0x10c/0x570 [ 391.787331] mount_fs+0x97/0x2a1 [ 391.790852] vfs_kern_mount.part.0+0x5e/0x3d0 [ 391.795461] do_mount+0x417/0x27d0 [ 391.799085] ? copy_mount_options+0x5c/0x2f0 [ 391.803498] ? rcu_read_lock_sched_held+0x110/0x130 [ 391.808655] ? copy_mount_string+0x40/0x40 [ 391.812972] ? copy_mount_options+0x1fe/0x2f0 [ 391.817588] SyS_mount+0xab/0x120 [ 391.821221] ? copy_mnt_ns+0x8c0/0x8c0 [ 391.825217] do_syscall_64+0x1e8/0x640 [ 391.829100] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 391.834123] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 391.839308] RIP: 0033:0x45c99a [ 391.842575] RSP: 002b:00007fc4a2609a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 391.850442] RAX: ffffffffffffffda RBX: 00007fc4a2609b40 RCX: 000000000045c99a [ 391.857707] RDX: 00007fc4a2609ae0 RSI: 0000000020000080 RDI: 00007fc4a2609b00 [ 391.864985] RBP: 0000000000000001 R08: 00007fc4a2609b40 R09: 00007fc4a2609ae0 [ 391.872246] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 391.879508] R13: 00000000004c9507 R14: 00000000004e0eb8 R15: 0000000000000003 [ 391.886898] Code: c1 ea 03 0f b6 04 02 84 c0 74 08 3c 03 0f 8e 59 02 00 00 48 8b 45 80 c7 80 10 01 00 00 00 00 00 00 e9 e2 f8 ff ff e8 e8 5e f7 fe <0f> 0b e8 e1 5e f7 fe 0f 0b 48 89 f7 e8 d7 10 21 ff e9 ad f8 ff [ 391.906155] RIP: __btrfs_close_devices+0x7d8/0xa90 RSP: ffff888057c87700 [ 391.915660] ---[ end trace adab7dae9c913156 ]--- [ 391.920867] Kernel panic - not syncing: Fatal exception [ 391.920980] kobject: 'loop2' (ffff8880a49897e0): kobject_uevent_env [ 391.927814] Kernel Offset: disabled [ 391.938044] Rebooting in 86400 seconds..