860286c054956dc6691c9763553f5fb548d15cf537077b12089c9295ebcc4bcf22ccc00914ea1a8291a2a88240eeaa3fb5", 0x1000}, {&(0x7f0000002b80)="2ec1b6dd2806af9de4ad0fa11554e4ede0fcd110a2536b112f5dd27b6b730de45308c8645179457c8867acc5dd5e1f86591a641d129b31aa1244a0f674be4ad726df181aa003321eb867fd6ff7da0a531bbaec74a40673a26925a8eb25b75361e55cfe07252bd5a457961ef2d9cb462192858e700910b6fe9ad81acfa158d2188d3458a4537e78415e0ab2fb8fc0d702fb36496fce184b264b6318bcd91b455f8cf66f7f9cefdc6f49e7d480012a8e77cca4e363670406560993e1", 0xbb}, {&(0x7f0000002c40)="4171c5dfa54a038889af89b30f328b230b9a8990279a11d8174a40a96d9994d3508e938105ff2ded868951748fefefb0580798847a1ca8d5d985129f1645ed62cbc7e76c7d9837f003", 0x49}, {&(0x7f0000002cc0)="db93b788f7fc09f472bec6365f64891419d3cbb3307cec07d9fb35a5a870c333882d710c28ee1acd9f804398e2cd00cfb95a57d7238058f79634f8ae62326bea2de9cfadf1decb31fd81e332592204b18da3d5d6cccc132a1ef86f4d963eb221b9e06a042144690b206a055bc66749d0014cb82bf72d33178dfd77eba34581d47f7c8b98a3ea2a346040b7e9a47523a9787e95591f5e9081efbafcc7362a3afdf027f55e246ece5c39a350353d83878742b8d2c4d0eabed5b5fa0d1c83adf7079605", 0xc2}, {&(0x7f0000002dc0)="98979ff9d29ba35fd5083faa63d4e4f1f8a04515b09d8954581604074c2142771aeda2015e6fda56ae946d5d4e257326b75212de62760bab2a922dda512c102c7f57b9", 0x43}], 0x6, 0x0, 0x0, 0x10}, {&(0x7f0000002ec0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003300)=[{&(0x7f0000002f40)="1b584d5b9973822a154de8ec3580393203ad5c6e69fb0fc5082788c78d2655f94b1004a7fb55a07f6096bb85a526faf040610c804e7b4004daee2a1b930e633699f9f3b45e0c3808c0e95e9c44ea2ab1b9f327ef0812a10150e27f8b5bd5782f29bd14e9ce56d50be4d238ae12958a17b38d31f11a8987d4ef94181f72ff56edc25113785a57ecd694db1175ed8d3429b1ac3bdb2ea0cea9cca32399121a1578cfb3b838ab75601227de1e60abab90160c515a446b172d3aac92e0b0d4229b6ab02c2e2a3ff7dd4e4a9e", 0xca}, {&(0x7f0000003040)}, {&(0x7f0000003080)="b2d0a2414bf90c576da33d4f6a64dd1c925f4c2ff7cdef77458a03b74423a6755046cadf8246d972af30e9366d33c4596df01c98e6f4a2efb5573ea289cc23c2cc8153ac7fe76d718bcc6abfbb818009d0c8c585b25b9c568298177cb677b73e7f5c92cf8a214fd12e2691ffac007308f2c1d8ac", 0x74}, {&(0x7f0000003100)="b73e7f8ec6b681e1a48a0b6c2a0bb8b9ebbe70c11dd9bd2a4f756717b992ef5d94b1836435d810f09884c492fcc93d5881b124d5db9d2d8f863516e30f4ac12aa07cbcf2be1c7de8cd63dd211fbfd3f7aab379f188217fe64cba594754d0a4ab28c5de80cb85848e9e345f7e84f01ebd9472ddaae3292bd68ca3d9c32e9a4ed12f0e5dae0e2b0e6b48770cc69f106de513e46c00f8c21d4a6feed2435191fb47c14381a8a1", 0xa5}, {&(0x7f00000031c0)="60c3028a61bb86d348022dfacd12456f17e776600f1b80d990625d20a7387f3bef765cf10ceaee33895378f8f501a2776ebe1c631196044a093cc5888fd3b6e0fef99af773ca23f58db14aeaeff665a22a9e6f91923af44696cc7a645b01e32bbd2cf25fab02824b46d15ff46e09604f20a28b5427c5", 0x76}, {&(0x7f0000003240)="512c6de8850f05c5f2aa89a76bc415015858a4778b8cbda09d17ed7d0fa3017039ad2230846c9623d3b5802656441bcb10a5e18097e0e83810f73099761b12743203e3bc39dae7bdc4d1776b133a7bc0adbec9c72f634b11e0631663893c98d9ed14697dc17c1b", 0x67}, {&(0x7f00000032c0)="6c17ba8d50608c685bb7e24c43274b806a9f65cf18b389c73c00bb01dc09380bd7a31884ef8d6d29e890ed4e4bc4c7897ad87a5a1473be7ebd634021ac", 0x3d}], 0x7, &(0x7f0000003380)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}, @rights={0x18, 0x1, 0x1, [r0, r7]}, @rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r3, r4, r5}, @cred={0x20, 0x1, 0x2, r3, r4, r5}, @rights={0x18, 0x1, 0x1, [r0, r7]}, @cred={0x20, 0x1, 0x2, r3, r4, r5}, @cred={0x20, 0x1, 0x2, r3, r4, r5}, @rights={0x18, 0x1, 0x1, [r0, r7]}], 0x100, 0x400c0}, {&(0x7f0000003480)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000004b80)=[{&(0x7f0000003500)="5e7382fac9d8128a2de418a9a169c00f18e447c0848eebaa347bb6f143235bf085c531eb6c54943996efc711b8d4d05265beda57fe4a333152f19b0d234ad70732be9c3bbb07af47f452063ea5f8478379871fd865b2a6fe2c57ed31bf05b1012735b5b43d964d2ac09ae2520af3559edec0a5ecb5ca750af411fec5e83316526fbefffed1dc4a4e9d7d2823e3cdcd5e8d4b09a7cd6b7772c9662e7cb8d58801eb8f467fa3ad1e4e9b99", 0xaa}, {&(0x7f00000035c0)="0d0a26c97fe0f4ef1c91e50422e898ca32f5aa6cd3c76c28840426c3ee3a6f3849a5afd6c4893b5344804e6a92e3439378a79d826d67ef2a623be925f8cdd9f9b4dfd88abc97e0", 0x47}, {&(0x7f0000003640)="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", 0x1000}, {&(0x7f0000004640)="df6aba93e30544c6545878af3c782a3dae0098b54c93fc8ccd2e7b05f08ac26f9768bad5bb3d79271255ad094b66ca93e94943ad8f7a12b8e464fd99ab9c856f190e3dee618beb350fb626e21b9ccee59dc740d1daa066bff5ac9e604ecc1f7f9d15f9623d4e83cfe13ac6bf129ac8145fa7af40adb41f7cebc0a1c58df6bee9eccf8feec33ed0bcb21aee8bb550760f2343172e92cc3c25d31855690948991ed2ed211532dbf949c2a3a641e04af1385eb4beac8448a8dab93afdf0e18dd9e7706129e310ea4e029a3e53d601", 0xcd}, {&(0x7f0000004740)="1c1c6ea1467add5624c1eeeae0dea882252cb5fb84ced8a7abd5b9d1d8f4178df281b03c505a71a5e4d5b8e95daf8d5d052d0d9cf4ee5c92d23a48905fcb114b0f5eb7ce70a1c84cbc7720fd129e88a3d3e74f56a8ad9762b5dca480345a39b2a24a69fb7aa3962efa148a03a9af008a42423e6d2bfc9de0755bc15aceacb62c5d9455fcd32ca26448b4346a882f4b8da868814c855908a8a579a87dd4bfb2b0e275fb85054b8d12ba1af4ad885e07cedea1c96481fcbe49b3cbacfe17affd5eb8e851d058342500409fcfa4e1ec774ec6d8b49f216e28c10b", 0xd9}, {&(0x7f0000004840)="148ca885fc3d1ddb36e46bdbe991473bb4db869329f94366387659988e13e336dda81a1eab611f5286d4410fe4a6185294bcba6cf19a6e14be6701ae3ca1b65eafbcf5c0bbd9b6ba597e0f3d67a060edac6daa4e80f9e2814b2545e23f4c1ca6b221bdfdb016cc7eef3b09731b9b2fb01a17fd9535525ee77dbb35c7220a393a57ca7e6fbd174ec7e0dd1816a3c761ac85fdd05e7693e6d0c6716d63d15e", 0x9e}, {&(0x7f0000004900)="7407660e4266ff80d0262ce2c7d2530fe2a6c337840cc84ee9e0d97069b8a02ce4a6015a883ca800369819559476d4f4ae6e5e8221474b30d14043c5b5240fc8fef8ee299bb827e576f3fb0e772e17c945a9b3346d78c7263f32e4205a0ff6c6b2bf7dbb5dec8e198679c2d5e8b6b80ffe6358c7049a52173e7433efaacacb0efac7764fa789a1f2a6e62a78157ad484fc6b9ed8079731af41491311cc96c107de490c317b15de854251333ed410ba0bc7b8048fdf8ec7d7cf8c5908872943072f8db79b86dfada12dd06e", 0xcb}, {&(0x7f0000004a00)="f986199793af97e42077f562ff255876b6da83861b09d6b152c1ff2ef7998bece4f9241a35720094eacc4a4baeb6c0c17881328579145e51f744232120e31248a7160b282494c3146f749b74be82bfb5021be46eaeb70e46e2c396bf8aa8262de0d89d3e822fa42e708cffa9e42f7b0b711a552908a711246cb146ab74d771c0c9ae1271adf9796cdef694117391dc83d2ef7297f160e09201cec3fa6cd448680f44614fe20a0b63c56edb9fdf816b7b615f35e3be1509aa7a95d81c89", 0xbd}, {&(0x7f0000004ac0)="a9c5be789659cf442d49520674a2a5742ce026d29bab68fd91f0e90207766f13526b6665e8cac05bf854ca7da7b179f54945aecf986f3d01ccfc69fdbc3b684299ce64f8e3", 0x45}, {&(0x7f0000004b40)="e195c945e6178668fd01a02f64c2b2b15af90473fdcaa30e0aff8f086e3f4188fb", 0x21}], 0xa, &(0x7f0000004c40)=[@rights={0x20, 0x1, 0x1, [r7, r0, r7]}, @rights={0x28, 0x1, 0x1, [r7, r0, r0, r7, r0]}, @cred={0x20, 0x1, 0x2, r3, r4, r5}, @cred={0x20, 0x1, 0x2, r3, r4, r5}], 0x88, 0x80}], 0x4, 0x800) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000004e00)={0x2, 0x6, 0x2, 0x100000000, 0xed, 0x1}) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000004e40)) r9 = syz_open_dev$sndtimer(&(0x7f0000004e80)='/dev/snd/timer\x00', 0x0, 0x40) readv(r9, &(0x7f0000004f40)=[{&(0x7f0000004ec0)=""/67, 0x43}], 0x1) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000004f80)={0xc, @empty, 0x4e23, 0x1, 'dh\x00', 0x4, 0x1, 0x13}, 0x2c) clock_gettime(0x0, &(0x7f0000005040)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000005080)={0x0, 0x0}) write$sndseq(r0, &(0x7f00000050c0)=[{0x8000, 0xffffffff, 0x45, 0x6, @tick=0xffffffffffffff43, {0x5, 0xff}, {0x2, 0x2}, @note={0x100000000, 0x4, 0x9, 0x7, 0x1}}, {0x33, 0x1, 0x7f, 0x2, @time={0x77359400}, {0xfff, 0x40}, {0x80000000, 0x3ff}, @raw32={[0x2, 0x8000000080, 0x4]}}, {0x3ff, 0x2, 0xffffffff, 0x6, @time={0x0, 0x989680}, {0x2, 0x3}, {0x6, 0x101}, @ext={0x7f, &(0x7f0000004fc0)="154b5365a4023c55dbf0d10f7f19caff6b6bfeef49f3e9403c8a4c34ef91b5415edc2f71d7441c10950934fed967aa81fb3071e8e3b6620c3078d402c30a37376b48fae2bb31f730317336d4d8cbde73b98f9e3212be3d308f72b62b5e9ea8c0d7385d1caadb2cba2ab6f1074707267fb179a76c57dbcc4c59498fb7bf94b6"}}, {0x7ff, 0x3, 0x319, 0x9, @time={r10, r11+10000000}, {0x0, 0x3}, {0x7, 0x1f}, @control={0x8000, 0x8001, 0x4}}, {0xf, 0x4, 0x1, 0x2, @tick=0x3, {0x5, 0x3}, {0x2, 0xffffffffffffffe1}, @control={0x401, 0x1800000000, 0x2}}, {0x7, 0x2, 0x1, 0x77, @time={r12, r13+10000000}, {0xffff}, {0x80000000, 0x9}, @control={0xc172, 0x7, 0xfffffffffffffff7}}, {0x2, 0x4, 0x400, 0x0, @time={0x0, 0x989680}, {0x80000000, 0xe71}, {0x5, 0x3}, @connect={{0x2, 0x10001}, {0x7fffffff, 0xffffffffffffff54}}}], 0x150) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000005240)={0xfffffffffffffffd}, 0x4) write$cgroup_pid(r0, &(0x7f0000005280)=r3, 0x12) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000052c0)={0x3, 0xa, 0x7, 0x5, r1}, 0x10) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000005300)={@remote={0xfe, 0x80, [], 0xbb}, r8}, 0x14) r14 = syz_genetlink_get_family_id$ipvs(&(0x7f0000005380)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000005440)={&(0x7f0000005340)={0x10}, 0xc, &(0x7f0000005400)={&(0x7f00000053c0)={0x38, r14, 0x8, 0x70bd28, 0x25dfdbfc, {0x9}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x94f}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x38}, 0x1, 0x0, 0x0, 0x4004}, 0x40) fcntl$setstatus(r0, 0x4, 0x40000) syz_open_dev$vcsn(&(0x7f0000005480)='/dev/vcs#\x00', 0x81, 0x800) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000054c0)={r6, 0x12, 0x2, 0xfff, 0x79, 0x401}, &(0x7f0000005500)=0x14) ioctl$SNDRV_TIMER_IOCTL_SELECT(r9, 0x40345410, &(0x7f0000005540)={{0x0, 0x1, 0xffffffff, 0x2, 0x100000001}}) 16:06:35 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x400, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000080)=0x7) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000100), 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) tee(r3, r2, 0x3ff, 0xa) shutdown(r3, 0x1) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x8}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000140)={r4, 0x2, 0x1}, &(0x7f0000000180)=0x8) r5 = accept4(r2, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) sendto$inet6(r5, &(0x7f0000000200)="414a8e54594962f4a8d57acc9e89386ebae1c5dd86ff24e42e56f195ed0cf9531d40d705c3a4f82aeecab49fc78f29baf857400bf75c20babc7b579fca214a918cf31dbfe9ea7448af1e55c47556fa0cf8cff07fc89778", 0x57, 0x1, 0x0, 0x0) dup2(r2, r3) 16:06:35 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x1a0) 16:06:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x64000, 0xb5) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x40086602, &(0x7f0000000000)=r0) mknod(&(0x7f0000000140)='./file0/file0\x00', 0xc000, 0x1) umount2(&(0x7f0000000100)='./file0\x00', 0x12) 16:06:35 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 267.906879] FAULT_INJECTION: forcing a failure. [ 267.906879] name failslab, interval 1, probability 0, space 0, times 0 [ 267.918257] CPU: 0 PID: 19428 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 267.926778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.936181] Call Trace: [ 267.938804] dump_stack+0x1c9/0x2b4 [ 267.942471] ? dump_stack_print_info.cold.2+0x52/0x52 [ 267.947724] ? perf_trace_lock+0x49d/0x920 [ 267.952091] should_fail.cold.4+0xa/0x11 16:06:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) [ 267.956198] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 267.957617] Unknown ioctl -1073434969 [ 267.961372] ? save_stack+0xa9/0xd0 [ 267.961396] ? save_stack+0x43/0xd0 [ 267.961416] ? kasan_kmalloc+0xc4/0xe0 [ 267.976456] ? vfs_new_fs_context+0x5a/0x700 [ 267.980904] ? vfs_kern_mount.part.37+0x37/0x190 [ 267.985698] ? btrfs_mount+0x4b7/0x217c [ 267.989718] ? legacy_get_tree+0x118/0x440 [ 267.994028] ? vfs_get_tree+0x1cb/0x5c0 [ 267.998130] ? do_mount+0x6c1/0x1fb0 [ 268.001888] ? ksys_mount+0x12d/0x140 [ 268.005738] ? __x64_sys_mount+0xbe/0x150 [ 268.009927] ? do_syscall_64+0x1b9/0x820 [ 268.014048] ? lock_acquire+0x1e4/0x540 [ 268.018077] ? fs_reclaim_acquire+0x20/0x20 [ 268.022454] ? lock_downgrade+0x8f0/0x8f0 [ 268.026634] ? fs_reclaim_acquire+0x20/0x20 [ 268.031018] ? check_same_owner+0x340/0x340 [ 268.035370] ? debug_mutex_init+0x2d/0x60 [ 268.039580] ? rcu_note_context_switch+0x730/0x730 [ 268.044887] __should_failslab+0x124/0x180 [ 268.049191] should_failslab+0x9/0x14 [ 268.053191] __kmalloc_track_caller+0x2c4/0x760 [ 268.057875] ? vfs_set_fs_source+0x67/0x180 [ 268.062201] kmemdup_nul+0x31/0xa0 [ 268.065739] vfs_set_fs_source+0x67/0x180 [ 268.069891] vfs_kern_mount.part.37+0x7b/0x190 [ 268.074478] vfs_kern_mount+0x4a/0x70 [ 268.078275] btrfs_mount+0x4b7/0x217c [ 268.082085] ? kernel_text_address+0x79/0xf0 [ 268.086498] ? __kernel_text_address+0xd/0x40 [ 268.090994] ? unwind_get_return_address+0x61/0xa0 [ 268.095925] ? btrfs_remount+0x16e0/0x16e0 [ 268.100179] ? save_stack+0xa9/0xd0 [ 268.103809] ? save_stack+0x43/0xd0 [ 268.107425] ? kasan_kmalloc+0xc4/0xe0 [ 268.111305] ? __kmalloc_track_caller+0x14a/0x760 [ 268.116145] ? legacy_parse_monolithic+0xc1/0x1d0 [ 268.120988] ? do_mount+0x69e/0x1fb0 [ 268.124698] ? ksys_mount+0x12d/0x140 [ 268.128500] ? __x64_sys_mount+0xbe/0x150 [ 268.132658] ? do_syscall_64+0x1b9/0x820 [ 268.136734] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.142104] ? do_syscall_64+0x1b9/0x820 [ 268.146165] ? lock_acquire+0x1e4/0x540 [ 268.150135] ? cache_grow_end.part.37+0x95/0x170 [ 268.154889] ? lock_downgrade+0x8f0/0x8f0 [ 268.159052] ? kasan_check_read+0x11/0x20 [ 268.163196] ? do_raw_spin_unlock+0xa7/0x2f0 [ 268.167608] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 268.172198] ? kasan_check_write+0x14/0x20 [ 268.176688] ? do_raw_spin_lock+0xc1/0x200 [ 268.180927] ? kasan_unpoison_shadow+0x35/0x50 [ 268.185509] ? kasan_kmalloc+0xc4/0xe0 [ 268.189411] ? __kmalloc_track_caller+0x311/0x760 [ 268.194266] ? __kmalloc_track_caller+0x311/0x760 [ 268.199107] ? btrfs_remount+0x16e0/0x16e0 [ 268.203342] legacy_get_tree+0x118/0x440 [ 268.207394] ? btrfs_remount+0x16e0/0x16e0 [ 268.211618] ? legacy_get_tree+0x118/0x440 [ 268.215861] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.221514] vfs_get_tree+0x1cb/0x5c0 [ 268.225316] ? vfs_set_fs_source+0x12c/0x180 [ 268.230442] do_mount+0x6c1/0x1fb0 [ 268.233980] ? copy_mount_string+0x40/0x40 [ 268.238230] ? retint_kernel+0x10/0x10 [ 268.242387] ? copy_mount_options+0x213/0x380 [ 268.246887] ? __sanitizer_cov_trace_pc+0x14/0x50 [ 268.251723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.257262] ? copy_mount_options+0x285/0x380 [ 268.261756] ksys_mount+0x12d/0x140 [ 268.265382] __x64_sys_mount+0xbe/0x150 [ 268.269366] do_syscall_64+0x1b9/0x820 [ 268.273263] ? syscall_return_slowpath+0x5e0/0x5e0 [ 268.278194] ? syscall_return_slowpath+0x31d/0x5e0 [ 268.283119] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 268.288147] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.293683] ? prepare_exit_to_usermode+0x291/0x3b0 [ 268.298692] ? perf_trace_sys_enter+0xb10/0xb10 [ 268.303453] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 268.308316] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.313502] RIP: 0033:0x4584ea [ 268.316684] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 268.336155] RSP: 002b:00007f0a468d8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 268.343860] RAX: ffffffffffffffda RBX: 00007f0a468d8b30 RCX: 00000000004584ea [ 268.351129] RDX: 00007f0a468d8ad0 RSI: 0000000020000100 RDI: 00007f0a468d8af0 [ 268.358393] RBP: 0000000020000100 R08: 00007f0a468d8b30 R09: 00007f0a468d8ad0 [ 268.365688] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000015 [ 268.372970] R13: 0000000000000000 R14: 00000000004d3c48 R15: 000000000000002f 16:06:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7209000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r0, 0x0, 0x3f, &(0x7f0000000000)=0xac, 0x4) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000040)={0x2, [0x9, 0x7]}, 0x8) 16:06:36 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:36 executing program 6 (fault-call:1 fault-nth:48): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:36 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x7ffffffffffff) [ 268.594005] FAULT_INJECTION: forcing a failure. [ 268.594005] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 268.606110] CPU: 1 PID: 19479 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 268.614639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.624292] Call Trace: [ 268.626898] dump_stack+0x1c9/0x2b4 [ 268.630533] ? dump_stack_print_info.cold.2+0x52/0x52 [ 268.635901] ? perf_trace_lock+0xde/0x920 [ 268.640059] should_fail.cold.4+0xa/0x11 [ 268.644123] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 268.649252] ? trace_hardirqs_on+0x10/0x10 [ 268.653480] ? trace_hardirqs_on+0x10/0x10 [ 268.657963] ? trace_hardirqs_on+0x10/0x10 [ 268.662217] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.667760] ? __follow_mount_rcu.isra.37.part.38+0x175/0x890 [ 268.673635] ? __find_get_block+0x36d/0xe60 [ 268.677959] ? lock_acquire+0x1e4/0x540 [ 268.681953] ? fs_reclaim_acquire+0x20/0x20 [ 268.686276] ? lock_downgrade+0x8f0/0x8f0 [ 268.690427] ? check_same_owner+0x340/0x340 [ 268.694743] ? rcu_note_context_switch+0x730/0x730 [ 268.699669] __alloc_pages_nodemask+0x36e/0xdb0 [ 268.704332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.709961] ? __alloc_pages_slowpath+0x2d00/0x2d00 [ 268.714998] ? find_get_pages_contig+0x1890/0x1890 [ 268.719918] ? lock_acquire+0x1e4/0x540 [ 268.723989] ? lo_open+0x1b/0xb0 [ 268.727448] ? __blkdev_get+0x19b/0x13c0 [ 268.731504] ? lock_release+0xa30/0xa30 [ 268.735566] ? zap_class+0x740/0x740 [ 268.739273] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 268.744819] alloc_pages_current+0x10c/0x210 [ 268.749219] ? perf_trace_lock+0xde/0x920 [ 268.753368] __page_cache_alloc+0x398/0x5e0 [ 268.757732] ? zap_class+0x740/0x740 [ 268.761435] ? filemap_range_has_page+0x4c0/0x4c0 [ 268.766280] do_read_cache_page+0x736/0x13c0 [ 268.770679] ? blkdev_writepages+0x30/0x30 [ 268.774904] ? pagecache_get_page+0xe40/0xe40 [ 268.779388] ? perf_trace_lock+0xde/0x920 [ 268.783634] ? blkdev_get+0x6cd/0xb50 [ 268.787436] ? lock_downgrade+0x8f0/0x8f0 [ 268.791573] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.797102] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.802630] ? _atomic_dec_and_lock+0x22a/0x360 [ 268.807293] ? _atomic_dec_and_lock_irqsave+0x3e0/0x3e0 [ 268.812643] ? __down_interruptible+0x700/0x700 [ 268.817309] ? kobj_lookup+0x36a/0x460 [ 268.821191] ? kasan_check_write+0x14/0x20 [ 268.825411] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 268.830336] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 268.835874] ? iput+0x63a/0xaa0 [ 268.839155] ? inode_add_lru+0x2a0/0x2a0 [ 268.843223] ? kasan_check_read+0x11/0x20 [ 268.847373] ? do_raw_spin_unlock+0xa7/0x2f0 [ 268.851771] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 268.856346] ? kasan_check_write+0x14/0x20 [ 268.860569] ? do_raw_spin_lock+0xc1/0x200 [ 268.864797] ? blkdev_get+0xc8/0xb50 [ 268.868506] ? bdget+0x5e0/0x5e0 [ 268.871858] ? mntput+0x74/0xa0 [ 268.875134] ? path_put+0x50/0x70 [ 268.878574] ? lookup_bdev+0xbc/0x250 [ 268.882393] ? blkdev_open+0x280/0x280 [ 268.886280] read_cache_page_gfp+0x6f/0x90 [ 268.890540] btrfs_scan_one_device+0x2cf/0x1530 [ 268.895199] ? unwind_get_return_address+0x61/0xa0 [ 268.900120] ? __save_stack_trace+0x8d/0xf0 [ 268.904531] ? device_list_add+0xcb0/0xcb0 [ 268.908766] ? save_stack+0xa9/0xd0 [ 268.912383] ? save_stack+0x43/0xd0 [ 268.915998] ? __kasan_slab_free+0x11a/0x170 [ 268.920390] ? kasan_slab_free+0xe/0x10 [ 268.924347] ? kfree+0xd9/0x260 [ 268.927611] ? btrfs_mount_root+0x142a/0x1f10 [ 268.932099] ? legacy_get_tree+0x118/0x440 [ 268.936327] ? vfs_get_tree+0x1cb/0x5c0 [ 268.940284] ? vfs_kern_mount.part.37+0x119/0x190 [ 268.945286] ? vfs_kern_mount+0x4a/0x70 [ 268.949254] ? btrfs_mount+0x4b7/0x217c [ 268.953223] ? legacy_get_tree+0x118/0x440 [ 268.957445] ? vfs_get_tree+0x1cb/0x5c0 [ 268.961408] ? do_mount+0x6c1/0x1fb0 [ 268.965117] ? ksys_mount+0x12d/0x140 [ 268.968902] ? __x64_sys_mount+0xbe/0x150 [ 268.973043] ? do_syscall_64+0x1b9/0x820 [ 268.977103] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.982454] ? do_raw_spin_unlock+0xa7/0x2f0 [ 268.986844] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 268.991415] ? kasan_check_write+0x14/0x20 [ 268.995631] ? do_raw_spin_lock+0xc1/0x200 [ 268.999849] ? trace_hardirqs_off+0xd/0x10 [ 269.004076] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 269.009171] ? debug_check_no_obj_freed+0x30b/0x595 [ 269.014176] ? kasan_unpoison_shadow+0x35/0x50 [ 269.018760] ? trace_hardirqs_off+0xd/0x10 [ 269.022993] ? quarantine_put+0x10d/0x1b0 [ 269.027140] ? __kasan_slab_free+0x131/0x170 [ 269.031538] ? trace_hardirqs_on+0xd/0x10 [ 269.035674] btrfs_mount_root+0xd6c/0x1f10 [ 269.039900] ? do_mount+0x6c1/0x1fb0 [ 269.043610] ? btrfs_decode_error+0x70/0x70 [ 269.047918] ? lock_acquire+0x1e4/0x540 [ 269.051890] ? fs_reclaim_acquire+0x20/0x20 [ 269.056197] ? lock_downgrade+0x8f0/0x8f0 [ 269.060348] ? lock_downgrade+0x8f0/0x8f0 [ 269.064482] ? lock_release+0xa30/0xa30 [ 269.068450] ? check_same_owner+0x340/0x340 [ 269.072755] ? check_same_owner+0x340/0x340 [ 269.078018] ? debug_mutex_init+0x2d/0x60 [ 269.082157] ? kasan_kmalloc+0xc4/0xe0 [ 269.086039] ? __kmalloc_track_caller+0x311/0x760 [ 269.090866] ? __kmalloc_track_caller+0x311/0x760 [ 269.095702] ? btrfs_decode_error+0x70/0x70 [ 269.100009] legacy_get_tree+0x118/0x440 [ 269.104059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.109583] vfs_get_tree+0x1cb/0x5c0 [ 269.113369] ? vfs_set_fs_source+0x12c/0x180 [ 269.117766] vfs_kern_mount.part.37+0x119/0x190 [ 269.122427] vfs_kern_mount+0x4a/0x70 [ 269.126220] btrfs_mount+0x4b7/0x217c [ 269.130008] ? kernel_text_address+0x79/0xf0 [ 269.134405] ? __kernel_text_address+0xd/0x40 [ 269.138897] ? unwind_get_return_address+0x61/0xa0 [ 269.143815] ? btrfs_remount+0x16e0/0x16e0 [ 269.148039] ? save_stack+0xa9/0xd0 [ 269.151650] ? save_stack+0x43/0xd0 [ 269.155263] ? kasan_kmalloc+0xc4/0xe0 [ 269.159136] ? __kmalloc_track_caller+0x14a/0x760 [ 269.163974] ? legacy_parse_monolithic+0xc1/0x1d0 [ 269.168808] ? do_mount+0x69e/0x1fb0 [ 269.172506] ? ksys_mount+0x12d/0x140 [ 269.176298] ? __x64_sys_mount+0xbe/0x150 [ 269.180515] ? do_syscall_64+0x1b9/0x820 [ 269.184568] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.189920] ? do_syscall_64+0x1b9/0x820 [ 269.193980] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.199343] ? trace_hardirqs_off+0xd/0x10 [ 269.203572] ? lock_acquire+0x1e4/0x540 [ 269.207549] ? fs_reclaim_acquire+0x20/0x20 [ 269.211855] ? lock_downgrade+0x8f0/0x8f0 [ 269.215994] ? lock_downgrade+0x8f0/0x8f0 [ 269.220134] ? lock_release+0xa30/0xa30 [ 269.224092] ? lock_release+0xa30/0xa30 [ 269.228052] ? check_same_owner+0x340/0x340 [ 269.232359] ? check_same_owner+0x340/0x340 [ 269.236668] ? debug_mutex_init+0x2d/0x60 [ 269.240811] ? kasan_unpoison_shadow+0x35/0x50 [ 269.245391] ? kasan_kmalloc+0xc4/0xe0 [ 269.249285] ? __kmalloc_track_caller+0x311/0x760 [ 269.254110] ? __kmalloc_track_caller+0x311/0x760 [ 269.258953] ? btrfs_remount+0x16e0/0x16e0 [ 269.263182] legacy_get_tree+0x118/0x440 [ 269.267227] ? btrfs_remount+0x16e0/0x16e0 [ 269.271452] ? legacy_get_tree+0x118/0x440 [ 269.275675] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.281197] vfs_get_tree+0x1cb/0x5c0 [ 269.284990] ? vfs_set_fs_source+0x12c/0x180 [ 269.289391] do_mount+0x6c1/0x1fb0 [ 269.292918] ? check_same_owner+0x340/0x340 [ 269.297225] ? lock_release+0xa30/0xa30 [ 269.301187] ? copy_mount_string+0x40/0x40 [ 269.305405] ? kasan_kmalloc+0xc4/0xe0 [ 269.309283] ? kmem_cache_alloc_trace+0x318/0x780 [ 269.314128] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 269.319660] ? _copy_from_user+0xdf/0x150 [ 269.323795] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.329320] ? copy_mount_options+0x285/0x380 [ 269.333800] ksys_mount+0x12d/0x140 [ 269.337415] __x64_sys_mount+0xbe/0x150 [ 269.341384] do_syscall_64+0x1b9/0x820 [ 269.345256] ? finish_task_switch+0x1d3/0x870 [ 269.349739] ? syscall_return_slowpath+0x5e0/0x5e0 [ 269.354654] ? syscall_return_slowpath+0x31d/0x5e0 [ 269.359570] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 269.364578] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.370103] ? prepare_exit_to_usermode+0x291/0x3b0 [ 269.375105] ? perf_trace_sys_enter+0xb10/0xb10 [ 269.379769] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 269.384603] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.389777] RIP: 0033:0x4584ea [ 269.392946] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 269.412257] RSP: 002b:00007f0a468d8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 269.419949] RAX: ffffffffffffffda RBX: 00007f0a468d8b30 RCX: 00000000004584ea [ 269.427202] RDX: 00007f0a468d8ad0 RSI: 0000000020000100 RDI: 00007f0a468d8af0 [ 269.434454] RBP: 0000000020000100 R08: 00007f0a468d8b30 R09: 00007f0a468d8ad0 16:06:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x48000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) [ 269.441711] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000015 [ 269.448971] R13: 0000000000000000 R14: 00000000004d3c48 R15: 0000000000000030 16:06:37 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x19000)=nil, 0x19000, 0x6, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x40200, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x80200, 0x0) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000140)={0x6000, &(0x7f00000000c0), 0x0, r1}) getpid() r2 = semget$private(0x0, 0x4, 0x201) semctl$SEM_STAT(r2, 0x0, 0x12, &(0x7f0000000040)=""/2) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000e53fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) ioctl$UFFDIO_UNREGISTER(r3, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x2000}) 16:06:37 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\b', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:37 executing program 6 (fault-call:1 fault-nth:49): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:37 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x400000) [ 269.631351] Unknown ioctl -1073434969 [ 269.641671] FAULT_INJECTION: forcing a failure. [ 269.641671] name failslab, interval 1, probability 0, space 0, times 0 [ 269.653086] CPU: 0 PID: 19503 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 269.661602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.671009] Call Trace: [ 269.673627] dump_stack+0x1c9/0x2b4 [ 269.677288] ? dump_stack_print_info.cold.2+0x52/0x52 [ 269.682518] ? perf_trace_lock+0x49d/0x920 [ 269.686793] should_fail.cold.4+0xa/0x11 [ 269.690884] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 269.696005] ? save_stack+0xa9/0xd0 [ 269.699633] ? save_stack+0x43/0xd0 [ 269.703255] ? kmem_cache_alloc_trace+0x152/0x780 [ 269.708090] ? btrfs_mount_root+0x244/0x1f10 [ 269.712488] ? legacy_get_tree+0x118/0x440 [ 269.716719] ? vfs_get_tree+0x1cb/0x5c0 [ 269.720704] ? vfs_kern_mount+0x4a/0x70 [ 269.724672] ? btrfs_mount+0x4b7/0x217c [ 269.728646] ? vfs_get_tree+0x1cb/0x5c0 [ 269.732623] ? do_mount+0x6c1/0x1fb0 [ 269.736341] ? ksys_mount+0x12d/0x140 [ 269.740131] ? __x64_sys_mount+0xbe/0x150 [ 269.744276] ? do_syscall_64+0x1b9/0x820 [ 269.748345] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.753709] ? ksys_mount+0x12d/0x140 [ 269.757508] ? __x64_sys_mount+0xbe/0x150 [ 269.761654] ? do_syscall_64+0x1b9/0x820 [ 269.765710] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.771098] ? lock_acquire+0x1e4/0x540 [ 269.775065] ? fs_reclaim_acquire+0x20/0x20 [ 269.779391] ? lock_downgrade+0x8f0/0x8f0 [ 269.783553] ? check_same_owner+0x340/0x340 [ 269.787876] ? kasan_kmalloc+0xc4/0xe0 [ 269.791767] ? rcu_note_context_switch+0x730/0x730 [ 269.796693] __should_failslab+0x124/0x180 [ 269.800924] should_failslab+0x9/0x14 [ 269.804715] kmem_cache_alloc_trace+0x2cb/0x780 [ 269.809380] ? __kmalloc_node+0x47/0x70 [ 269.813357] btrfs_mount_root+0x2a1/0x1f10 [ 269.817601] ? do_mount+0x6c1/0x1fb0 [ 269.821343] ? ksys_mount+0x12d/0x140 [ 269.825132] ? __x64_sys_mount+0xbe/0x150 [ 269.829277] ? do_syscall_64+0x1b9/0x820 [ 269.833338] ? btrfs_decode_error+0x70/0x70 [ 269.837666] ? lock_acquire+0x1e4/0x540 [ 269.841640] ? fs_reclaim_acquire+0x20/0x20 [ 269.845954] ? lock_downgrade+0x8f0/0x8f0 [ 269.850107] ? lock_downgrade+0x8f0/0x8f0 [ 269.854251] ? lock_release+0xa30/0xa30 [ 269.858221] ? lock_release+0xa30/0xa30 [ 269.862189] ? check_same_owner+0x340/0x340 [ 269.866499] ? check_same_owner+0x340/0x340 [ 269.870819] ? debug_mutex_init+0x2d/0x60 [ 269.874968] ? kasan_kmalloc+0xc4/0xe0 [ 269.878853] ? __kmalloc_track_caller+0x311/0x760 [ 269.883693] ? __kmalloc_track_caller+0x311/0x760 [ 269.888530] ? btrfs_decode_error+0x70/0x70 [ 269.892846] legacy_get_tree+0x118/0x440 [ 269.896914] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.902449] vfs_get_tree+0x1cb/0x5c0 [ 269.906240] ? vfs_set_fs_source+0x12c/0x180 [ 269.910656] vfs_kern_mount.part.37+0x119/0x190 [ 269.915334] vfs_kern_mount+0x4a/0x70 [ 269.919131] btrfs_mount+0x4b7/0x217c [ 269.922930] ? kernel_text_address+0x79/0xf0 [ 269.927330] ? __kernel_text_address+0xd/0x40 [ 269.931823] ? unwind_get_return_address+0x61/0xa0 [ 269.936750] ? btrfs_remount+0x16e0/0x16e0 [ 269.940983] ? save_stack+0xa9/0xd0 [ 269.944603] ? save_stack+0x43/0xd0 [ 269.948215] ? kasan_kmalloc+0xc4/0xe0 [ 269.952177] ? __kmalloc_track_caller+0x14a/0x760 [ 269.957011] ? legacy_parse_monolithic+0xc1/0x1d0 [ 269.961849] ? do_mount+0x69e/0x1fb0 [ 269.965555] ? ksys_mount+0x12d/0x140 [ 269.969440] ? __x64_sys_mount+0xbe/0x150 [ 269.973591] ? do_syscall_64+0x1b9/0x820 [ 269.977651] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.983007] ? do_syscall_64+0x1b9/0x820 [ 269.987066] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.992436] ? trace_hardirqs_off+0xd/0x10 [ 269.996671] ? lock_acquire+0x1e4/0x540 [ 270.000643] ? __kmalloc_track_caller+0x549/0x760 [ 270.005474] ? lock_downgrade+0x8f0/0x8f0 [ 270.009619] ? kasan_check_read+0x11/0x20 [ 270.013772] ? do_raw_spin_unlock+0xa7/0x2f0 [ 270.018167] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 270.022744] ? kasan_unpoison_shadow+0x35/0x50 [ 270.027316] ? kasan_kmalloc+0xc4/0xe0 [ 270.031203] ? __kmalloc_track_caller+0x311/0x760 [ 270.036045] ? btrfs_remount+0x16e0/0x16e0 [ 270.040282] legacy_get_tree+0x118/0x440 [ 270.044346] ? btrfs_remount+0x16e0/0x16e0 [ 270.048591] ? legacy_get_tree+0x118/0x440 [ 270.052827] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.058369] vfs_get_tree+0x1cb/0x5c0 [ 270.062175] ? vfs_set_fs_source+0x12c/0x180 [ 270.066590] do_mount+0x6c1/0x1fb0 [ 270.070150] ? check_same_owner+0x340/0x340 [ 270.074473] ? lock_release+0xa30/0xa30 [ 270.078449] ? copy_mount_string+0x40/0x40 [ 270.082683] ? kasan_kmalloc+0xc4/0xe0 [ 270.086578] ? kmem_cache_alloc_trace+0x318/0x780 [ 270.091414] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 270.096940] ? _copy_from_user+0xdf/0x150 [ 270.101084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.106619] ? copy_mount_options+0x285/0x380 [ 270.111118] ksys_mount+0x12d/0x140 [ 270.114738] __x64_sys_mount+0xbe/0x150 [ 270.118717] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.124260] do_syscall_64+0x1b9/0x820 [ 270.128137] ? syscall_slow_exit_work+0x500/0x500 [ 270.133060] ? syscall_return_slowpath+0x5e0/0x5e0 [ 270.138003] ? syscall_return_slowpath+0x31d/0x5e0 [ 270.142930] ? prepare_exit_to_usermode+0x291/0x3b0 [ 270.147950] ? perf_trace_sys_enter+0xb10/0xb10 [ 270.152614] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 270.157458] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.162636] RIP: 0033:0x4584ea [ 270.165810] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 270.185202] RSP: 002b:00007f0a468d8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 270.192910] RAX: ffffffffffffffda RBX: 00007f0a468d8b30 RCX: 00000000004584ea [ 270.200169] RDX: 00007f0a468d8ad0 RSI: 0000000020000100 RDI: 00007f0a468d8af0 [ 270.207605] RBP: 0000000020000100 R08: 00007f0a468d8b30 R09: 00007f0a468d8ad0 [ 270.214865] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000015 [ 270.222122] R13: 0000000000000000 R14: 00000000004d3c48 R15: 0000000000000031 16:06:38 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6_sctp(0xa, 0xc001, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x11, &(0x7f0000ad2000), &(0x7f0000000080)=0x23c) 16:06:38 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:38 executing program 3: openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x400000, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = open(&(0x7f0000000040)='./file0\x00', 0x200, 0x38) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000000100)) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r2, &(0x7f0000000000), 0xa4, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r3, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x2, 0x1, 0xffffffffffffffff}, 0x14}, 0x1}, 0x0) sendto$inet(r2, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f00000000c0)={0x2}, 0x6) 16:06:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7400, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:38 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x105082) r1 = memfd_create(&(0x7f0000000040)="0009e0ffffffffffffff05000000000400000000", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f0000000140)={0xfffffffffffff801, 0x1d327cba, 0x2}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000000)=0x7fff, 0x4) fallocate(r0, 0x11, 0x0, 0x100000001) socket$netlink(0x10, 0x3, 0x1f) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r1, &(0x7f0000000100)={0x40000001}) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000180)={0x3f, @empty, 0x4e24, 0x0, 'wlc\x00', 0x2, 0x200, 0x38}, 0x2c) 16:06:38 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x3f00) 16:06:38 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = dup2(r0, r0) r2 = pkey_alloc(0x0, 0x0) pkey_free(r2) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0x6c, &(0x7f0000000000), &(0x7f0000000080)=0x4) 16:06:38 executing program 6 (fault-call:1 fault-nth:50): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:38 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x74, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:38 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000000)={0x8f, 0x0, [0x9]}) 16:06:38 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:38 executing program 4: syz_emit_ethernet(0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6050a0bbfe0000172a00000000000000000000"], &(0x7f0000000040)) r0 = socket$inet(0x2, 0xa, 0x7dcf9c7d) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'veth1_to_team\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="ffff000000b97c0000000000000000000200000000"]}) setsockopt$inet_int(r1, 0x0, 0x40, &(0x7f0000000080), 0x4) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000000), &(0x7f00000001c0)=0xc) 16:06:38 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0xffffffffa0010000) [ 270.698818] IPVS: ftp: loaded support on port[0] = 21 16:06:38 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)="6274726673fd", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 270.931975] FAULT_INJECTION: forcing a failure. [ 270.931975] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 270.943861] CPU: 0 PID: 19603 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 270.952386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.961758] Call Trace: [ 270.964377] dump_stack+0x1c9/0x2b4 [ 270.968068] ? dump_stack_print_info.cold.2+0x52/0x52 [ 270.973297] ? zap_class+0x740/0x740 [ 270.977058] should_fail.cold.4+0xa/0x11 16:06:38 executing program 1: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x80100, 0x0) clock_adjtime(0x0, &(0x7f0000000c80)) 16:06:38 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf5ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) [ 270.981157] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 270.986310] ? perf_trace_run_bpf_submit+0x269/0x3b0 [ 270.991440] ? perf_trace_run_bpf_submit+0x269/0x3b0 [ 270.996578] ? perf_trace_run_bpf_submit+0x270/0x3b0 [ 271.001723] ? perf_tp_event+0xc40/0xc40 [ 271.005819] ? lock_acquire+0x1e4/0x540 [ 271.009835] ? debug_check_no_obj_freed+0x30b/0x595 [ 271.014886] ? lock_downgrade+0x8f0/0x8f0 [ 271.019068] ? memset+0x31/0x40 [ 271.022383] ? perf_trace_lock+0x49d/0x920 [ 271.026660] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.032234] ? should_fail+0x246/0xd86 [ 271.036159] ? zap_class+0x740/0x740 [ 271.039915] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 271.045096] __alloc_pages_nodemask+0x36e/0xdb0 [ 271.049834] ? __alloc_pages_slowpath+0x2d00/0x2d00 [ 271.054914] ? rcu_note_context_switch+0x730/0x730 [ 271.059905] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 271.065513] ? kernel_poison_pages+0x136/0x220 [ 271.070326] ? trace_hardirqs_on+0xd/0x10 [ 271.074499] ? lock_acquire+0x1e4/0x540 [ 271.078483] ? fs_reclaim_acquire+0x20/0x20 [ 271.082814] ? lock_downgrade+0x8f0/0x8f0 [ 271.086967] ? lock_release+0xa30/0xa30 [ 271.090952] ? check_same_owner+0x340/0x340 [ 271.095287] cache_grow_begin+0x91/0x710 [ 271.099350] kmem_cache_alloc_node_trace+0x692/0x770 [ 271.104445] ? free_unref_page+0x9a0/0x9a0 [ 271.108681] __kmalloc_node+0x33/0x70 [ 271.112474] kvmalloc_node+0xb9/0xf0 [ 271.116191] btrfs_mount_root+0x1fb/0x1f10 [ 271.120415] ? do_mount+0x6c1/0x1fb0 [ 271.124116] ? ksys_mount+0x12d/0x140 [ 271.127908] ? __x64_sys_mount+0xbe/0x150 [ 271.132061] ? do_syscall_64+0x1b9/0x820 [ 271.136125] ? btrfs_decode_error+0x70/0x70 [ 271.140608] ? cache_grow_end.part.37+0x95/0x170 [ 271.145364] ? lock_downgrade+0x8f0/0x8f0 [ 271.149523] ? kasan_check_read+0x11/0x20 [ 271.153662] ? do_raw_spin_unlock+0xa7/0x2f0 [ 271.158060] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 271.162660] ? kasan_check_write+0x14/0x20 [ 271.166895] ? do_raw_spin_lock+0xc1/0x200 [ 271.171831] ? kasan_kmalloc+0xc4/0xe0 [ 271.175906] ? __kmalloc_track_caller+0x311/0x760 [ 271.180745] ? __kmalloc_track_caller+0x311/0x760 [ 271.185588] ? btrfs_decode_error+0x70/0x70 [ 271.189915] legacy_get_tree+0x118/0x440 [ 271.193971] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.199504] vfs_get_tree+0x1cb/0x5c0 [ 271.203291] ? vfs_set_fs_source+0x12c/0x180 [ 271.207695] vfs_kern_mount.part.37+0x119/0x190 [ 271.212530] vfs_kern_mount+0x4a/0x70 [ 271.216323] btrfs_mount+0x4b7/0x217c [ 271.220126] ? kernel_text_address+0x79/0xf0 [ 271.224526] ? __kernel_text_address+0xd/0x40 [ 271.229011] ? unwind_get_return_address+0x61/0xa0 [ 271.233949] ? btrfs_remount+0x16e0/0x16e0 [ 271.238179] ? save_stack+0xa9/0xd0 [ 271.241810] ? save_stack+0x43/0xd0 [ 271.245427] ? kasan_kmalloc+0xc4/0xe0 [ 271.249302] ? __kmalloc_track_caller+0x14a/0x760 [ 271.254155] ? legacy_parse_monolithic+0xc1/0x1d0 [ 271.258999] ? do_mount+0x69e/0x1fb0 [ 271.262703] ? ksys_mount+0x12d/0x140 [ 271.266491] ? __x64_sys_mount+0xbe/0x150 [ 271.270632] ? do_syscall_64+0x1b9/0x820 [ 271.274693] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.280056] ? do_syscall_64+0x1b9/0x820 [ 271.284109] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.289483] ? lock_acquire+0x1e4/0x540 [ 271.293455] ? cache_grow_end.part.37+0x95/0x170 [ 271.298205] ? lock_downgrade+0x8f0/0x8f0 [ 271.302358] ? kasan_check_read+0x11/0x20 [ 271.306759] ? do_raw_spin_unlock+0xa7/0x2f0 [ 271.311159] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 271.315734] ? kasan_check_write+0x14/0x20 [ 271.319959] ? do_raw_spin_lock+0xc1/0x200 [ 271.324199] ? kasan_unpoison_shadow+0x35/0x50 [ 271.328769] ? kasan_kmalloc+0xc4/0xe0 [ 271.332664] ? __kmalloc_track_caller+0x311/0x760 [ 271.337526] ? __kmalloc_track_caller+0x311/0x760 [ 271.342363] ? btrfs_remount+0x16e0/0x16e0 [ 271.346704] legacy_get_tree+0x118/0x440 [ 271.350760] ? btrfs_remount+0x16e0/0x16e0 [ 271.354984] ? legacy_get_tree+0x118/0x440 [ 271.359218] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.364759] vfs_get_tree+0x1cb/0x5c0 [ 271.368547] ? vfs_set_fs_source+0x12c/0x180 [ 271.373037] do_mount+0x6c1/0x1fb0 [ 271.376568] ? kasan_check_write+0x14/0x20 [ 271.380805] ? copy_mount_string+0x40/0x40 [ 271.385040] ? kasan_kmalloc+0xc4/0xe0 [ 271.388923] ? kmem_cache_alloc_trace+0x318/0x780 [ 271.393853] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 271.399397] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.404933] ? copy_mount_options+0x285/0x380 [ 271.409422] ksys_mount+0x12d/0x140 [ 271.413219] __x64_sys_mount+0xbe/0x150 [ 271.417187] do_syscall_64+0x1b9/0x820 [ 271.421062] ? finish_task_switch+0x1d3/0x870 [ 271.425810] ? syscall_return_slowpath+0x5e0/0x5e0 [ 271.430731] ? syscall_return_slowpath+0x31d/0x5e0 [ 271.435669] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 271.440691] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.446249] ? prepare_exit_to_usermode+0x291/0x3b0 [ 271.451259] ? perf_trace_sys_enter+0xb10/0xb10 [ 271.455920] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 271.460766] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.465945] RIP: 0033:0x4584ea [ 271.469120] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 271.488484] RSP: 002b:00007f0a468d8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 271.496190] RAX: ffffffffffffffda RBX: 00007f0a468d8b30 RCX: 00000000004584ea [ 271.503448] RDX: 00007f0a468d8ad0 RSI: 0000000020000100 RDI: 00007f0a468d8af0 [ 271.510714] RBP: 0000000020000100 R08: 00007f0a468d8b30 R09: 00007f0a468d8ad0 [ 271.518006] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000015 [ 271.525638] R13: 0000000000000000 R14: 00000000004d3c48 R15: 0000000000000032 16:06:39 executing program 3: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f0000000240)={0x11, 0x0, r1, 0x1, 0x0, 0x6}, 0x14) r2 = socket$packet(0x11, 0x3, 0x300) bind$packet(r2, &(0x7f0000000080)={0x11, 0x76be2d0bf020c02d, r1, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x14) syz_emit_ethernet(0xe, &(0x7f0000000280)={@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, &(0x7f0000000000)={0x0, 0xffffffffffffffff, [0x0, 0x1, 0x100]}) 16:06:39 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfsh', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000200)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000340)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x400445a0, &(0x7f0000013000)) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000240)={&(0x7f0000012000/0x4000)=nil, 0x4000}) close(r0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc4c85512, &(0x7f0000000480)={{0x1, 0x5, 0x8, 0x9, 'syz0\x00', 0x9}, 0x1, [0xb69b, 0x2, 0x80000000, 0x8000, 0x7ec, 0x8001, 0x5, 0x0, 0x1, 0x8001, 0xffff, 0x3, 0x7, 0x1000, 0xc9f6, 0x1c, 0x0, 0x2fd7, 0xfffffffffffffff7, 0x6cc, 0x80000001, 0x2800000000000000, 0x5, 0xfc, 0x61, 0x353, 0x0, 0x559, 0x3b89, 0xfffffffffffffbff, 0x8, 0x200, 0x80, 0x0, 0x100000000, 0x4, 0xed8c, 0x3e, 0x2, 0x8, 0x3, 0x3ff, 0x1, 0x1ff, 0x0, 0x8e1, 0x200, 0x42, 0x20, 0x0, 0x5a78, 0x0, 0xfffffffffffffffc, 0x4, 0x1, 0x1, 0x2, 0x4, 0x9, 0x5, 0x1000, 0x3, 0x8, 0x9, 0xb14b, 0x5, 0x3, 0x0, 0x8, 0x1, 0x1, 0x40, 0x6, 0x41, 0x28, 0x0, 0x200, 0x149cefaf, 0xfffffffffffffff7, 0x1, 0x4, 0x9, 0x80, 0x7ff, 0x7, 0x5, 0x3, 0x200, 0x0, 0xf4, 0x88c, 0x5, 0x1, 0x5, 0xc294, 0x6, 0x9, 0x8, 0x5, 0x3, 0x0, 0x4, 0x40, 0x1000, 0x4, 0x8, 0x40, 0x7fff, 0x1, 0x5, 0xffff, 0xea, 0x3, 0x3, 0x2, 0x6, 0x2d6eee0e, 0xcc8, 0x0, 0x1000, 0x6, 0xffffffff, 0x7, 0x100, 0x1, 0x524c, 0x80000001, 0x9], {0x77359400}}) syz_mount_image$vfat(&(0x7f0000000400)='vfat\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x0, &(0x7f0000000500), 0x0, &(0x7f0000000600)=ANY=[]) 16:06:39 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x3f00000000000000) [ 272.194188] device bridge_slave_1 left promiscuous mode [ 272.199852] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.212653] device bridge_slave_0 left promiscuous mode [ 272.218164] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.468156] FAULT_FLAG_ALLOW_RETRY missing 30 [ 272.472818] CPU: 0 PID: 19647 Comm: syz-executor4 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 272.481318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.490692] Call Trace: [ 272.493298] dump_stack+0x1c9/0x2b4 [ 272.496954] ? dump_stack_print_info.cold.2+0x52/0x52 [ 272.502195] ? kasan_check_write+0x14/0x20 [ 272.506484] ? do_raw_spin_lock+0xc1/0x200 [ 272.510759] handle_userfault.cold.33+0x47/0x62 [ 272.515609] ? perf_trace_run_bpf_submit+0x269/0x3b0 [ 272.520749] ? perf_trace_run_bpf_submit+0x269/0x3b0 [ 272.525883] ? userfaultfd_ioctl+0x5430/0x5430 [ 272.530501] ? perf_tp_event+0xc40/0xc40 [ 272.534584] ? kasan_check_write+0x14/0x20 [ 272.538865] ? memset+0x31/0x40 [ 272.542181] ? perf_trace_lock+0x49d/0x920 [ 272.546452] ? perf_sched_cb_inc+0x2e0/0x2e0 [ 272.550921] ? zap_class+0x740/0x740 [ 272.554676] ? finish_task_switch+0x1d3/0x870 [ 272.559201] ? perf_trace_run_bpf_submit+0x269/0x3b0 [ 272.564336] ? perf_trace_run_bpf_submit+0x270/0x3b0 [ 272.569463] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 272.574080] ? lock_acquire+0x1e4/0x540 [ 272.578105] ? __handle_mm_fault+0x3a38/0x44a0 [ 272.582726] ? lock_downgrade+0x8f0/0x8f0 [ 272.586900] ? kasan_check_read+0x11/0x20 [ 272.591051] ? do_raw_spin_unlock+0xa7/0x2f0 [ 272.595452] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 272.600036] ? kasan_check_write+0x14/0x20 [ 272.604271] ? do_raw_spin_lock+0xc1/0x200 [ 272.608518] __handle_mm_fault+0x3a45/0x44a0 [ 272.612934] ? vmf_insert_mixed_mkwrite+0xa0/0xa0 [ 272.617778] ? plist_check_list+0xa0/0xa0 [ 272.622031] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.627572] ? ring_buffer_record_is_on+0xe1/0x130 [ 272.632533] ? ring_buffer_nest_end+0xb0/0xb0 [ 272.637134] ? lock_acquire+0x1e4/0x540 [ 272.641102] ? handle_mm_fault+0x417/0xc80 [ 272.645350] ? lock_downgrade+0x8f0/0x8f0 [ 272.649504] ? lock_release+0xa30/0xa30 [ 272.653489] ? mem_cgroup_from_task+0xcb/0x1f0 [ 272.658076] ? mem_cgroup_css_online+0x3c0/0x3c0 [ 272.662848] handle_mm_fault+0x53e/0xc80 [ 272.666941] ? __handle_mm_fault+0x44a0/0x44a0 [ 272.671619] ? find_vma+0x34/0x190 [ 272.675204] __do_page_fault+0x620/0xe50 [ 272.679369] ? mm_fault_error+0x380/0x380 [ 272.684156] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 272.689173] ? futex_wait_setup+0x281/0x410 [ 272.693511] do_page_fault+0xf6/0x8c0 [ 272.697322] ? vmalloc_sync_all+0x30/0x30 [ 272.701480] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 272.707021] ? drop_futex_key_refs.isra.14+0x6d/0xe0 [ 272.712149] ? lock_acquire+0x1e4/0x540 [ 272.716123] ? __might_fault+0x12b/0x1e0 [ 272.720189] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.725041] page_fault+0x1e/0x30 [ 272.728510] RIP: 0010:copy_user_generic_unrolled+0x9e/0xc0 [ 272.734146] Code: 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 4c 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 <8a> 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 31 c0 0f 1f 00 c3 0f 1f [ 272.753538] RSP: 0018:ffff8801b328f7f0 EFLAGS: 00010202 [ 272.758899] RAX: 0000000000000004 RBX: 0000000000000004 RCX: 0000000000000004 [ 272.766171] RDX: 0000000000000004 RSI: 0000000020013000 RDI: ffff8801b328f890 [ 272.773539] RBP: ffff8801b328f828 R08: ffffed0036651f13 R09: ffffed0036651f12 [ 272.780850] R10: ffffed0036651f12 R11: 0000000000000003 R12: 0000000020013004 [ 272.788150] R13: 0000000020013000 R14: ffff8801b328f890 R15: 00007ffffffff000 [ 272.795457] ? _copy_from_user+0x10d/0x150 [ 272.799719] evdev_do_ioctl+0xb69/0x21a0 [ 272.803791] ? str_to_user+0x90/0x90 [ 272.807529] ? do_futex+0x249/0x27d0 [ 272.811345] ? kasan_check_read+0x11/0x20 [ 272.815498] ? rcu_is_watching+0x8c/0x150 [ 272.819644] ? rcu_cleanup_dead_rnp+0x200/0x200 [ 272.824319] ? zap_class+0x740/0x740 [ 272.828049] ? exit_robust_list+0x290/0x290 [ 272.832370] ? lock_acquire+0x1e4/0x540 [ 272.836348] ? __fget+0x4ac/0x740 [ 272.839811] ? lock_downgrade+0x8f0/0x8f0 [ 272.843993] ? lock_release+0xa30/0xa30 [ 272.848021] ? save_stack+0x43/0xd0 [ 272.851669] ? __kasan_slab_free+0x11a/0x170 [ 272.856154] ? __fget+0x4d5/0x740 [ 272.859643] ? ksys_dup3+0x690/0x690 [ 272.863728] evdev_ioctl_handler+0x144/0x1a0 [ 272.868148] evdev_ioctl+0x27/0x2e [ 272.871704] ? evdev_ioctl_compat+0x30/0x30 [ 272.876022] do_vfs_ioctl+0x1de/0x1720 [ 272.879920] ? ioctl_preallocate+0x300/0x300 [ 272.884320] ? __fget_light+0x2f7/0x440 [ 272.888288] ? fget_raw+0x20/0x20 [ 272.891734] ? trace_hardirqs_on+0xd/0x10 [ 272.895879] ? kmem_cache_free+0x22e/0x2d0 [ 272.900113] ? __x64_sys_futex+0x47f/0x6a0 [ 272.904354] ? do_futex+0x27d0/0x27d0 [ 272.908156] ? security_file_ioctl+0x94/0xc0 [ 272.912559] ksys_ioctl+0xa9/0xd0 [ 272.916022] __x64_sys_ioctl+0x73/0xb0 [ 272.919907] do_syscall_64+0x1b9/0x820 [ 272.923796] ? finish_task_switch+0x1d3/0x870 [ 272.928297] ? syscall_return_slowpath+0x5e0/0x5e0 [ 272.933221] ? syscall_return_slowpath+0x31d/0x5e0 [ 272.938155] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 272.943173] ? prepare_exit_to_usermode+0x291/0x3b0 [ 272.948198] ? perf_trace_sys_enter+0xb10/0xb10 [ 272.952880] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 272.957738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.962938] RIP: 0033:0x455ab9 [ 272.966116] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.985450] RSP: 002b:00007f547e90bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 272.993159] RAX: ffffffffffffffda RBX: 00007f547e90c6d4 RCX: 0000000000455ab9 [ 273.000420] RDX: 0000000020013000 RSI: 00000000400445a0 RDI: 0000000000000015 [ 273.007680] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 273.014955] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 273.022216] R13: 00000000004bd1d2 R14: 00000000004cb9b0 R15: 0000000000000000 [ 273.042109] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 273.065993] FAT-fs (loop4): Unrecognized mount option "" or missing value [ 273.566819] team0 (unregistering): Port device team_slave_1 removed [ 273.575843] team0 (unregistering): Port device team_slave_0 removed [ 273.584466] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 273.599805] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 273.623910] bond0 (unregistering): Released all slaves [ 273.863399] bridge0: port 1(bridge_slave_0) entered blocking state [ 273.869829] bridge0: port 1(bridge_slave_0) entered disabled state [ 273.877352] device bridge_slave_0 entered promiscuous mode [ 273.908715] bridge0: port 2(bridge_slave_1) entered blocking state [ 273.915134] bridge0: port 2(bridge_slave_1) entered disabled state [ 273.922604] device bridge_slave_1 entered promiscuous mode [ 273.953405] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 273.985253] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 274.060779] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 274.092078] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 274.200022] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 274.207162] team0: Port device team_slave_0 added [ 274.230088] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 274.237392] team0: Port device team_slave_1 added [ 274.261593] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 274.286805] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 274.313240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 274.339271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 274.541696] bridge0: port 2(bridge_slave_1) entered blocking state [ 274.548124] bridge0: port 2(bridge_slave_1) entered forwarding state [ 274.554748] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.561115] bridge0: port 1(bridge_slave_0) entered forwarding state [ 275.283666] 8021q: adding VLAN 0 to HW filter on device bond0 [ 275.356500] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 275.427782] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 275.434101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 275.441459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 275.507068] 8021q: adding VLAN 0 to HW filter on device team0 16:06:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x100000000000, 0x6, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 16:06:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") getsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000140), &(0x7f0000000180)=0x4) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'raw\x00', 0x3a, "5303ead7d3a17e153fbca32516968ad2fe462da0af63a1e56fbd28ba431b1a2c997b331828df8de0ff9a8d33fec32dbbb0cba291c8b208ee30b4"}, &(0x7f0000000080)=0x5e) 16:06:43 executing program 6 (fault-call:1 fault-nth:51): perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:43 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:43 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, &(0x7f0000000040), 0x0, 0x8001, &(0x7f0000000440)={0xa, 0x4e20}, 0x1c) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[@ANYRESDEC, @ANYRESOCT], 0xfc8d) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x8, 0x2, 0x65ea}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000100)={r3, 0x983, 0x7, [0x2e3, 0x80000000, 0xffffffff, 0x100, 0x80, 0x24db, 0x4]}, &(0x7f0000000140)=0x16) recvfrom(r1, &(0x7f00000005c0)=""/76, 0xfffffffffffffff3, 0x0, &(0x7f0000000200)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ce4d40681f7af4e788cde0b54c4bb7388572d9c9fd796c2c5bbea016c59d3dd0a4d660f6024c6cf1270d9880a7ef9ad6db8310a3f953c33d2ffcaa02e61d41"}, 0x701000) 16:06:43 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x3f000000) 16:06:43 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f00000000c0)="075cc8236d345f8f762070") r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x5, 0x402000) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x2, 0x3, 0x5000, 0x2000, &(0x7f0000001000/0x2000)=nil}) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r2 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00', 0x19, 0x3, 0xc78, [0x20000840, 0x0, 0x0, 0x20001348, 0x20001378], 0x0, &(0x7f0000000080), &(0x7f0000000840)=[{0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x0, 0x0, 0x0, 'eql\x00', 'sit0\x00', 'ip6gre0\x00', 'vcan0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0xf8, 0x168, 0x1a0, [@connbytes={'connbytes\x00', 0x18}, @limit={'limit\x00', 0x20}]}, [@arpreply={'arpreply\x00', 0x10}, @snat={'snat\x00', 0x10}]}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}, {{{0x0, 0x0, 0x0, 'gre0\x00', 'bond_slave_0\x00', 'team_slave_1\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x900, 0x900, 0x938, [@among={'among\x00', 0x828, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @broadcast=0xffffffff}]}}}}, @time={'time\x00', 0x18}]}}, @arpreply={'arpreply\x00', 0x10, {{@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}}}}]}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2, 0x0, 0x1, [{{{0x0, 0x0, 0x0, 'ipddp0\x00', 'veth1_to_bridge\x00', 'syzkaller0\x00', 'bridge_slave_0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa8, 0xe0}, [@arpreply={'arpreply\x00', 0x10, {{@random="f9b908aeb774"}}}]}, @arpreply={'arpreply\x00', 0x10}}]}]}, 0xcf0) [ 275.980011] FAULT_INJECTION: forcing a failure. [ 275.980011] name failslab, interval 1, probability 0, space 0, times 0 [ 275.988983] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 275.991326] CPU: 0 PID: 19939 Comm: syz-executor6 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 275.991337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.991345] Call Trace: [ 275.991371] dump_stack+0x1c9/0x2b4 [ 275.991393] ? dump_stack_print_info.cold.2+0x52/0x52 [ 276.029872] ? zap_class+0x740/0x740 [ 276.033630] should_fail.cold.4+0xa/0x11 [ 276.037738] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 276.042885] ? perf_trace_run_bpf_submit+0x269/0x3b0 [ 276.045985] kernel msg: ebtables bug: please report to author: Couldn't copy entries from userspace [ 276.048021] ? perf_trace_run_bpf_submit+0x269/0x3b0 [ 276.048045] ? perf_trace_run_bpf_submit+0x270/0x3b0 [ 276.067448] ? perf_tp_event+0xc40/0xc40 [ 276.071547] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 276.077122] ? propagate_protected_usage+0x223/0x510 [ 276.082277] ? memset+0x31/0x40 [ 276.085574] ? perf_trace_lock+0x49d/0x920 [ 276.089977] ? percpu_ref_put_many+0x131/0x240 [ 276.094552] ? start_stop_khugepaged.cold.51+0x46/0x46 [ 276.099828] ? zap_class+0x740/0x740 [ 276.103537] ? page_counter_cancel+0x4d/0x60 [ 276.107944] __should_failslab+0x124/0x180 [ 276.112174] should_failslab+0x9/0x14 [ 276.115977] kmem_cache_alloc+0x47/0x760 [ 276.120044] ? try_charge+0x8fd/0x1680 [ 276.123928] ? perf_trace_run_bpf_submit+0x269/0x3b0 [ 276.129029] ? trace_hardirqs_on+0x10/0x10 [ 276.133259] xas_alloc+0x38a/0x490 [ 276.136804] ? minmax_running_min+0x690/0x690 [ 276.141298] ? lock_acquire+0x1e4/0x540 [ 276.145280] xas_create+0x3ae/0x1150 [ 276.149007] ? xas_descend+0x5f0/0x5f0 [ 276.153069] ? percpu_ref_put_many+0x131/0x240 [ 276.157651] ? mem_cgroup_id_get_online+0x310/0x310 [ 276.162676] ? perf_tp_event+0xc40/0xc40 [ 276.166734] ? mem_cgroup_try_charge+0x548/0xa70 [ 276.171501] xas_store+0xce/0x1720 [ 276.175203] ? xas_start+0x23d/0x740 [ 276.178918] ? xas_create_range+0x4d0/0x4d0 [ 276.183234] ? lock_acquire+0x1e4/0x540 [ 276.187204] ? __add_to_page_cache_locked+0x8b4/0x1470 [ 276.192473] ? xa_find_after+0x9a0/0x9a0 [ 276.196525] ? lock_release+0xa30/0xa30 [ 276.200496] ? should_fail+0x246/0xd86 [ 276.204382] ? vma_kernel_pagesize+0x90/0x90 [ 276.208789] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 276.213889] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 276.219425] ? xas_load+0x43/0x1e0 [ 276.222963] __add_to_page_cache_locked+0x7a9/0x1470 [ 276.228071] ? find_lock_entry+0x8c0/0x8c0 [ 276.232300] ? lock_acquire+0x1e4/0x540 [ 276.236266] ? fs_reclaim_acquire+0x20/0x20 [ 276.240581] ? count_shadow_nodes+0x2d0/0x2d0 [ 276.245085] ? rcu_note_context_switch+0x730/0x730 [ 276.250022] ? __alloc_pages_nodemask+0x6e3/0xdb0 [ 276.254864] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.260407] ? __alloc_pages_slowpath+0x2d00/0x2d00 [ 276.265421] ? find_get_pages_contig+0x1890/0x1890 [ 276.270346] ? perf_trace_run_bpf_submit+0x269/0x3b0 [ 276.275532] ? perf_trace_run_bpf_submit+0x269/0x3b0 [ 276.280646] ? perf_trace_run_bpf_submit+0x270/0x3b0 [ 276.285748] ? perf_tp_event+0xc40/0xc40 [ 276.289813] add_to_page_cache_lru+0x1a7/0x520 [ 276.294409] ? add_to_page_cache_locked+0x40/0x40 [ 276.299258] ? alloc_pages_current+0x114/0x210 [ 276.303842] ? __page_cache_alloc+0x191/0x5e0 [ 276.308339] ? zap_class+0x740/0x740 [ 276.312223] ? filemap_range_has_page+0x4c0/0x4c0 [ 276.317076] do_read_cache_page+0x760/0x13c0 [ 276.321477] ? blkdev_writepages+0x30/0x30 [ 276.325724] ? pagecache_get_page+0xe40/0xe40 [ 276.330234] ? blkdev_get+0x6cd/0xb50 [ 276.334034] ? lock_downgrade+0x8f0/0x8f0 [ 276.338181] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.343708] ? _atomic_dec_and_lock+0x22a/0x360 [ 276.348368] ? _atomic_dec_and_lock_irqsave+0x3e0/0x3e0 [ 276.353725] ? __down_interruptible+0x700/0x700 [ 276.358393] ? kobj_lookup+0x36a/0x460 [ 276.362275] ? kasan_check_write+0x14/0x20 [ 276.366513] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 276.371444] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.376986] ? iput+0x63a/0xaa0 [ 276.380265] ? inode_add_lru+0x2a0/0x2a0 [ 276.384335] ? kasan_check_read+0x11/0x20 [ 276.388474] ? do_raw_spin_unlock+0xa7/0x2f0 [ 276.392886] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 276.397472] ? kasan_check_write+0x14/0x20 [ 276.401710] ? do_raw_spin_lock+0xc1/0x200 [ 276.405949] ? blkdev_get+0xc8/0xb50 [ 276.409659] ? bdget+0x5e0/0x5e0 [ 276.413018] ? mntput+0x74/0xa0 [ 276.416292] ? path_put+0x50/0x70 [ 276.419748] ? lookup_bdev+0xbc/0x250 [ 276.423545] ? blkdev_open+0x280/0x280 [ 276.427437] read_cache_page_gfp+0x6f/0x90 [ 276.431688] btrfs_scan_one_device+0x2cf/0x1530 [ 276.436357] ? unwind_get_return_address+0x61/0xa0 [ 276.441294] ? __save_stack_trace+0x8d/0xf0 [ 276.445637] ? device_list_add+0xcb0/0xcb0 [ 276.449893] ? save_stack+0xa9/0xd0 [ 276.453521] ? save_stack+0x43/0xd0 [ 276.457151] ? __kasan_slab_free+0x11a/0x170 [ 276.461556] ? kasan_slab_free+0xe/0x10 [ 276.465521] ? kfree+0xd9/0x260 [ 276.468795] ? btrfs_mount_root+0x142a/0x1f10 [ 276.473279] ? legacy_get_tree+0x118/0x440 [ 276.477507] ? vfs_get_tree+0x1cb/0x5c0 [ 276.481472] ? vfs_kern_mount.part.37+0x119/0x190 [ 276.486313] ? vfs_kern_mount+0x4a/0x70 [ 276.490279] ? btrfs_mount+0x4b7/0x217c [ 276.494255] ? legacy_get_tree+0x118/0x440 [ 276.498487] ? vfs_get_tree+0x1cb/0x5c0 [ 276.502455] ? do_mount+0x6c1/0x1fb0 [ 276.506160] ? ksys_mount+0x12d/0x140 [ 276.509951] ? __x64_sys_mount+0xbe/0x150 [ 276.514109] ? do_syscall_64+0x1b9/0x820 [ 276.518168] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.523539] ? do_raw_spin_unlock+0xa7/0x2f0 [ 276.527942] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 276.532537] ? kasan_check_write+0x14/0x20 [ 276.536768] ? do_raw_spin_lock+0xc1/0x200 [ 276.541003] ? trace_hardirqs_off+0xd/0x10 [ 276.545243] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 276.550357] ? debug_check_no_obj_freed+0x30b/0x595 [ 276.555376] ? kasan_unpoison_shadow+0x35/0x50 [ 276.559961] ? trace_hardirqs_off+0xd/0x10 [ 276.564212] ? quarantine_put+0x10d/0x1b0 [ 276.568371] ? __kasan_slab_free+0x131/0x170 [ 276.572784] ? trace_hardirqs_on+0xd/0x10 [ 276.576939] btrfs_mount_root+0xd6c/0x1f10 [ 276.581180] ? do_mount+0x6c1/0x1fb0 [ 276.584899] ? btrfs_decode_error+0x70/0x70 [ 276.589217] ? lock_acquire+0x1e4/0x540 [ 276.593199] ? fs_reclaim_acquire+0x20/0x20 [ 276.597524] ? lock_downgrade+0x8f0/0x8f0 [ 276.601676] ? lock_downgrade+0x8f0/0x8f0 [ 276.605829] ? lock_release+0xa30/0xa30 [ 276.609798] ? check_same_owner+0x340/0x340 [ 276.614111] ? check_same_owner+0x340/0x340 [ 276.618432] ? debug_mutex_init+0x2d/0x60 [ 276.622578] ? kasan_kmalloc+0xc4/0xe0 [ 276.626468] ? __kmalloc_track_caller+0x311/0x760 [ 276.631303] ? __kmalloc_track_caller+0x311/0x760 [ 276.636143] ? btrfs_decode_error+0x70/0x70 [ 276.640460] legacy_get_tree+0x118/0x440 [ 276.644520] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.650060] vfs_get_tree+0x1cb/0x5c0 [ 276.653856] ? vfs_set_fs_source+0x12c/0x180 [ 276.658260] vfs_kern_mount.part.37+0x119/0x190 [ 276.662921] vfs_kern_mount+0x4a/0x70 [ 276.666715] btrfs_mount+0x4b7/0x217c [ 276.670523] ? kernel_text_address+0x79/0xf0 [ 276.674937] ? __kernel_text_address+0xd/0x40 [ 276.680231] ? unwind_get_return_address+0x61/0xa0 [ 276.685167] ? btrfs_remount+0x16e0/0x16e0 [ 276.689405] ? save_stack+0xa9/0xd0 [ 276.693136] ? save_stack+0x43/0xd0 [ 276.696754] ? kasan_kmalloc+0xc4/0xe0 [ 276.700641] ? __kmalloc_track_caller+0x14a/0x760 [ 276.705479] ? legacy_parse_monolithic+0xc1/0x1d0 [ 276.710313] ? do_mount+0x69e/0x1fb0 [ 276.714021] ? ksys_mount+0x12d/0x140 [ 276.717813] ? __x64_sys_mount+0xbe/0x150 [ 276.722043] ? do_syscall_64+0x1b9/0x820 [ 276.726112] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.731479] ? do_syscall_64+0x1b9/0x820 [ 276.735533] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.740898] ? trace_hardirqs_off+0xd/0x10 [ 276.745142] ? lock_acquire+0x1e4/0x540 [ 276.749122] ? fs_reclaim_acquire+0x20/0x20 [ 276.753448] ? lock_downgrade+0x8f0/0x8f0 [ 276.757591] ? lock_downgrade+0x8f0/0x8f0 [ 276.761746] ? lock_release+0xa30/0xa30 [ 276.765725] ? lock_release+0xa30/0xa30 [ 276.769711] ? check_same_owner+0x340/0x340 [ 276.774032] ? check_same_owner+0x340/0x340 [ 276.778351] ? debug_mutex_init+0x2d/0x60 [ 276.782509] ? kasan_unpoison_shadow+0x35/0x50 [ 276.787092] ? kasan_kmalloc+0xc4/0xe0 [ 276.790991] ? __kmalloc_track_caller+0x311/0x760 [ 276.795837] ? __kmalloc_track_caller+0x311/0x760 [ 276.800691] ? btrfs_remount+0x16e0/0x16e0 [ 276.804944] legacy_get_tree+0x118/0x440 [ 276.809004] ? btrfs_remount+0x16e0/0x16e0 [ 276.813261] ? legacy_get_tree+0x118/0x440 [ 276.817496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.823035] vfs_get_tree+0x1cb/0x5c0 [ 276.826829] ? vfs_set_fs_source+0x12c/0x180 [ 276.831233] do_mount+0x6c1/0x1fb0 [ 276.834766] ? check_same_owner+0x340/0x340 [ 276.839080] ? lock_release+0xa30/0xa30 [ 276.843055] ? copy_mount_string+0x40/0x40 [ 276.847292] ? kasan_kmalloc+0xc4/0xe0 [ 276.851181] ? kmem_cache_alloc_trace+0x318/0x780 [ 276.856022] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 276.861692] ? _copy_from_user+0xdf/0x150 [ 276.865837] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.871508] ? copy_mount_options+0x285/0x380 [ 276.876004] ksys_mount+0x12d/0x140 [ 276.879630] __x64_sys_mount+0xbe/0x150 [ 276.883603] do_syscall_64+0x1b9/0x820 [ 276.887489] ? finish_task_switch+0x1d3/0x870 [ 276.891987] ? syscall_return_slowpath+0x5e0/0x5e0 [ 276.896917] ? syscall_return_slowpath+0x31d/0x5e0 [ 276.901845] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 276.906859] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.912397] ? prepare_exit_to_usermode+0x291/0x3b0 [ 276.917419] ? perf_trace_sys_enter+0xb10/0xb10 [ 276.922085] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 276.926931] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.932129] RIP: 0033:0x4584ea [ 276.935306] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 276.954973] RSP: 002b:00007f0a468d8a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 276.962683] RAX: ffffffffffffffda RBX: 00007f0a468d8b30 RCX: 00000000004584ea [ 276.969948] RDX: 00007f0a468d8ad0 RSI: 0000000020000100 RDI: 00007f0a468d8af0 [ 276.977298] RBP: 0000000020000100 R08: 00007f0a468d8b30 R09: 00007f0a468d8ad0 16:06:44 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x7) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_emit_ethernet(0x4a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaac1aaaaffffffffffff8100080086dd60c22df700102b00fe8000000000000000000000000066f88e5d00000000000000000000000000aa0000000004019078000087ae00ca8345"], &(0x7f0000000080)={0x0, 0x0, [0x0, 0x0, 0x2000000]}) open(&(0x7f00000000c0)='./file0\x00', 0x80, 0x77) 16:06:44 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0xffffffffffff0700) [ 276.984566] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000015 [ 276.991835] R13: 0000000000000000 R14: 00000000004d3c48 R15: 0000000000000033 16:06:44 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x10000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:44 executing program 0: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x3f000000) 16:06:44 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:44 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0xb) r1 = socket$netlink(0x10, 0x3, 0x1000000000f) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000100)={'syz_tun\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000fffffdfd1e4b0000000000000000000000000000000000000000000000000000000000000000000000ddff000000000000000000000000000000000d1353b60db111c86e0dadcc543e101425022c97c3cb3f35875ecbc65bb27e6b004c95a57fada53b6dc6918a01e6a00bf9eb0da576b93fc9add6fa570660d1b53309301f79ce85030d"]}) 16:06:44 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1e, &(0x7f0000000080)=""/34, &(0x7f0000000040)=0x22) 16:06:44 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:44 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xfffffffffffffffa, 0x400) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000040)={0x87, "08bdc3d2313c1d489f2c66c72a5e9bac207acea66eccf031984272ce0ea3ed240c4a90cfb75eb7a3f1612755abbfe55df4bf5f3ab576967885dfc6840d244ecb3dfcc4ea166fa58a07e10c02155e158c5ad6de090690173de5821cf350013190b9287578b94e81f32fb62ae7c05d8309f7facf7df250451bf96f6274af67b5c972aa5f30422010"}) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x234400) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000140)={0x0, 0x4b, 0x1, {0x3, 0x3000000}, {0x7fffffff, 0x7}, @ramp={0xe2e8, 0x3, {0x3, 0xefb, 0x7, 0x9}}}) ioctl$RTC_PIE_OFF(r1, 0x7006) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000180)=0x5) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f00000001c0)={0x10001, 0x4, 0x7, 0x9, 0x7, 0x1}) write$P9_RMKNOD(r2, &(0x7f0000000200)={0x14, 0x13, 0x1, {0x2, 0x3}}, 0x14) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000240)=0x8, 0x4) ioctl$SCSI_IOCTL_DOORLOCK(r2, 0x5380) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x2f, &(0x7f00000002c0)={@local={0xac, 0x14, 0x14, 0xaa}, @rand_addr=0x4, @multicast2=0xe0000002}, 0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000300)=0x0) capset(&(0x7f0000000340)={0x20071026, r4}, &(0x7f0000000380)={0x2, 0x10000, 0x700000000, 0x5, 0x7521f9b1, 0x1ff}) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0x8000, 0x7}, &(0x7f0000000480)=0x90) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f00000004c0)={r5, 0x6}, 0x8) openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x501000, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r3, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x64, r6, 0x202, 0x70bd2b, 0x25dfdbff, {0x2}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffffffb}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x100}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x18}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x2004c815}, 0x0) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000006c0)={0x9, 0x0, 0x2000}, 0x4) write$P9_RXATTRWALK(r3, &(0x7f0000000700)={0xf, 0x1f, 0x1, 0x9}, 0xf) pipe(&(0x7f0000000740)={0xffffffffffffffff}) shmget(0x1, 0x3000, 0x1, &(0x7f0000ffb000/0x3000)=nil) write$binfmt_script(r0, &(0x7f0000000780)={'#! ', './file0', [{0x20, '/proc/sys/net/ipv4/vs/sync_version\x00'}, {0x20, 'posix_acl_accesscgroupsecurity'}], 0xa, "4f45df8fb37f24c747cbf941307ecae8046cb879c09dc7c7e7567f10b2619f0cc96fec920d1fbfb6cc6ba073679320fd7f360b92f894ff389926221a08d7b60ee43ebc215b4628bc05245816fb87480c0c79a3d2f511f5abb0ac962fa969f978f32c0cb05b0fc27c1f1cca3c6490aea7716973e72259dc121c146a72606609dc250a4aea522567d78e5f547a9458eda044f4a0"}, 0xe1) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) connect$pptp(r2, &(0x7f0000000880)={0x18, 0x2, {0x0, @dev={0xac, 0x14, 0x14, 0x1f}}}, 0x1e) ioctl$KVM_SET_VCPU_EVENTS(r7, 0x4040aea0, &(0x7f00000008c0)={0x9, 0x7, 0x2dbf, 0x0, 0x4, 0x361, 0x4, 0x7fffffff, 0xfffffffffffffffa, 0x4, 0x1, 0x2, 0x0, 0x2, 0x8, 0x8, 0x8, 0x1000}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f00000009c0)={'nat\x00', 0x0, 0x3, 0x73, [], 0x2, &(0x7f0000000900)=[{}, {}], &(0x7f0000000940)=""/115}, &(0x7f0000000a40)=0x78) 16:06:45 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) r2 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000003c0)={0x0, 0x7f, 0x30, 0x9, 0xee}, &(0x7f0000000400)=0x18) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000480)={r3, 0x3, 0x2, [0x3a49000000000000, 0x7]}, &(0x7f0000000680)=0xc) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) getsockopt$inet6_int(r0, 0x28, 0x0, &(0x7f0000000000), &(0x7f0000000100)=0xfffffffffffffd15) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@ipv4, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000200)=0xe8) setuid(r4) 16:06:45 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:45 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x8000, 0x0) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000080)) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x8000, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in={0x2, 0x0, @rand_addr}}}, 0x90) 16:06:45 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:45 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0xffffffff00000000) 16:06:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:45 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x600, 0x5, 0x1}, 0x2c) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f00000002c0), &(0x7f0000000080)=""/140}, 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='.\x00', 0x200, 0x6) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000240)={0x8, 0x1c, [0x7fffffff, 0x1, 0xff, 0x800, 0x5, 0x5, 0x326]}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000640), &(0x7f00000006c0)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000180)}, 0x10) 16:06:45 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1f000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:45 executing program 4: sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x61) read(r0, &(0x7f0000000040)=""/11, 0xffed) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETAW(r1, 0x5407, &(0x7f00000001c0)) 16:06:45 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:45 executing program 0: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x3f000000) 16:06:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000340)={0x0, 0x2}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000080)=r1) 16:06:45 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:45 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x40000000000000) 16:06:45 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffa0010000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:45 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) r2 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000003c0)={0x0, 0x7f, 0x30, 0x9, 0xee}, &(0x7f0000000400)=0x18) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000480)={r3, 0x3, 0x2, [0x3a49000000000000, 0x7]}, &(0x7f0000000680)=0xc) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) getsockopt$inet6_int(r0, 0x28, 0x0, &(0x7f0000000000), &(0x7f0000000100)=0xfffffffffffffd15) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@ipv4, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000200)=0xe8) setuid(r4) 16:06:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1f000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:45 executing program 0: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x3f000000) 16:06:45 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:45 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffb, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:45 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x200000000000000) 16:06:45 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000001c0)=ANY=[@ANYBLOB="00000000000000000a00000000000000ff0100000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001700000000000000000000000000000100000000000000"], 0x90) 16:06:46 executing program 4: r0 = socket(0x1, 0x803, 0x20005) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond_slave_0\x00', &(0x7f00000000c0)=@ethtool_gstrings={0x1b, 0x1}}) 16:06:46 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:46 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff4, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:46 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xfff, 0x80) flock(r0, 0x8) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f0000000080)={0x0, 0x8}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0x40085112, &(0x7f0000b18000)={{0x2000ffffff93}, {0xffffff90}}) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) read$eventfd(r1, &(0x7f0000000040), 0x8) 16:06:46 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0xa0010000) 16:06:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x54, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) close(r0) 16:06:46 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) r2 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000003c0)={0x0, 0x7f, 0x30, 0x9, 0xee}, &(0x7f0000000400)=0x18) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000480)={r3, 0x3, 0x2, [0x3a49000000000000, 0x7]}, &(0x7f0000000680)=0xc) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) getsockopt$inet6_int(r0, 0x28, 0x0, &(0x7f0000000000), &(0x7f0000000100)=0xfffffffffffffd15) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@ipv4, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000200)=0xe8) setuid(r4) 16:06:46 executing program 3: r0 = socket$inet6(0xa, 0x100040000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl(r2, 0x4000008912, &(0x7f00000000c0)="295ee1311f16f477671070") connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) 16:06:46 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:46 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) r2 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000003c0)={0x0, 0x7f, 0x30, 0x9, 0xee}, &(0x7f0000000400)=0x18) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000480)={r3, 0x3, 0x2, [0x3a49000000000000, 0x7]}, &(0x7f0000000680)=0xc) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) getsockopt$inet6_int(r0, 0x28, 0x0, &(0x7f0000000000), &(0x7f0000000100)=0xfffffffffffffd15) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@ipv4, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000200)=0xe8) setuid(r4) 16:06:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:46 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfbffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:46 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3) ioctl(r0, 0x8912, &(0x7f0000000000)="025cc83d6d345f8f762070") r1 = memfd_create(&(0x7f0000000000)='dev ', 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000200), 0x0) faccessat(r1, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) r2 = socket(0x10, 0xa0002, 0x4) bind$netlink(r2, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(r2, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(r2, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 16:06:46 executing program 0: r0 = add_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000140)="7dc288f1a40c10b801dbf7a680dd6937e7737a0528992118edf7721e206e093e0bcb01aa85cd4a6cad895fe802a96fac5cc1929ca18666dc63add9e9fcd3347e5900dd5f9cd64e44d420c9b7f68366beb3c7920114c63798979479e51b47cf225931d7ac7eb05439b3aed1f7cf83c5512647cf95d2008b4546d0d85ace07b25b74ca425986f2c5171842a79006ef53098301b83bd24d7d5b927df8348a62cc01e63bed4f65e3b9cdfaa76df909de36d1948e99444ddb6eebb6a7e2af726f897032d93274b03d35fe8f12fc33535d1e24bbca85", 0xd3, 0xfffffffffffffffc) r1 = getuid() fstat(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r0, r1, r2) socketpair(0x19, 0x6, 0x80000001, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r4, 0xc04c5349, &(0x7f0000000040)={0x7ff, 0x1ff, 0x6bb}) ioctl$TUNGETFEATURES(r3, 0x800454cf, &(0x7f00000002c0)) ioctl$sock_SIOCBRDELBR(r4, 0x89a1, &(0x7f0000000540)='team_slave_0\x00') getsockopt$EBT_SO_GET_INIT_INFO(r4, 0x0, 0x82, &(0x7f0000000400)={'nat\x00'}, &(0x7f0000000300)=0x78) getsockopt$packet_buf(r4, 0x107, 0xd, &(0x7f00000004c0)=""/25, &(0x7f0000000500)=0x19) socket(0x1e, 0x2, 0x0) sendmsg(r4, &(0x7f00000003c0)={&(0x7f0000000340)=@pppol2tpv3in6={0x18, 0x1, {0x0, r4, 0x1, 0x2, 0x1, 0x3, {0xa, 0x4e20, 0x3, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x200}}}, 0x80, &(0x7f00000004c0), 0x1c2, &(0x7f000016cf61), 0x0, 0x20004000}, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r3, 0x7706, &(0x7f0000000480)) 16:06:46 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)="627472667303", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'user.', '/dev/kvm\x00'}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f0000000200)="c4c37d69ad62000000bac4e22946ed263e0f18e2660f10070f3026660f0058a5440f20c03505000000440f22c066baf80cb8dcc13481ef66bafc0cb0a7ee0f38cad0c4c1bdf268b6"}], 0xaaaaaaaaaaaa9a2, 0x3, &(0x7f0000000040)=[@cr4={0x1, 0x100000}], 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:06:46 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffff7f00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:46 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x2000000) 16:06:46 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) r2 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000003c0)={0x0, 0x7f, 0x30, 0x9, 0xee}, &(0x7f0000000400)=0x18) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000480)={r3, 0x3, 0x2, [0x3a49000000000000, 0x7]}, &(0x7f0000000680)=0xc) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) getsockopt$inet6_int(r0, 0x28, 0x0, &(0x7f0000000000), &(0x7f0000000100)=0xfffffffffffffd15) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@ipv4, @in6=@loopback}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000200)=0xe8) 16:06:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:46 executing program 0: io_setup(0x8, &(0x7f00004eb000)=0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f0000000100)=0xe8) fstat(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = geteuid() r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x300, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r5, 0x84, 0x21, &(0x7f0000000200), &(0x7f0000000240)=0x4) setresuid(r2, r3, r4) ioctl$EVIOCGKEYCODE_V2(r5, 0x80284504, &(0x7f0000000280)) io_submit(r0, 0x1, &(0x7f00001b2000)=[&(0x7f0000a42fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000bcf3f)}]) io_getevents(r0, 0x0, 0x0, &(0x7f000011d000), &(0x7f00009ca000)={0x0, 0x1c9c380}) 16:06:46 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:46 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:47 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x202000, 0x0) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000040)=0xfffffffffffffffe) r1 = socket$inet6_sctp(0xa, 0x4, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x10, &(0x7f0000000100), 0x0) 16:06:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f0000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:47 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dsp\x00', 0x44480, 0x0) accept4$unix(r2, &(0x7f0000000380)=@abs, &(0x7f0000000400)=0x6e, 0x80000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') ioctl$KVM_GET_MSR_INDEX_LIST(r2, 0xc004ae02, &(0x7f0000000440)={0x3, [0x0, 0x0, 0x0]}) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB="18f1ff08", @ANYRES16=r3, @ANYBLOB="010000000000000000000100000004000500"], 0x18}, 0x1}, 0x0) syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x1, &(0x7f00000002c0)=[{&(0x7f00000000c0)="b7f740326a913dfde37a1a2ce4d29337cf253271cbfd17032da46168dfb65addffc4b7b92e68014aa9761683c5e4085e9d92bf420df68edc15b7a38a7f84b27934e6293c4780c3879831b0e8c81d1d2bafd36920b435770ac0be78b87f91a8896e30397742e6602b3e1c604d42402c1687030034f16b76e16eb26f199c5a10c0e9ea464f41087bf1997b949fb6309540c755cef51c47ad", 0x97, 0x7c8d}], 0x800000, &(0x7f0000000300)={[{@map_off='map=off', 0x2c}]}) 16:06:47 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = inotify_init1(0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) gettid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000100)) r2 = getpgrp(0x0) fcntl$setown(r1, 0x8, r2) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x8) ptrace(0x4207, r3) ptrace$setopts(0x4202, r3, 0x0, 0xa07000) 16:06:47 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) r2 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000003c0)={0x0, 0x7f, 0x30, 0x9, 0xee}, &(0x7f0000000400)=0x18) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000480)={r3, 0x3, 0x2, [0x3a49000000000000, 0x7]}, &(0x7f0000000680)=0xc) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) getsockopt$inet6_int(r0, 0x28, 0x0, &(0x7f0000000000), &(0x7f0000000100)=0xfffffffffffffd15) 16:06:47 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:47 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x48, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:47 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x2) 16:06:47 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:47 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.events\x00', 0x0, 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000380)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000100)=0xc) syz_open_procfs(r2, &(0x7f0000000340)='net/anycast6\x00') ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x4170000}, 0xc, &(0x7f00000000c0)={&(0x7f0000001040)=ANY=[@ANYBLOB="b8000000190001010000000000000000e0000001000000000000000000000000ff02000000002a00000000400000000100000000000000000a00f0ff00000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xb8}, 0x1}, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0x10000000000000, 0x4) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000003c0)={0x20, {0x2, 0x4e23, @broadcast=0xffffffff}, {0x2, 0x800, @loopback=0x7f000001}, {0x2, 0x4e20, @multicast1=0xe0000001}, 0x0, 0x646b, 0x3, 0x6, 0x800, 0x0, 0x8, 0x36c800, 0x101}) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mixer\x00', 0x180, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000002c0)={0x80, 0x0, &(0x7f0000000200)=[@acquire={0x40046305, 0x2}, @transaction_sg={0x40486311, {{0x0, 0x0, 0x4, 0x0, 0x11, 0x0, 0x0, 0x0, 0x30, &(0x7f0000000180), &(0x7f00000001c0)=[0x38, 0x78, 0x0, 0x40, 0x18, 0x28]}, 0x7f}}, @exit_looper={0x630d}, @release={0x40046306, 0x1}, @request_death={0x400c630e, 0x2, 0x2}, @request_death={0x400c630e, 0x4}], 0x1000, 0x0, &(0x7f0000001100)="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"}) 16:06:47 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) r1 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000003c0)={0x0, 0x7f, 0x30, 0x9, 0xee}, &(0x7f0000000400)=0x18) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000480)={r2, 0x3, 0x2, [0x3a49000000000000, 0x7]}, &(0x7f0000000680)=0xc) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:47 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x9, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 279.626461] isofs_fill_super: bread failed, dev=loop0, iso_blknum=31, block=62 16:06:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa0010000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:47 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000380)='/dev/snd/seq\x00', 0x0, 0x4000000000) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x100) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x7fffffff, 0x30}, &(0x7f0000000180)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r2, 0x10000, 0x30}, &(0x7f0000000240)=0xc) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000001c0)={r2, 0x1}, 0x8) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x80}, "706f72ff0700000000000000000000000000000000000000000000001f0000ffffffffffffffef000003ff00000000000012000000000000000000000600", 0xc3, 0x80003}) openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x400000000000000, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x2, 0x0) dup2(r0, r1) [ 279.776252] isofs_fill_super: bread failed, dev=loop0, iso_blknum=31, block=62 16:06:47 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7209000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:47 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:47 executing program 4: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100000, &(0x7f0000000280)="ae30132013be927db423c4336386dc4ceeba40ebd50c16b7204a0908b9c6516f34312667739aa9d5b7994c250aeec8c6b8e7f47e7a3838297cf132a9ccd986a3fc99e9c2c21b41799656850115b530833ea3312d7272bf8e3a8e5fa6e233692c954a1ac4e579097e2425a43589b7cb3b7613f25fb41a9e2f7968a7f2abc404cde9fbb620004fa107aedc033bc6017855eedcddbfaed24906c7c5438948a5fe4636600e3030d64b2746c9cd4a4af13816cf", &(0x7f0000000180), &(0x7f0000000000), &(0x7f0000000040)="3cf92aee79c5c8bbbe2e60911cbba051d667") openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x2000, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x10000000, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) 16:06:47 executing program 5: syz_emit_ethernet(0x140, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x21, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14}}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000000)) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) socket$inet6(0xa, 0x1, 0x1c0) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 16:06:47 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) r1 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000003c0)={0x0, 0x7f, 0x30, 0x9, 0xee}, &(0x7f0000000400)=0x18) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000480)={r2, 0x3, 0x2, [0x3a49000000000000, 0x7]}, &(0x7f0000000680)=0xc) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:47 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:47 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)="2e2f6367726f75702e63707500eac5bea7af575a45fddd5af3a7709295a69ee900000000000000c8ace908bec842141ca2a714ed0163d4e05556a93347d6a7430e03a5f2beb186f16bacf2e4dcdcf3b9ff1dd9dcfbb3321aa0de98fe471d9a0d81aca9791b345c49af36da8498423ad08788fcc9892a2487efcde7a649614b14ba1c184784ca814db32bca5202a39635cae614676e0595b94e5b227273696812352f96703ad505e45ec29a524ad4fd017715f8dabca3758427726eeff00ca50d6ba964df3e513869880d9c38e14782155561de1ff27d7a8f780a2f03cd1c70c9d09598e297b85d6dc53b4ec3d2cd43a26d916363e76f56b6e192131f925bd3579d1e7084b22488937b8c2ab8806060dd181a8d2182300ad427bdbe185f4129c7719bb715d52acc2acac74fce3073a1b0204d612de49df63883aed28c904cea1a2c0774f83b9e4bdce6c81865877f8576df24dd4c3e5061751036f98600000000000000005cc076eaaf831d3ffa9be6", 0x200002, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfff, 0x208040) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x401) r2 = openat$cgroup_int(r0, &(0x7f00000004c0)='cpuset.cpus\x00', 0x2, 0x0) sendfile(r2, r2, &(0x7f00000000c0), 0x1) 16:06:47 executing program 3: r0 = socket$inet6(0xa, 0x805, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="925a989d28afa0252fae93269197ef1f0000008fc186e5995c2cc5ec797c4fb6adc685c6d43bb5017a0118", 0x305) r2 = accept$alg(r1, 0x0, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000100)=""/123, 0x7b}, 0x0) [ 279.952414] dccp_invalid_packet: P.Data Offset(0) too small 16:06:47 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x23000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:47 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) r1 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000003c0)={0x0, 0x7f, 0x30, 0x9, 0xee}, &(0x7f0000000400)=0x18) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000480)={r2, 0x3, 0x2, [0x3a49000000000000, 0x7]}, &(0x7f0000000680)=0xc) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c00, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:47 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = dup3(r1, r0, 0x0) recvfrom(r0, &(0x7f0000000000)=""/228, 0xe4, 0x2000, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1}}, 0x0, 0x1, 0x0, 0x4}}, 0x80) 16:06:47 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)="6274726673fc", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:47 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000003800000000000000000000000000000000000008000000000000"], 0x50) recvmsg(r2, &(0x7f0000000100)={&(0x7f0000000180)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000040)=[{&(0x7f00000016c0)=""/209, 0x20001791}], 0x1, &(0x7f00000017c0)=""/201, 0xc9}, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x2c000, 0x0) 16:06:47 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1f00, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:47 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/230, 0xe6) [ 280.183432] dccp_invalid_packet: P.Data Offset(0) too small 16:06:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000200)='vfat\x00', &(0x7f00000002c0)='.//ile0\x00', 0x0, 0x0, &(0x7f0000000300), 0x80400, &(0x7f0000000340)={[{@iocharset={'iocharset', 0x3d, 'iso8859-2'}, 0x2c}]}) lremovexattr(&(0x7f0000000040)='.//ile0\x00', &(0x7f0000000080)=@known='com.apple.system.Security\x00') syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000340)=ANY=[]) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x404000, 0x0) 16:06:48 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)="62747266739b", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:48 executing program 5: r0 = shmget(0x3, 0x8000, 0x100, &(0x7f0000e60000/0x8000)=nil) shmat(r0, &(0x7f0000f17000/0x2000)=nil, 0x4000) shmget(0x0, 0x3000, 0xccc, &(0x7f0000ffd000/0x3000)=nil) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x101, 0x1) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f00000001c0)={0x4f2e4d5ab3d03729, r2, 0x1}) 16:06:48 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:48 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) r1 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000003c0)={0x0, 0x7f, 0x30, 0x9, 0xee}, &(0x7f0000000400)=0x18) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000480)={r2, 0x3, 0x2, [0x3a49000000000000, 0x7]}, &(0x7f0000000680)=0xc) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff5, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:48 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="200000002c0019010000000000000000010000020000000008485206bbafe96c3055000100550000007617b97f2f951ce20973240df5b8c13f8ce871d96c38b0477d3bb603be141bd6c76e5e1d31245713d4b442fe08d7fb58fa44a638ef8de5c25aa3ee05711da70e49088f020836d86e390304ca84301705437d87dff11864"], 0x20}, 0x1}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x204000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000280)={0x15, 0x110, 0xfa00, {r2, 0x1, 0x0, 0x0, 0x0, @in6={0xa, 0x4e22, 0x8, @mcast2={0xff, 0x2, [], 0x1}, 0x2}, @ib={0x1b, 0x7f, 0x5, {"ce498644984719687dd6a5a67fa335ce"}, 0x1f, 0xc02, 0x8}}}, 0x118) write$sndseq(r1, &(0x7f0000000200)=[{0x1, 0x4000000000006, 0xfffffffffffeffff, 0x1, @time={0x77359400}, {0xfffffffffffffff8, 0x4}, {0x3fffffffffff, 0x6}, @time=@tick=0x20}], 0x150) getsockopt$inet_mreq(r1, 0x0, 0x24, &(0x7f0000000140)={@rand_addr, @local}, &(0x7f00000001c0)=0x8) 16:06:48 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000ff0ff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4"}) r1 = socket$inet(0x2, 0x2, 0x5) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f00000000c0)={'syzkaller0\x00', {0x2, 0x4e21}}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85321, &(0x7f0000000280)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000000)={{0x1000, 0x5}, 'port1\x00', 0x8, 0x8, 0x5fc, 0x7, 0x860000000000000, 0x95fd, 0x8, 0x0, 0x4, 0xbe}) socket$inet_udp(0x2, 0x2, 0x0) [ 280.424588] FAT-fs (loop3): bogus number of reserved sectors [ 280.430565] FAT-fs (loop3): Can't find a valid FAT filesystem 16:06:48 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:48 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 280.566720] FAT-fs (loop3): bogus number of reserved sectors [ 280.572826] FAT-fs (loop3): Can't find a valid FAT filesystem [ 280.594828] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. 16:06:48 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 280.641516] netlink: 8 bytes leftover after parsing attributes in process `syz-executor0'. 16:06:48 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) r1 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000003c0)={0x0, 0x7f, 0x30, 0x9, 0xee}, &(0x7f0000000400)=0x18) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000480)={r2, 0x3, 0x2, [0x3a49000000000000, 0x7]}, &(0x7f0000000680)=0xc) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:48 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x48000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:48 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000340)=""/9, &(0x7f0000000380)=0x9) fsetxattr(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="62747266732e7573656c6f6f6465033a6367726f757000"], &(0x7f0000000040)='usernodev:cgroup\x00', 0x11, 0x2) 16:06:48 executing program 5: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)=0x20, 0x4) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000300)=ANY=[@ANYRES32=0x0, @ANYBLOB="9d0000003491f2ab9ea3cbc1f3a9eae20b4fb5c4cc9537d6fffe81f8e19681cad8f9bc086c2bfb3461aef7fe5b8e063d0ea72861d78ad7c4e184b6d3b99adb3e7b90243aa8031fcf24a582d0a109d99ae5e6e7b3212d86d2726d7d29eb414b0a3da1fa6e31a2ae4ea345d4e86db790fca836d3f4dc3b0c88710a7fce8acf96790923bdaaab0fa6260e91f0f5f851d59e187baa4987c3b0bf8ce1294c61edcf813a59c54b7a7c39d25b"], &(0x7f0000000000)=0xa5) pipe2(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000280)=@int=0x7, 0x4) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 16:06:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1=0xe0000001}, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x90000, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f00000001c0)) socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000080)={0xd469, 0x1aaae907, 0x1, 0x7f, 0x1, 0x7fffffff, 0x80000000, 0x80, 0x0}, &(0x7f00000000c0)=0x20) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000100)={0x2, 0x8202, 0x1, 0x2, r3}, &(0x7f0000000140)=0x10) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000040)='eql\x00') ioctl(r2, 0x8000000001a2, &(0x7f00000002c0)="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") r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r4, &(0x7f0000000000)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f00007a8000)={&(0x7f0000000280)={0x1c, 0x2, 0x1, 0xffffffffffffffff, 0x0, 0x0, {}, [@nested={0x8, 0x12, [@generic="b2"]}]}, 0x1c}, 0x1}, 0x0) 16:06:48 executing program 0: mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x80, 0x0) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f00000003c0)={0x5000, 0x1f001, 0xffffffffffffffd9, 0x3ff, 0x3}) mount$9p_xen(&(0x7f0000000040)='/\x00', &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x7048, &(0x7f0000000000)=ANY=[]) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000400)=0xc838, 0x2) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000300)={@nfc_llcp={0x27, 0x0, 0x0, 0x4, 0x7, 0x4, "c9c329992bd19f1a781245c91f274855d1caf756e33d2410ad3559a96de7a4f831e9b54038450f3b7d84d6de6878a7b6b03966785c5848ff8c31470eaaec37", 0x1d}, {&(0x7f0000000100)=""/148, 0x94}, &(0x7f0000000240), 0x4}, 0xa0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000440), 0x30, &(0x7f00000004c0)={[{@minixdf='minixdf', 0x2c}]}) 16:06:48 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)="627472667302", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:48 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) r1 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000003c0)={0x0, 0x7f, 0x30, 0x9, 0xee}, &(0x7f0000000400)=0x18) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000480)={r2, 0x3, 0x2, [0x3a49000000000000, 0x7]}, &(0x7f0000000680)=0xc) mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) removexattr(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)=@random={'system.', 'eth0lo]wlan0![lo]em1$systemppp1\x00'}) 16:06:48 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a00, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 280.894447] netlink: 'syz-executor3': attribute type 18 has an invalid length. 16:06:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:48 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)="6274726673f3", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:48 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffff0700, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:48 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001540)=[{{&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}}}}, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x110}}], 0x1, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) connect$inet(r1, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, &(0x7f0000975000)=@can, &(0x7f0000752ffc)=0x10, 0x0) sendmmsg(r2, &(0x7f0000001500), 0x4000000000002d0, 0x0) ioctl(r1, 0x55, &(0x7f00000000c0)="761d40d598120e2ee130b9ad4a2fe6d37740911a64355996c430c1baae7516b013bc7133774b517bfeb6ef73581c250cd8f7900a97b2ceb5c3401397801e799a71c1b7dcfcabfd6d3636decd0fabd0c5ddddecd9a718b6c9b9518974f6b7c4f288f5784dc84b1823f0") r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x200402) ioctl$IOC_PR_PREEMPT(r3, 0x401870cb, &(0x7f0000000380)={0xfff, 0x3, 0x5}) 16:06:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffff7f00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:48 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) r1 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000003c0)={0x0, 0x7f, 0x30, 0x9, 0xee}, &(0x7f0000000400)=0x18) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000480)={r2, 0x3, 0x2, [0x3a49000000000000, 0x7]}, &(0x7f0000000680)=0xc) mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 281.077644] EXT4-fs (sda1): re-mounted. Opts: minixdf,,errors=continue 16:06:48 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) chmod(&(0x7f0000000000)='./file0\x00', 0x10) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 16:06:48 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x19, 0x24000) dup2(r0, r1) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0xf50c}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x20, 0x27, 0x3, 0x0, 0x0, {0xb}, [@typed={0xc, 0x5, @u64}]}, 0x20}, 0x1}, 0x0) 16:06:48 executing program 3: r0 = memfd_create(&(0x7f0000000580)='dev ', 0x3) write(r0, &(0x7f0000000040)="16", 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xffff) fcntl$addseals(r0, 0x409, 0xc) fallocate(r0, 0x3, 0x0, 0x5d6) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x0, 0x400) socket$inet6(0xa, 0x0, 0x0) [ 281.171809] netlink: 'syz-executor3': attribute type 18 has an invalid length. 16:06:48 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)="627472667303", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:49 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000100), &(0x7f0000000180)=0x68) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000380)={0x0, 0x0, 0x3, 0xec}, 0x8) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000480)) accept4$packet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x14, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f00000001c0)={0x2, 0x0, [0x0, 0x0, 0x40000104]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x28, &(0x7f0000000400)}, 0x10) 16:06:49 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x10000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:49 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) r1 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000003c0)={0x0, 0x7f, 0x30, 0x9, 0xee}, &(0x7f0000000400)=0x18) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000480)={r2, 0x3, 0x2, [0x3a49000000000000, 0x7]}, &(0x7f0000000680)=0xc) mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:49 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket(0xa, 0x5, 0x2) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000080)={'filter\x00', 0x0, 0x4, 0xc, [], 0x3, &(0x7f0000000000)=[{}, {}, {}], &(0x7f0000000040)=""/12}, &(0x7f0000000180)=0x78) ioctl(r0, 0x4000008912, &(0x7f00000002c0)="295ee1311f16f477671070945b416827eae364e67ce079c7310c5cb1ae12") r2 = socket$vsock_stream(0x28, 0x1, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffc, 0x31, 0xffffffffffffffff, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r2, 0x28, 0x6, &(0x7f0000000140), 0x21d) set_mempolicy(0x2, &(0x7f0000000240)=0x1, 0x7fffffff) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000200)) r3 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x200, 0x40202) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000100)) getsockname$unix(r1, &(0x7f0000000300), &(0x7f0000000280)=0x6e) 16:06:49 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:49 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) socketpair(0x10, 0x7, 0x6, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x2}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000200)={r1, 0x9, 0x3f}, 0x10) 16:06:49 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:49 executing program 0: open$dir(&(0x7f0000000500)='./file0\x00', 0x3b, 0x20) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_rdma(&(0x7f00000002c0)='2\n4.20.20.', &(0x7f0000000280)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000000)={'trans=rdma,', {'port', 0x3d}, 0x2c}) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0x5, &(0x7f0000000480)=[{&(0x7f0000000380)="450dfecc3bd0507c0d9e20f5fef77d18011372cb1d3e5757e01350ddfd2c7f2404d4b79b138da3731306177c36deafd66e7ad881200bf2831d0a4a2f5a837c8e8610c718ca2f16f61be77aac4bb6e0dde64fd358f322d391dc525d24413c7a8f2baf2adae07744e70542cee44f173ca8dbf00b102c38d97d9febe89fabf649a43d1a47173dae3130ec297ede64e58382b875eeefc9818ee57c5a2968366346ad70ce1679a6d0bd88e5709fe2176d88b1ec917f06056a34fa6511b4beace106386c5c37020099f0da866e25f4a67e2ac28f167c3c028cb18d9b88b2fb81a84e69787917e52f18", 0xe6, 0xcb95}, {&(0x7f00000000c0), 0x0, 0x49}, {&(0x7f0000000140)="8d4688f15e49d6a4867f1620fb317f502464daab73e263dd55a42b2ff092e32531509d", 0x23, 0x3}, {&(0x7f0000000200), 0x0, 0x8}, {&(0x7f0000000240)="b2", 0x1, 0x6}], 0x800840, &(0x7f0000000300)={[{@fat=@quiet='quiet', 0x2c}, {@dots='dots', 0x2c}, {@dots='dots', 0x2c}]}) 16:06:49 executing program 4: r0 = open(&(0x7f0000000000)='./file0\x00', 0x82002, 0x80) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000040)=0x3b) fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x1, &(0x7f0000000100)=[r2]) getsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f0000000140)=""/191, &(0x7f0000000200)=0xbf) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000240)=""/106) syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file0\x00', 0xffffffffffffffff, 0x4, &(0x7f0000000600)=[{&(0x7f0000000340)="73c0baa9a5cb2583df8990262b39458e54a3cb45703107fd8c158707ba40defa01af073e980b594681bc5e7b2297f9938b3464a85f5275c5ea2e0153c1c28475c111d1c9e6818489fd04a73531837e9606", 0x51, 0x4}, {&(0x7f00000003c0)="459891dd9d76ee03cda586016da1e4e3030a275fb28602bb1ff7e2d9c27ba49365ccf7882b361b46f1bf12353602a07b36c1b3b198bbc8b037d2118962dd299d8067f408a4d4e9ecc5fbef6a2f7596c3395f5f72adf59514f766928134483bc87494cf7f343470f8d534deaf6bb26fb39b9562210e563d03272cf0294c718bd1bf", 0x81, 0x37d}, {&(0x7f0000000480)="3124bbbc6810806b751daba6984b3d2f0a47a4f5d0e84f06f6da8f887a5c677597254d9b82c4cbb090ba3d935f908d07623413c5cbd8fd7b6f9327d9faee08ce673a4b64e9cc79bf43f184b3b8ad1430", 0x50, 0x2}, {&(0x7f0000000500)="37246e950593d960b3e514a85a5f2444fdbb637cca9fdae674b1d17af49b9ae29fc2f0f50a54224f9009956ec1355b31122d490ce5a0f8495c9e128797520cbc6dd0fc5a84815f66b8ded8207616b781d0ceb76ed7930e34f9a21c5b92bf4c16a6c5e383663716582c46684f1cbc0aabd08cafbeb4a63c872ee0f00f658555b34c6a3f5334e723d99ef96c6bb1b716c9d5f2143b0e68f3ed86d3dfbae96ad3714c375adfbdfa0406cf8a9785858dd9b2bca3135f4092d201b6ddace2d3cea24cdb403ac5aef5c8e0ee6aa3f9295c2cc95e", 0xd1, 0x37}], 0x800000, &(0x7f0000000680)={[{@umask={'umask', 0x3d, 0x4}, 0x2c}, {@gid={'gid', 0x3d, r2}, 0x2c}, {@nls={'nls', 0x3d, 'cp737'}, 0x2c}, {@session={'session', 0x3d, 0x4}, 0x2c}, {@umask={'umask', 0x3d, 0x8}, 0x2c}, {@uid={'uid', 0x3d, r1}, 0x2c}, {@umask={'umask', 0x3d, 0x400}, 0x2c}, {@part={'part', 0x3d, 0x7}, 0x2c}, {@type={'type', 0x3d, "2f36f64f"}, 0x2c}]}) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r3, 0xae45, 0x8) r4 = dup2(r0, r3) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000780)=r4) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000007c0)={'vcan0\x00', 0x100}) r5 = add_key$keyring(&(0x7f00000008c0)='keyring\x00', &(0x7f0000000900)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffff9) add_key$user(&(0x7f0000000800)='user\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000880)="a6511fa3ab533d292e777c", 0xb, r5) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000940)={0x9, 0xa, 0x0, [{0xffffffff80000001, 0x0, 0xfffffffffffff800, 0x8, 0x7, 0x660ba596, 0x40}, {0x1, 0xffffffff00000000, 0x8000, 0x2, 0x7, 0x3, 0x5}, {0x0, 0x2, 0x9, 0x0, 0xffffffff7fffffff, 0x4, 0x4}, {0x2881d2e7, 0x5, 0x1, 0x6, 0x7, 0x4}, {0x5, 0xffffffffffffffff, 0x6, 0x3851, 0x9, 0xffff, 0x8}, {0x8001, 0x4, 0xfffffffffffffffe, 0x0, 0x2, 0x6, 0x6}, {0x81, 0x200, 0x1, 0x3, 0x2, 0x8051, 0x72}, {0xffffffffffff8000, 0xc4, 0xffffffffffff0000, 0x800, 0x40, 0xffff, 0x5}, {0x0, 0x47, 0x2, 0x8, 0x0, 0x5}, {0x9, 0xecf, 0x8, 0x3, 0xffff, 0x195, 0x3c0288a5}]}) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000c40)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r4, &(0x7f0000000d40)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000d00)={&(0x7f0000000c80)={0x5c, r6, 0x300, 0x70bd2c, 0x25dfdbfc, {0x6}, [@IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x12, 0x36}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x101}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2a}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3c}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000000}, 0x805) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000d80)) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000dc0)=0xf) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r4, 0x84, 0x74, &(0x7f0000000e00)=""/67, &(0x7f0000000e80)=0x43) r7 = accept4$packet(r4, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000f40)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000001040)={'team0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000001140)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x400002}, 0xc, &(0x7f0000001100)={&(0x7f0000001080)=@mpls_delroute={0x4c, 0x19, 0x0, 0x70bd25, 0x25dfdbfb, {0x1c, 0x10, 0x14, 0x6, 0x0, 0x3, 0xff}, [@RTA_OIF={0x8, 0x4, r8}, @RTA_TTL_PROPAGATE={0x8, 0x1a, 0x5}, @RTA_TTL_PROPAGATE={0x8, 0x1a, 0x1}, @RTA_TTL_PROPAGATE={0x8, 0x1a, 0x8}, @RTA_OIF={0x8, 0x4, r9}, @RTA_DST={0x8, 0x1, [{0x3, 0x4955, 0x2f0334db, 0xf63}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x4804) connect$bt_sco(r4, &(0x7f0000001180)={0x1f, {0x0, 0x2, 0x4, 0x3, 0x783a, 0x8}}, 0x8) ioctl$RTC_AIE_ON(r0, 0x7001) ioctl$sock_ifreq(r0, 0x891f, &(0x7f0000001200)={'sit0\x00', @ifru_data=&(0x7f00000011c0)="b347004462990ccde5923e89f0bf8c3ca0e81d0293dd010ac51f5a541496b601"}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000001240)=[@in6={0xa, 0x4e22, 0x0, @loopback={0x0, 0x1}, 0x8}, @in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x2c) write$FUSE_NOTIFY_INVAL_INODE(r4, &(0x7f0000001280)={0x28, 0x2, 0x0, {0x2, 0xffffffffffffffff, 0x7}}, 0x28) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f00000012c0)={@loopback={0x0, 0x1}, r8}, 0x14) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000001300)={0x1, 0x0, [0x0]}) 16:06:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1f00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:49 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:49 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000003c0)={0x0, 0x7f, 0x30, 0x9, 0xee}, &(0x7f0000000400)=0x18) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:49 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x404300, 0x0) ioctl$TIOCSBRK(r0, 0x5427) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) [ 282.122103] hfsplus: invalid session number or type of track [ 282.128099] hfsplus: unable to find HFS+ superblock [ 282.141931] FAT-fs (loop0): invalid media value (0xda) [ 282.147675] FAT-fs (loop0): Can't find a valid FAT filesystem 16:06:50 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)="62747266739b", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x23000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:50 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:50 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) r0 = geteuid() r1 = getegid() lchown(&(0x7f0000000080)='./file0\x00', r0, r1) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000030807031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 16:06:50 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x90ffffff, 0x0, 0x0, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000040)=""/204) r1 = syz_open_dev$vcsa(&(0x7f00000016c0)='/dev/vcsa#\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000001700)={0x0, 0x6}, &(0x7f0000001740)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000001840)={r2, 0x98, &(0x7f0000001780)=[@in={0x2, 0x4e20}, @in={0x2, 0x4e24, @multicast1=0xe0000001}, @in={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, @in6={0xa, 0x4e22, 0x20, @empty, 0x1000}, @in6={0xa, 0x4e21, 0x2, @remote={0xfe, 0x80, [], 0xbb}, 0x3}, @in={0x2, 0x4e22, @rand_addr=0x2}, @in={0x2, 0x4e22, @multicast1=0xe0000001}, @in={0x2, 0x4e24}]}, &(0x7f0000001880)=0x10) 16:06:50 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x80000, 0xe0) openat$cgroup_type(r1, &(0x7f0000000040)='cgroup.type\x00', 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mmap(&(0x7f000029d000/0x200000)=nil, 0x200000, 0x1, 0x8031, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x600000, 0x0, &(0x7f000081e000/0x600000)=nil) shmat(r2, &(0x7f000013b000/0x3000)=nil, 0x4000) 16:06:50 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f00000000c0), &(0x7f0000000100)=0x10) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) r1 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x73, 0x591100) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000300)={0x0, 0x4, 0x8, 0x8, 0x2, 0x1, 0x10000, 0x80, {0x0, @in={{0x2, 0x4e21}}, 0x633, 0x7fff, 0x3, 0x401, 0x9c15}}, &(0x7f00000003c0)=0xb0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000400)={r2, 0x8, 0x2, [0x800, 0x1]}, &(0x7f0000000440)=0xc) clone(0x4, &(0x7f0000000680)="e65dfbbe4e23cbdb9bae7058ffcfb6331991d3a8ece4e37696ada8983d5b0c9c276b98cc6bf22034e24175dd000000000000", &(0x7f0000000480), &(0x7f0000c35ffc), &(0x7f00000004c0)="837f2d3066bf351dfdebfbd5b2eed31636bbee8d73671d69e02935628b449f9a073f609fd2b14bee2a9595afea690d4d59b3aa48d8554c3b94015d61b00412daac6f931c03a6786ddc77068c53e335175d2d70197bfeb41ba65b2940e5ec6d342023ef59c03d4f94d65d4fdd62869fb538a6a27f5b2ff6874db2563e53821421141e3b65802049630b70c39fdb42e89a73ad3b989a9f1f466335902e31910317a441f659a3f0ef461f64a1507caa6518ac72eb7931c8a099f4f5d29009657fe006511406bad4505cc0261f5efeec00d2095b7175f1a1342cd900feb900168dbbed422b75c3fa9906b2837017d60feb52c11a83c46558c0b4796d83034fb86457b2869c0ef6edac59512280273b8cf644e3918164d901c375e11fad66885f095768e2ec722e54916018fdfb21e286ad12f200f0ce76c8f2f3ea154a61cbacd7d5d9a2144b0cb90fd69b365ca6cf097c15db042988c5c74335e7a1c968e15c587c4ce4730a194c1e198380428adf6cd0764ab73a9827a8fd6fc7e4ded04d7d1a125fb614ae9be89f7e44c6698e23b9aa617d431477d925d29a1d824986000000000000000000000000") getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000280)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'team_slave_0\x00', r3}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) pipe2$9p(&(0x7f0000000040), 0x80800) wait4(r4, &(0x7f0000000080), 0x40000000, &(0x7f00000001c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 16:06:50 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x2, 0x80) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000001c0)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000180), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r1}}, 0x10) 16:06:50 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:50 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:50 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:50 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000300)={0x0, 0x1, 0x101, 0x9, 0xf84, 0x4ab, 0x4, 0x10001, {0x0, @in6={{0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, [], 0x19}, 0x7}}, 0x3, 0x8, 0x2, 0x3ff, 0x39}}, &(0x7f00000003c0)=0xb0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000400)={0xffff, 0x8, 0xee4, 0x81, r1}, &(0x7f0000000440)=0x10) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x1202, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000200)={0x0, 0x1, 0xeb0a, 0x800, 0x7, 0x4}, &(0x7f0000000240)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r3, 0xfff}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000280)={r3, 0xfffffffffffffe00}, 0x8) 16:06:50 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") capset(&(0x7f000043fff8)={0x19980330}, &(0x7f0000092000)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff7ba4f0ff000000bab7060000000000012d6405000000000065040400010000000704000001000000b7050000000000006a0a00fe00000000850000001a000000b7000000000000009500000000000000570e327caffed6672b822d4269519b3ed3e99774d4354108102da6fa4a9767ca2e9e"], &(0x7f0000000100)='GPL\x00'}, 0x48) 16:06:50 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) sync_file_range(r0, 0x67, 0x800, 0x5) r1 = dup3(r0, r0, 0x80000) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000180)={0x80, @tick=0x9, 0x55, {0xff, 0x3ff}, 0x1, 0x3, 0x8b}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x7, {0x7, 0x1b}}, 0xffffffffffffffbe) write$FUSE_ATTR(r0, &(0x7f0000000cc0)={0x78, 0x0, 0x2}, 0x78) 16:06:50 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x3f, 0x401, 0x8, 0x5, 0x1}, 0x14) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x1800000000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14004baa95ea7f640c4c000000000000040000002ddc64706ddb68300921eca306a3286217ff7b08b612d0f7063dc4d7371b31167e820fe904f5db4d4bd21d34cb7075726685e66bdf11057cf6411b533ee6c02fac0962db50da68868eb570e3edd5"], 0x14}, 0x1}, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e24, @multicast1=0xe0000001}}}, &(0x7f0000000200)=0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000240)={r2, 0xfffffffffffffff8}, &(0x7f0000000280)=0x8) 16:06:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffff7f, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:50 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:50 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000c35ffc), &(0x7f0000000140)) r0 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0xa0000) ioctl$TCFLSH(r0, 0x540b, 0x1) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x28) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000000040)={0x1, 0xf402}) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, &(0x7f0000000180)={0x1001, 0x2, 0x1000, 0xfffffffffffffff7, 0xfffffffffffffd30}) 16:06:50 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)="627472667314", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:50 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:50 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x80840) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000000c0)={0x14, 0x1, 0x8, 0xffffffffffffffff}, 0x14}, 0x1}, 0x0) 16:06:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:51 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x604800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000300)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000080)=[{0x2a, 0x0, [0x0, 0x101, 0x4c, 0x8, 0x2, 0x200, 0x26, 0x1, 0x100000001, 0x3, 0x4, 0x2, 0x0, 0xfffffffffffffff9, 0x7, 0x1]}, {0xc, 0x0, [0x70, 0x5, 0x4, 0x100, 0x101, 0x7, 0x6, 0x8, 0x9, 0x7, 0x41, 0xbd2, 0xfffffffffffffffb, 0x800, 0xfff, 0x1be]}, {0x4, 0x0, [0x0, 0x2, 0x8, 0xffffffffffffffd1, 0xef, 0x7, 0x4, 0x3, 0xf43, 0xfffffffffffffffb, 0x2, 0x3b, 0x7, 0x2, 0x6]}, {0x1, 0x0, [0x8, 0xfff, 0x40, 0x7, 0x80000001, 0xf93e, 0x101, 0x3f, 0x7fff, 0x0, 0xf6d8, 0x9b0, 0x5, 0x101, 0x4, 0x80]}, {0x4, 0x0, [0xffffffffffffff01, 0x4, 0x0, 0x8, 0x7, 0x8, 0x3, 0x1f, 0x2, 0x472f, 0x0, 0x109, 0x472, 0x5, 0x4, 0xdc]}, {0x4, 0x0, [0x5, 0x101, 0x200, 0x101, 0x2, 0x1, 0x6, 0x7ff, 0xc000, 0x0, 0x8001, 0x5, 0x100, 0x7f, 0x7, 0x3]}, {0x18, 0x0, [0x7f, 0xaba, 0x5, 0x81, 0x7fff, 0x1000, 0x1000, 0x80, 0x5, 0x81, 0x5, 0xff, 0x4, 0xf8ac, 0x6, 0x101]}], r2, 0x1, 0x1, 0x1f8}}, 0x20) sendmsg$inet_sctp(r0, &(0x7f00000006c0)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c, &(0x7f0000000080), 0x0, &(0x7f00000005c0)=[@authinfo={0x18, 0x84, 0x6}], 0x18}, 0x0) 16:06:51 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:51 executing program 4: r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, @loopback}, &(0x7f0000000040)=0x10, 0x80000) open_by_handle_at(r0, &(0x7f00000002c0)={0x102, 0x4, "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"}, 0x20000) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f00000000c0)) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = syz_open_procfs(0x0, &(0x7f0000000200)='attr\x00') socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000140)) getdents(r2, &(0x7f0000000440)=""/127, 0x7f) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000080)=0x2, 0x4) 16:06:51 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:51 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:51 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x37, &(0x7f00000001c0)="241007c4828c576e1837ef1ff9c48a97dac309d702f7e5e92531e9e79e49f6a6a79257993c79fd5107a7da39c7b5045014151ca328b76236864ea0f2f2dffcbcbd51f770e8335d0adc30e8d6082932982bd6d1ba92c31c", 0x57) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 16:06:51 executing program 4: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f00000000c0)=0x5, 0x4) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000000), &(0x7f00000001c0)=0x23) getsockopt$nfc_llcp(r1, 0x118, 0x0, &(0x7f0000000100)=""/169, 0xfffffffffffffe8a) syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) 16:06:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000500)={"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"}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000003c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000080)=[@text64={0x40, &(0x7f0000000000)="470f9b4e00f966baf80cb855d70987ef66bafc0cec66baa100b800000000ef6766470f10d03e0f2107b9800000c00f3235001000000f30470f200166baa100ed8f4970016ff0", 0x46}], 0x1, 0x11, &(0x7f00000000c0), 0x0) 16:06:51 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:51 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:51 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:51 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x806, 0x101) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r2 = accept$nfc_llcp(0xffffffffffffff9c, &(0x7f00000001c0), &(0x7f0000000240)=0x60) ioctl$ION_IOC_ALLOC(0xffffffffffffff9c, 0xc0184900, &(0x7f0000000280)={0x3ff, 0x17, 0x0, 0xffffffffffffffff}) poll(&(0x7f00000002c0)=[{r0, 0x88}, {r1, 0x8200}, {r2, 0x80}, {r3, 0x40}], 0x4, 0x1ff) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200000, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r4, 0xae03, 0x7d5) 16:06:51 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:51 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:51 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0x2b0000, 0x4) write$P9_RRENAMEAT(r0, &(0x7f00000000c0)={0x7, 0x4b, 0x2}, 0x7) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = socket$alg(0x26, 0x5, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000), 0x10) close(r2) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r4 = accept$alg(r2, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000003d00)=[{0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f0000001f80)="b0887c5916ad7dce6c4a71cfed26e70412ed4a3ae90c106c384e59c54e2c23b37e3be3f5988fe72d81204b21de7607ba", 0x30}], 0x1, &(0x7f0000001440)}], 0x1, 0x0) recvmsg(r4, &(0x7f0000003e40)={&(0x7f0000003e80)=@nfc, 0x80, &(0x7f0000030fa0)=[{&(0x7f000034df41)=""/191, 0xbf}, {&(0x7f0000003f00)=""/26, 0xfffffe5d}], 0x2, &(0x7f0000590000)}, 0x0) [ 284.236751] *** Guest State *** [ 284.240131] CR0: actual=0x0000000000000020, shadow=0x0000000000000000, gh_mask=fffffffffffffff7 [ 284.249141] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 284.258009] CR3 = 0x0000000000000000 [ 284.261763] RSP = 0x0000000000000000 RIP = 0x000000000000fff0 [ 284.267800] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 284.273816] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 284.280530] CS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 284.288590] DS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 284.296707] SS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 284.304738] ES: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 284.312731] FS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 284.320728] GS: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 284.328731] GDTR: limit=0x00000000, base=0x0000000000000000 [ 284.336775] LDTR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 284.344782] IDTR: limit=0x00000000, base=0x0000000000000000 [ 284.352930] TR: sel=0x0000, attr=0x10000, limit=0x00000000, base=0x0000000000000000 [ 284.360937] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 284.367385] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 284.374861] Interruptibility = 00000000 ActivityState = 00000000 [ 284.381107] *** Host State *** [ 284.384338] RIP = 0xffffffff811f4fc4 RSP = 0xffff88019aff7350 [ 284.390426] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 284.396854] FSBase=00007fbb209ee700 GSBase=ffff8801dae00000 TRBase=fffffe0000003000 [ 284.404679] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 284.410582] CR0=0000000080050033 CR3=00000001aeb3b000 CR4=00000000001426f0 [ 284.417627] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87a01380 [ 284.424332] EFER = 0x0000000000000d01 PAT = 0x0000000000000000 [ 284.430406] *** Control State *** [ 284.433885] PinBased=0000003f CPUBased=b5a06dfa SecondaryExec=000000c2 [ 284.440597] EntryControls=0000d1ff ExitControls=0023efff [ 284.446171] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 284.453133] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 284.459831] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 284.466433] reason=80000021 qualification=0000000000000000 [ 284.472773] IDTVectoring: info=00000000 errcode=00000000 [ 284.478262] TSC Offset = 0xffffff648db269a1 [ 284.482608] TPR Threshold = 0x00 [ 284.486004] EPT pointer = 0x000000019698201e 16:06:52 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)="627472667315", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7400000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:52 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000240)=""/35, &(0x7f00000002c0)=0x23) getsockopt$bt_hci(r2, 0x0, 0x2, &(0x7f00000001c0)=""/31, &(0x7f0000000200)=0x1f) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x30, &(0x7f0000000000)=ANY=[], 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000300)={0x7, 0x0, [{0x82d, 0x0, 0x5}, {0x400003bf, 0x0, 0x6}, {0xb49, 0x0, 0x1}, {0x38f, 0x0, 0xcf2}, {0x8fd, 0x0, 0x5}, {0xc0010315, 0x0, 0xffff}, {0x995, 0x0, 0x3}]}) ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f00000000c0)=@add_del={0x2, &(0x7f0000000080)='rose0\x00'}) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x89a1, &(0x7f0000000040)={@mcast1={0xff, 0x1, [], 0x1}}) close(r0) sync() r4 = open(&(0x7f0000000100)='./file0\x00', 0x440140, 0x100) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='mime_type\x00', r4}, 0x10) 16:06:52 executing program 4: r0 = gettid() r1 = socket$inet(0x2, 0x6, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f000064effb)="8907040000", 0x5) connect$inet(r1, &(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}, 0xfffffffffffffdaa) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000583ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000e60000)) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\x00', 0xffffffffffffff9c}, 0x10) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x100000001) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) tkill(r0, 0x15) 16:06:52 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 16:06:52 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) modify_ldt$write(0x1, &(0x7f0000000040)={0x2, 0x1000, 0xffffffffffffffff, 0x10000, 0x6, 0xfffffffffffffffc, 0x101, 0xff, 0x1}, 0x10) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x3, {0x0, 0x0, 0x0, 0x53fd}}, 0xe) 16:06:52 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x900, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:52 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:52 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)="62747266739b", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf4ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:52 executing program 4: clock_gettime(0x0, &(0x7f00000004c0)={0x0, 0x0}) clock_nanosleep(0x800000000002, 0x0, &(0x7f0000000140)={0x0, r0+30000000}, &(0x7f0000000100)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) timer_create(0x6, &(0x7f0000000180)={0x0, 0x1b, 0x1, @tid=r1}, &(0x7f0000000280)) r2 = gettid() clock_nanosleep(0x2, 0x800, &(0x7f00000002c0), &(0x7f0000000300)) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200a00, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, &(0x7f0000000340)={0x7, 0x0, {0xffffffffffffffff, 0x0, 0x1, 0x3, 0x7f}}) ioctl$PIO_FONT(r3, 0x4b61, &(0x7f0000000040)="3afd6e9c0e") timer_settime(0x0, 0x0, &(0x7f0000000200)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001600)='/dev/sequencer\x00', 0x20400, 0x0) ioctl$KVM_SET_XSAVE(r4, 0x5000aea5, &(0x7f0000000500)={"f7ae239d986f2aa206fa36dd3e6aca3eaa12f315f9b97cdd9e386e069bf232e6469a8b8b65f5fe185abf8456f1fc934726e9d88d17415687728fd76becc002f2e7e9c13a958ebd17bc5588d95d50bc506f966fdf2db6691f101c1adb53bca8e02cfa16246b43fee66856c44529c7f0a4c061606ed7314bc4889a1d7a6022fef82efa7c2415b4fdcc229ad6d6d8e79c39eb66f58e57f76be535adfa76cb466ee9914c5ea3692c8f3712a881262d1391d30322a183b2144c5dad159bbadd37e1f61b0087ab73191e2982d5481313b102823ee1e87bb75f0f2e0d3f6ef6bfcd00f2ab0e4ad9b342f3ddfea41b7d542005cd98c9cf049506f04af989eae0ef0d24f93317983b7b2438736ee1901b4cf45b223dab030ad4e11f8387348ee047e7d381215dd77e11c57fd308e11897f1119ed30a6511deb64241d803eb6fe5c73cc86ecc249dead41974cf42c8554fd92fe9cc78c3d8cadf1a429bfe7f89c171085a2cdcc9b79c54bcfc74c09d77eb279362ae9f2441f3a9af111abeaccbd1f293bad7725b5993f394b6f7df71e023b9de7d92b640c7d786252692fff63eb9d6c4aefcfca2e4b9198d7f78288bf600b0c8b50af808c19abd572520947e9ec84626348b01afcdd398cbc1e3dce1bcd4f1bafb91818ddf3a70f0fff322e41cf29b910af87dbdd4e16c270f6d0ac1eac561ca5eb3ea00056c8e0cbfe3bc8739dc5efa703bc8ca018ed7a7e80690c7ad8642f92a961123b0ffe7ae69159b485e6b708f4da370859c16aa4f1aa0fbda75c3fe2581506a14e2f0cffb7b86a25401953591b007b5a4d009f38f31204a8ffc4099feb546c406f18594d70d598d1e63a8cb6fefe17a9c60713a0abd4996355dc82c3b47053fcfdeb155d09a9bac2fa313dd5979a9492bb0a7e9a7c76cda4203bccd86dbe0c14be971d54a1c2886b6ddcce4bcd0657b777b5d66443ce3e888cf9b0a93151d936c82117082ac8f94426749bc59a9e1040e2c2dddbc3d8e7658c3c88f36cbf4ed621ea404e390497ef95b1df7efb2298bfdb1f4ef6dbc218df9baf4da38cbf55f724b2cd9d70c441b0537b60ccfb4ef0049a36f981d44d18b3ead66eff0ce735e694eb4a32405961c2b818abd23ef469799cf241906d7ecebe35b721c73118c8559005476b97d27df6ad03591fe172c5fb4ee9633c3d97a2bbdd256b63b5f49d185a96610e4da2aa93570ec4dbdf8e95e5c416caacc4a7c3b1d3aaf9d26922c8c7ea735525a8d447e2515a4afffbd6962164def77d5a4a27cc4c695247b2c840f5a0966ea2b7fcb584928caf996f4a7045e35bd8a491a5ef1dc06b7fcce88492854425a77a9e03b63724a41a465c0f1e74b08d6ce6cf76d2d0c2d8edc1f0849064602d5dcefd7fc3a4129b65c4a0e3e5047f51139bbdb6fbb5e1d15fc7582696a53d538191500bc17cbb391b98834c7"}) utime(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={0x9, 0xfff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f0000001640)={0x0, @in={{0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}}, [0x400, 0xd8c, 0x8, 0x200, 0x3, 0x2, 0x9, 0x5, 0x63f, 0x2, 0xa90, 0x5, 0x0, 0x8, 0xffff]}, &(0x7f0000001740)=0x100) getpgid(r2) getsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000001780)={r5, 0x8}, &(0x7f00000017c0)=0x8) mmap(&(0x7f0000362000/0x1000)=nil, 0x1000, 0x2, 0x10, 0xffffffffffffffff, 0x0) tkill(r2, 0x1000000000014) 16:06:52 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) ptrace$poke(0x5, r0, &(0x7f0000000040), 0xb16) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000200)=0x7fff) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 16:06:52 executing program 0: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0x3f) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast2={0xff, 0x2, [], 0x1}, 0x0, 0x33}, 0x0, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/wireless\x00') mq_timedsend(r2, &(0x7f00000003c0)="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", 0x1000, 0x400, &(0x7f0000000100)) sendmsg(r0, &(0x7f0000001700), 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000000c0)="78ce4b6226bcc52763db9d4d56939bc2", 0x10) 16:06:53 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c00, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:53 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:53 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1f000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:53 executing program 0: r0 = socket(0x10, 0x802, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0xff, 0x76, 0xed9, 0x4, {0x0, @in6={{0xa, 0x4e24, 0x6, @ipv4={[], [0xff, 0xff], @rand_addr=0x8}, 0x100000000}}, 0xf99, 0xa55, 0x6, 0x6}}, &(0x7f00000000c0)=0xb0) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0x3b}, 0x8) sendmsg$nl_route(r0, &(0x7f0000000480)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=@ipv6_newroute={0x1c, 0x18, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a00}}, 0x1c}, 0x1}, 0x0) 16:06:53 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:53 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) r0 = creat(&(0x7f0000001a80)='./file0\x00', 0x40) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000001ac0)=""/37, &(0x7f0000001b00)=0x25) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000040)={0x3, 'tunl0\x00', 0x4}, 0x18) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) fcntl$setsig(r1, 0xa, 0xd) 16:06:53 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2300, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:53 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x48, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20042, 0x0) write$cgroup_subtree(r1, &(0x7f0000000240)={[{0x2d, 'rdma', 0x20}, {0x2d, 'io', 0x20}, {0x2f, 'cpu', 0x20}, {0x2b, 'io', 0x20}, {0x2b, 'pids', 0x20}, {0x2b, 'rdma', 0x20}, {0x2b, 'rdma', 0x20}, {0x0, 'rdma', 0x20}, {0x2f, 'pids', 0x20}]}, 0x31) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f00000000c0)="77282433d6beb77015a4e2d71528b3fe9cd1c9ced3589b23dcc25dcaec51c4c00aa8ed1a3c06fee8b43f9cfa3e456a2110887f9679c2d3f76d5fb8a76e9cd7e0ab64d6a4dbdb1f4381ab991bd817c2a4677fee40f27303f150cebb281617bcfdfc63c3c597e3c8a8fbe31d72ac8d412588e21a81cec6f5", &(0x7f0000000140)="8000ea218dba519787521ba4abb4d94b50aa508b75b3c937bb10a22595976472972bc659ebd4bfd67afc746abaf54dae81fcebf4e898b80229a30c81c7452156866a671110dcd6f3037a66db9d02bab3e1033d062cd85d35282b69235608b7a72601532b88a93937701eb589a4a6621382e8046b33b698ce781ca3b08d4388316a7892af0196cecaec81eb53d132ebc9a0e9881db7daca86b73f8372276751bae9acbf27809ae368607ec9a2d4ee1c891a", 0x2}, 0x20) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f000091dff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000002c0)="f3e49c47399d2869226359976e796ba7", 0x10) 16:06:53 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x40000, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000180)={0x0, 0x5, 0xb, 0x48f}, 0x8) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000003c0)="e87075736565006cbe2dd2b395b06ce6f44640bfc4b9ca676026774ee038ae8b7e7f4a0813539992e44fac54b7090000009ac5633fba0e73b27b2e0e4b758ca430a6a7d17d1d8923016727424de2305d6de821cda19916c0afa51f98ab96b24e8b1a386768a4d1d46faee9110892be08e7e5823653bcdcff7015e412204411218ca6240f99bdd039e8f15baaccda5fb519a9c2d85deca257e2ad6c37ceb36532ea3ad195aa895882bf2ec16398f693be5bf5d3c870ca7c3852a3202516af08afe79300c16b1fb63ba9447574b35d0b6d9497ad05602606bff59ab4a51c17283a0dd815af8cf1c190c5f224fe7198105ae4aac056637149dd336e87c25e8f93800783c5b170deecd31f67113c9c1e25d6df16ce924da582f022a476d677d142b8dcd1104a7fe2cb435cd2c07f172751c77d679849c756b9a72e2f4e867725df5b0312238c9e8821cb5d726302ee2d69465eeab06b01b720ac3031b434a18d225458a561d4390908970116b4ecddbd3a5a7f26cfa5d6704a2bed95612e39a981371c3a4286b6da3ee386d87657ab28c5cba9ccc9326eaaf449b2e2adf0cdbd46642a1f15cf2af90cef95b891f8", 0x2, 0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) write(r2, &(0x7f0000000100)='k', 0x1) 16:06:53 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:54 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:54 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x61, &(0x7f0000005780)={{{@in6, @in6=@loopback}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000005880)=0x28) close(0xffffffffffffffff) r1 = dup2(r0, r0) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 16:06:54 executing program 0: sync() r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1800000000000000, 0x4000) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000080)) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000180)={r0, r0, 0x20, 0x3f, &(0x7f00000000c0)="0a9cefe1065422d2c13e9aa714f8cdc1616977db632b9e73090ba44eefdf84e9881695b1db8d60a1f1a3c4dd4c1a19f9f1f9552947a4e3b6aca6faec1b965594e1ce2a2dc457752960acf35f46adfd9df7e3175d77d65b65ab1a35e7019ad74fc61d22909602d650046d110597067eb5e9ef05cd750a1c86aca0f03e1aa25718c60cb0612527d8e23d503a44a4416df8afdd8c35f7882c1590d2a9b85d13e68d6a", 0x7, 0x101, 0x4c46f42e, 0x1, 0x0, 0x1000, 0x100000000, "bfc79cf36c219941023b9fbc287b3e58acd0a2cc6e16676651f62dfa8fc25b25aca14405d869a632027acdedda25469552d442b5ad7ebe3aa9899fa59f8a88b46e924262bbb7d92f3d86884545763815117857b1a99371b4f6bd2e6efb46ca8abb7640a60150205f5c0794358fb4153062656de5776b55fc4457b1eb42a05d12fca43c4286c59502cbbbe6accdcec1802c684f44ffb4acd0f41bb231da8c7bbf0b574bc5c4e4284b5b391739f28a47f4c8dfd6e9055897099c66b62a1e50f213b51691f902418ba8c5896c572769b4761a9fa82290"}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000280), 0x113, 0x9}}, 0x20) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000340), &(0x7f0000000380)=0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000003c0)={0x0, 0x1}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000440)={r1, 0x6}, 0x8) write$binfmt_misc(r0, &(0x7f0000000480)={'syz0', "e7f9c9d6e80d24f8fe333ed4a2272b3f7a152db3fe22029a2b193bb5bf01aae742a89f72c7e471f90ce9eacdc98fe763ff96f245f46acb4ef759eec83aba69cef806f1bca3d995036058761f6087ffa52280d3be6769008dddee29e36c"}, 0x61) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000500)={0x18, 0x0, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}, 'bridge0\x00'}}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000540)=r0, 0x4) r2 = fcntl$getown(r0, 0x9) getpgid(r2) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000580)={0x1, 0x1, [@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}]}) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x40, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@loose='loose', 0x2c}, {@version_9p2000='version=9p2000', 0x2c}, {@access_user='access=user', 0x2c}, {@msize={'msize', 0x3d, 0x10000}, 0x2c}, {@debug={'debug', 0x3d, 0x28}, 0x2c}, {@mmap='mmap', 0x2c}]}}) r3 = openat$cgroup_ro(r0, &(0x7f0000000700)='cpuset.effective_cpus\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000740)={{{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000840)=0xe8) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_RTOINFO(r5, 0x84, 0x0, &(0x7f00000008c0)={r1, 0xbb, 0x9, 0xe3d}, &(0x7f0000000900)=0x10) sysinfo(&(0x7f0000000940)=""/126) fcntl$setown(r3, 0x8, r2) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000009c0)=0xff) ioctl$TIOCGPTPEER(r0, 0x5441, 0x3) ioctl$SCSI_IOCTL_START_UNIT(r3, 0x5) bind$bt_hci(r3, &(0x7f0000000a00)={0x1f, r4, 0x3}, 0xc) ioctl$sock_inet_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000a40)={'gre0\x00', {0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000a80)={0x5, 0x20, 0x0, 0x100, 0x100000000}) getpeername(r0, &(0x7f0000000ac0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000000b40)=0x80) 16:06:54 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:54 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) fdatasync(r0) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 16:06:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffb, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:54 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x68, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:54 executing program 3: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x6, 0x13, &(0x7f0000000000), &(0x7f0000000080)=0x4) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x41) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="025cc83d6d345f8f762070") r4 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r4, 0x800000c0045006, &(0x7f0000000000)=0x7f) read$eventfd(r4, &(0x7f0000000040), 0x8) perf_event_open(&(0x7f00000000c0)={0x8, 0x70, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r2, 0x0) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000140)=""/60) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f00000000c0)={0x1, 0x2, 0x8, 0x101, '\x00', 0xb0}) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f0000000200)={0xfff, 0xb8f, &(0x7f0000000180)="5fde120bfcf3087240ad8e4eecd091bab352f80a28548a8f", &(0x7f00000001c0), 0x18}) 16:06:54 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x900000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:54 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)="627472667304", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:54 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) r0 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) fsync(r0) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1991bda5, 0x40800) getsockopt$inet_dccp_int(r1, 0x21, 0x6, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 16:06:54 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:54 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x4a) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_emit_ethernet(0x3e, &(0x7f0000000140)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [{[{0x9100, 0x5, 0x57, 0x3}], {0x8100, 0xfffffffffffffffa, 0x3, 0x3}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}}, @tcp={{0x0, 0xf401, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, &(0x7f0000000000)={0x0, 0x0, [0xede, 0x0, 0x0, 0x80000]}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f00000000c0)=0x2, 0x4) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f0000000080)) renameat2(r1, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00', 0x7) 16:06:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) connect$inet(r0, &(0x7f0000000200)={0x2, 0x200004e28, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x581000, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000140)={@ipv4={[], [], @remote}}, &(0x7f0000000180)=0x14) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000004c0), 0xc0, &(0x7f0000000540)}, 0x8000) pipe(&(0x7f0000000300)={0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f00000000c0)={0x8001, 0x1, 0x7, 0x100000000, 0x3, 0x1}) write$binfmt_elf32(r0, &(0x7f0000004100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) mprotect(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0) get_mempolicy(&(0x7f0000000080), &(0x7f0000000040), 0x7ffd, &(0x7f0000002000/0x4000)=nil, 0x1) 16:06:54 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:54 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000400)=@mangle={'mangle\x00', 0x1f, 0x6, 0x200008a8, 0x2b0, 0x0, 0x10c, 0x390, 0x0, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x4a8, 0x6, &(0x7f0000000000), {[{{@ip={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast2=0xe0000002, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x98, 0xbc}, @TTL={0x24, 'TTL\x00'}}, {{@uncond, 0x0, 0x98, 0xbc}, @ECN={0x24, 'ECN\x00'}}, {{@ip={@empty, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 'sit0\x00', 'teql0\x00'}, 0x0, 0x98, 0xbc}, @ECN={0x24, 'ECN\x00'}}, {{@ip={@multicast2=0xe0000002, @rand_addr, 0x0, 0x0, 'ip_vti0\x00', 'irlan0\x00'}, 0x0, 0x98, 0xbc}, @inet=@TOS={0x24, 'TOS\x00'}}, {{@ip={@rand_addr, @broadcast=0xffffffff, 0x0, 0x0, 'team_slave_1\x00', 'veth0_to_team\x00'}, 0x0, 0x98, 0xc8}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback=0x7f000001}}}], {{[], 0x0, 0x70, 0x94}, {0x24, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4a8) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x8000, 0x0) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f00000000c0)={0x5, 0x3, 0x0, [{0x9, 0xffffffff80000000, 0x1, 0x3, 0x7, 0x0, 0x2}, {0xdcc, 0x100000000, 0x9, 0xfffffffffffffffa, 0x9, 0x8, 0x80000001}, {0x400, 0x4, 0xf95, 0x10000, 0x8, 0x81, 0x6}]}) 16:06:54 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x20000) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000080)=""/209) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000640)={r0, 0xffffffffffffffff, 0xa}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) syz_open_pts(r1, 0x20000) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x2, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x22}], &(0x7f00000001c0)='syzkaller\x00', 0x200, 0x0, 0x0, 0x41000, 0x1, [], r2, 0x3}, 0x48) 16:06:54 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:54 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = memfd_create(&(0x7f0000000000)='\x00', 0x2) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040)=0xffffffffffffd06b, 0x4) 16:06:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:54 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:54 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x1000) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x414e00, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xe0, r1, 0x402, 0x70bd2c, 0x25dfdbff, {0x6}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3ff}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x63}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8001}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_DEST={0x18, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast=0xffffffff}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote={0xac, 0x14, 0x14, 0xbb}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfffffffffffffffb}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x800}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}]}, 0xe0}, 0x1, 0x0, 0x0, 0x20040040}, 0x48001) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 16:06:55 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:55 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x5) r1 = semget$private(0x0, 0x7, 0x4) semctl$GETVAL(r1, 0x1, 0xc, &(0x7f0000000400)=""/220) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000200)=0x8, 0x4) r2 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000040)=0x400, 0xf8d104c2f9c170e3) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000002c0)={0x9d68, 0x100000000, 0x3, 0x2, 0x3f}) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sndpcmp(&(0x7f0000000500)='/dev/snd/pcmC#D#p\x00', 0x1ff, 0x80) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000540)=0x1) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x40000, 0x0) ioctl$EVIOCGABS3F(r5, 0x8018457f, &(0x7f0000000380)=""/126) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r3, 0x0) r6 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x4, 0x2) write$FUSE_INIT(r6, &(0x7f0000000240)={0x50, 0xffffffffffffffda, 0x3, {0x7, 0x1b, 0x4, 0x10, 0x6, 0x80000000, 0x4400, 0x6}}, 0x50) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local={0xfe, 0x80, [], 0xaa}, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1={0xff, 0x1, [], 0x1}, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e24, 0x101, @local={0xfe, 0x80, [], 0xaa}, 0x281}, {0xa, 0x4e23, 0x82d, @mcast1={0xff, 0x1, [], 0x1}, 0x7}, 0x7, [0x1, 0x7d, 0xbc6, 0x4, 0x9, 0x1, 0x4, 0xffffffffffffffff]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x0, [0x0, 0xa800000000000000, 0x2, 0x7]}, 0x5c) 16:06:55 executing program 3: mkdir(&(0x7f00000001c0)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x80000000032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa, 0x3}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000043fe0)={{&(0x7f0000012000/0x3000)=nil, 0x3000}, 0x1}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000040)={0x10000000}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @control}], 0x30) fallocate(r1, 0x3, 0x300, 0x3) close(r0) 16:06:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x280, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000100)={@loopback, 0x0}, &(0x7f0000000140)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000580)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000005c0)={'vcan0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000700)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000800)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000900)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000940)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000a40)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000ac0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000e40)={'\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002400)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@mcast2}}, &(0x7f0000002500)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000002540)={'tunl0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@ipv4={[], [], @multicast2}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}}}, &(0x7f0000002680)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000026c0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000027c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000002800)={0x0, @loopback, @broadcast}, &(0x7f0000002840)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000003080)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003040)={&(0x7f0000002880)={0x7a0, r1, 0x1, 0x70bd26, 0x25dfdbff, {0x3}, [{{0x8, 0x1, r2}, {0x74, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x4}}}]}}, {{0x8, 0x1, r4}, {0x1a0, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r5}}, {0x8, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x5a6}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x200}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x2}}, {0x8, 0x7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r7}, {0x264, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0xe8a}}, {0x8, 0x7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x4}}, {0x8, 0x7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x1}}, {0x8, 0x7}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x10001}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x2}}, {0x8, 0x7}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r10}, {0xb8, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r12}, {0x168, 0x2, [{0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0xc, 0x4, [{0x7fff, 0x8001, 0x5, 0x3da8}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x3f}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x8000}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r15}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r16}, {0xc4, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x14, 0x4, [{0xffffffff, 0x8, 0x400}, {0xe00000, 0x8, 0x9, 0x80000000}]}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0xc, 0x4, 'hash\x00'}}}]}}]}, 0x7a0}, 0x1, 0x0, 0x0, 0x801}, 0x20000000) r17 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r17, &(0x7f0000000000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000023ff0)={&(0x7f00000001c0)={0x281, 0x27, 0x1aff, 0x0, 0x0, {0x3}}, 0x30c}, 0x1}, 0x0) 16:06:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:55 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:55 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:55 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) r0 = memfd_create(&(0x7f0000000000)='md5sum\x00', 0x3) write$P9_RWRITE(r0, &(0x7f00000001c0)={0xb, 0x77, 0x2, 0x970000000}, 0xb) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) ioctl$RTC_WIE_OFF(r0, 0x7010) keyctl$join(0x1, &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) [ 287.670977] netlink: 621 bytes leftover after parsing attributes in process `syz-executor4'. [ 287.705556] netlink: 621 bytes leftover after parsing attributes in process `syz-executor4'. 16:06:55 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:55 executing program 0: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000740)={0x0, 0x0, 0x1, 'queue1\x00'}) r0 = syz_open_dev$sndseq(&(0x7f0000000480)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'vcan0\x00'}) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xfffffffffffffff9, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() write$FUSE_DIRENTPLUS(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="b0000000000000000800000000000000020000000000000001000000000000001c00000000b1d1be860000002000000000000000ff0f00000800000004000000000000000100010000000000060600000000000000070000000000000300000000000000010000000000000003000000040000000200000001000000", @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="f1ce092f020000000000000005000000000000000300000000000000070000008100000073797374656d5c00"], 0xb0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000340)={0xc1, @time}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0x80045301, &(0x7f00000005c0)={0xfffffffffffffffd, 0xfffffffffffffffa, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc0a85322, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue0\x00'}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fdbff0)='/dev/sequencer2\x00', 0x0, 0x0) 16:06:55 executing program 3: getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x8}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000100)={r0, 0x2418000000000000}, 0x8) r1 = socket$inet6(0xa, 0x80003, 0x2b) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000780)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac(des-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000af2000)="8be3000000010000", 0x8) r4 = accept$alg(r3, 0x0, 0x0) write$binfmt_elf32(r4, &(0x7f0000000800)=ANY=[@ANYBLOB="7f544c4600000000000000000000000000000000000000f6ffffffffff1f00000000005456eba2000000000000008000000000000000000000000000"], 0xfdef) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x7}, 0x1c) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x11, r1, 0x0) sendmmsg(r1, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000080)}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001cc0)='V', 0x1}], 0x1, &(0x7f0000000080)}}], 0x2, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xde, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={r0, 0x7a}, 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@remote}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f00000001c0)=0xe8) 16:06:55 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x180, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)={'#! ', './file0', [{0x20, 'cpusetcpuset{%'}, {0x20, 'ppp0'}], 0xa, "d84a3467746c67986a2df36261c78727446b3f07"}, 0x33) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='tracefs\x00', 0x0, &(0x7f0000000280)) mount$bpf(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000100)='bpf\x00', 0x280a8, &(0x7f0000000180)={[{@mode={'mode', 0x3d, 0x7ffffffffffffe}, 0x2c}]}) 16:06:55 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:55 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:55 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 16:06:55 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) mknodat(0xffffffffffffffff, &(0x7f0000000180)="2e2f66692e65318c", 0x0, 0x0) r0 = fanotify_init(0x0, 0x0) fanotify_mark(r0, 0x11, 0x2, 0xffffffffffffffff, &(0x7f0000000380)="2e2f66692e65318c00") fanotify_mark(r0, 0x11, 0x2, 0xffffffffffffffff, &(0x7f0000000100)="2e2f66692e65318c00") 16:06:55 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:55 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x101000, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$l2tp(r0, &(0x7f0000000a40)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x4, 0x2, 0x2, 0x1, {0xa, 0x4e23, 0x4}}}, 0x32) syz_mount_image$vfat(&(0x7f0000000200)='vfat\x00', &(0x7f00000002c0)='.//ile0\x00', 0x0, 0x9, &(0x7f0000000940)=[{&(0x7f00000003c0)="0c8cb9d8176c8f42e4ab0af3909ba8193c963b7a7a811181d2b31401c4a7e6573fe9c37d42c1342eb78ba3810f9431dcf3c903e806b9a518d9e989ef69e8fdef8af24f9001ce572ae318ffe596f50dc67a1f397c02f994e77da796177fdaa6c6e69567f8bbec0c213db3597a42151e8fe4d3c49e2c5527397bb0a48add9a2a244b8c77bdd577bfd00be66750ae87d95960a14cfa451a9d340bfb016ea0e093033ac584078f04d6e78f17da8bd51ef5443bd07764d0101c3b12f34336b56d462c03", 0xc1, 0x100}, {&(0x7f00000004c0)="b329b8846abb74bf42e3e370f8299e927c9655c5db065c256eef8e4483d7ff70173b57ad713b477450a7e6901b70aec8ee7443092b24c09f296f25b53e0f531a3efdac6f52e7e967c9959b440cf4538b7ac91d2f67fcd5af7ab63a8ce0504bd66fab31a8203f4a5ba4e54109c79472461769b68d0c88394e33769237f38a37d28d3b82f9913c887ec0fd3a58fe91adaf6b41897dd45aaffe7a33dfef8010951b7b2e37d1febc5a61376e05d6e1ebf09ebd70c22375d0b022af24f49f9eccfd4181142154158c4efbbeea9587bcd2a56577eaad5cde342ea65ab8f1bdfa", 0xdd, 0x6}, {&(0x7f0000000040)="5d8cfba2b3f3fcfdec4af0ce575d9ac829ca205fa75c322ab61b6e42c5678574dd48b3a3ce6a4bb4af183d0d2315440893110e7aadb1e4ddb7ca3a9b7799705f509185b89a1e02bfdcd2ea4ec272200be12a5e73da592ef4001e9c2f8c446360ee9d6fd986d162c5f41223cf99377c2ec9bba90669f1a2204b77f735c85410d251f9f8ae98cc0cf1de4afaf8d07db7f2d9c430a0e6191b83e42be3ca24f6a30d2384dc3b183c71978b41d5a9760e3d796fec534815389915a6e8407659ba", 0xbe, 0xa74e}, {&(0x7f00000005c0)="610001e3492f7cf2deb756fb4425b5b1c70a0fa37b423e80565551c37926972bae44b7a5e6ca717d09520517414b4fec63dfe6b5bd655d81a26aa4af4ee0d6baea52e22a23c05171990453e2381aebb7e9f86b2e82b0d7dcde485905336bfb5f80de55eaf369f1630f076cfe304528212c6ee949f48b66f2906d6b6e1cf9ab2af754fe45967907103fe394c07e1e2691c4b2ba7a659cfdf62ad66e994451bdff041d5aae23cf7a18cd35c97363", 0xad, 0x572b}, {&(0x7f0000000680)="0198843069494dd51218751589b15faad6ad57551e1d885a5075b54a6a0f0bd46563150ba5f18e00ac9f55daacb9983aac3947457c64886127d69a95f0e874bbaccc56d6ba12abd4de229b3cccf023d78e3920fb9d11fc75808eb24bd852f46125131e01b19f2966be795b7d56bae4f8cc8cdf8ea0f7efb8cf1f387b8a32214c6b0f45db84d73e85a8ebf58d9621ffeeda55fd1aa32981bfc63bfbe8fda552f72370555eb419a620c298d5e90aebf272fa52aef87cb457609afe4cdb966b078a46789b5668bd1bdbafddff144ec1df38c3d0c49c12c9d4eb6925a4d0287f8838649d3b8648b37a1b12dbb58112d7ff65", 0xf0, 0x89a}, {&(0x7f0000000180)="1a73601f15a943576080d898ddafead3a0cdfc1b16c7ca8313a6ffde1a2e2a8cdc52108d2221befa673310f03c1f4837235f030cdd3017b590c188e5ff208201ca3b8566f01cf92949a920cb4ec74d5539f96a2e2764a38468755c40acb4cb1f5519d0042001f5298731cf946a1dee53cb88aa1b", 0x74, 0x82}, {&(0x7f0000000780)="cbbbad4bea5c25a14d5df21b51691ba7dc68874310f4e1f298709bbc57628ef0bc71542c902b6be65080d11201449360dd1d2f21c63cde312d2244d6dac651a3dace58e7cca878644c2a72c94fa37272a24b830edfb5f2c161dd8494987eb397b30c073f8fc4b5d1b31e60db2d7573eaf2a08fd6bb08cef4e9d1f9d268f11dbe629f32050b47e303c2afdc44701a506982f1d6fc52705d5389070c535fcd7f09dd05d017428a16f1a67db95af07e151cd8c65822e1db98a6062a32fedefcf38e0e62b10de9deda69a9db26428cff5bcc36bc1f861e24eaa8366a35c65e131c8301724fdd4431faed", 0xe8, 0x4}, {&(0x7f0000000880)="dea68d81c7e3956ba28164cad7a381dd50ec1cc56e640916f3b9272a704a4ff4e9b076cc674ca0c409df3a88092c6296e580303e8f5ddea6e4c967531d68122d1da09b914f76c7cdf75c09280e0a33fce2a55d539ebdd3111531268f4758f5dc78f0cc408dd14249ff324945f6ffa8de4469615b1ba2475b4025e3ae4893d974028bd639b4f3341c5ad6d1a2f8b6d848189d6bb266cad1a3", 0x98, 0x5}, {&(0x7f0000000240)="28c7a537658261cbdaf452cff635aa2ef2689704c1e28cd4482e06c95a144d85efb5363c24b9b5ae1656d9d8d0df408a1f8c90def1c32f7ec6b203182f3e8fd0396444a7092a758cc26af0b2690e03e78dc2165143b33139fa7e4400517ac2964737abfa32ec46f0aa40", 0x6a, 0x5c7d}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='iocharset=ascii,iocharset=i']) r2 = inotify_init() fadvise64(r2, 0x0, 0x10000, 0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x10001, 0x1, &(0x7f0000000380)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020401000200027000f8", 0x16}], 0x0, &(0x7f0000000340)=ANY=[]) 16:06:56 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:56 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xff, 0x30000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000040)=0xffffffff) 16:06:56 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89fa, &(0x7f0000000000)={'sit0\x00', @ifru_data=&(0x7f0000000080)="48803d6b61439579b6d04dd4102d09b21f8e3ef66a49b9acdf65e7fc2c583929"}) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x20) setns(r1, 0x0) [ 288.451538] FAT-fs (loop4): bogus number of reserved sectors [ 288.457621] FAT-fs (loop4): Can't find a valid FAT filesystem [ 288.475052] FAT-fs (loop4): bogus number of reserved sectors [ 288.481081] FAT-fs (loop4): Can't find a valid FAT filesystem [ 288.663124] FAT-fs (loop3): invalid media value (0x50) [ 288.668761] FAT-fs (loop3): Can't find a valid FAT filesystem [ 288.752291] FAT-fs (loop3): Unrecognized mount option "/dev/hwrng" or missing value [ 288.794879] FAT-fs (loop3): invalid media value (0x50) [ 288.800323] FAT-fs (loop3): Can't find a valid FAT filesystem 16:06:56 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:56 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x80803, 0x7) sendto$inet6(r1, &(0x7f0000000340), 0x0, 0x0, &(0x7f0000000040)={0xa, 0x7, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0xff, @dev={0xfe, 0x80, [], 0x1f}}}, 0x2, 0x4, 0x8, 0x50000000, 0x4}, &(0x7f0000000000)=0x98) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000140)={r2, 0x3}, &(0x7f0000000180)=0x8) 16:06:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x900, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:56 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) socket$can_bcm(0x1d, 0x2, 0x2) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)={0x0, 0x0}) wait4(r0, &(0x7f0000000080), 0x40000000, &(0x7f0000000240)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000040)={0x2, 0x3, 0x279, 0x3, 0xfffffffffffffffc}) 16:06:56 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:56 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="e15bc83d6d345f8f762170") syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./control\x00', 0x0, 0xaaaaaaaaaaaa8f7, &(0x7f00000003c0), 0x0, &(0x7f0000000240)) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x83, 0x402) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x111, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000180)={0xf, 0x8, 0xfa00, {r2, 0x13}}, 0x10) 16:06:56 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_aout(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="0000063fc90000000500000b8c01a3b1ce31000000b5928fbd0065910ede823b45a90f876e6d0cd4e191a1f989377007430135c500952333ab9387de2a517dee28d4b2921ea4c8fa06204dc421ed425291548dc39b518cdf62"], 0x60) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSW(r2, 0x5403, &(0x7f0000002000)={0x41cb, 0xffffffffffffffff}) 16:06:56 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f0000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:56 executing program 4: r0 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x22, 0x20000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, r1, 0x200, 0x70bd2d, 0x7f, {0xf}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x5}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x100}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x4040}, 0x840) r2 = socket$inet6(0xa, 0x800000000000001, 0x0) ioctl(r2, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x14000, 0x0) ioctl$TCSETS(r3, 0x5402, &(0x7f00000000c0)={0xfff, 0x9, 0xfffffffffffffffa, 0x100000000, 0x100, 0x9, 0x5, 0x2, 0x1, 0x6, 0x7fffffff, 0x834f}) mmap(&(0x7f0000000000/0xf82000)=nil, 0xf82000, 0x80000003, 0x31, 0xffffffffffffffff, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000ceaff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGETD(r4, 0x5424, &(0x7f0000000040)) 16:06:56 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:56 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:56 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:56 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x10000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:56 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000040)=0x4) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x1, 0x238, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, &(0x7f0000000240), &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x2b0) 16:06:57 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x301000, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0xc, 0x10, r0, 0x0) [ 289.352024] ISOFS: Unable to identify CD-ROM format. 16:06:57 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x80000, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f00000000c0)) r1 = socket$netlink(0x10, 0x3, 0x80000000000000d) socket$netlink(0x10, 0x3, 0x7) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x6, 0x20080) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000040)=0xe, 0x4) writev(r1, &(0x7f0000fdbff8)=[{&(0x7f0000ac9000)="290000002000190000003fffffffda060200000000e80001040000040d000300ea1100000005000000", 0x29}], 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r2}}, 0xc) [ 289.395684] ISOFS: Unable to identify CD-ROM format. 16:06:57 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={&(0x7f0000d55000)={0x10}, 0xc, &(0x7f00008b7ff0)={&(0x7f00003c0fdc)=ANY=[@ANYBLOB="2400f873f0063b0017b7cafea7c1d2b16f00000000006f00b7686eb83f"], 0x24}, 0x1}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001b40)={{{@in=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@broadcast}}, &(0x7f0000001c40)=0xe8) socketpair$inet(0x2, 0x0, 0x6, &(0x7f00000008c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000900)={0x0, 0x8}, &(0x7f0000000b40)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000b80)=@assoc_id=r3, 0x4) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer2\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000000a40)={0x0, @in6={{0xa, 0x4e22, 0xe93, @empty, 0x4}}, 0x63, 0x7f, 0x9, 0x9, 0x3}, &(0x7f0000000b00)=0x98) ioctl$sock_bt_hci(r4, 0xc00448df, &(0x7f0000000bc0)="40271f506232535f06794e574b1e295a08c476392807a3d14fae5d98fe266877af0ea29779e91d6884d82e64cfebac93ab082be661e4abe5cbe3b93bcd8f87b4") getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000a00)={r5, 0x8}, &(0x7f00000009c0)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000940)={r6, 0x100, 0x8, 0x8}, &(0x7f0000000980)=0x10) sendmsg(r0, &(0x7f0000000800)={&(0x7f0000000000)=@ll={0x11, 0x1f, r1, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000080)="c60fbd740d646b86caf3a3a01d433adb3c74177c004116837d31d2f0216be6e886917755252d0befcbfa790a5061207d7faf9d8bdbf1cc0be4e60c6e0753c7d1703dab7432bfa2cfc20ce06776ea2cdd47df80709189db65792f8a9543446bcd40274ba3050d8e619094648f452a0b12e1a795", 0x73}, {&(0x7f0000000100)="ddb38a75", 0x4}, {&(0x7f0000000140)="cf154a2e51a6f592d7d65165663c87ed539638107bf127c23b695b2106cc9504cd7697e42b2ba76258f0f6a555f80af3e20cef8a402ee285552ec64f730102ef48c262ec616fefa209609ae19a56ca", 0x4f}, {&(0x7f00000001c0)="cd88edf220fff67f63fa24c535996e734a11d6ee69c813f5ae5dae262047b05861b10531cf52cf5bfaebd42be5d27ac090b10ce7cb71a86e43139df65839bc1940b980c9fa5ad00076432a65940fb70a28fc6d8bce649488208255892efc8fb6e09300ea2b1ec1406456787ce388e5702f46cbae35c8c00a3bcf117ea826262bdc210d71bbceb3440ae3f27f3c03c94ca3cdcabdbb6b192c3bb85c7af8c2517bf48bab9154ff6a90810ee058aedd063a65923224db221300598e46ba4a8af1148e64ec8766873a7d2b50dcadde1f", 0xce}, {&(0x7f00000002c0)="0388be7c1b9f16a34ae2f61a2c28a26a9f97d0e56319679d9219bb24e13d1bb77ab2699a6b10f301a8f1b40e7e65d832b68c371f79db5c18d4de9ed4ea5b8130e919d8cd1412e409afca75b483d258be049d30c5ba8aa040d638588b9a9ef3a60e51ce6e0f0c790d2ee7662ca38f30cf5c81", 0x72}, {&(0x7f0000000840)="49dc0695a8b808", 0x7}, {&(0x7f0000000380)="071de578b1ab269c73a6c1632ea20ba275d7ba045f119044be5e87a5f33abdf7e73b5c1d4deddd5d11fc8003f97b42825d5ae8e3385d208309bc40fe7ac1dc43bedea4873895d4817942c1a9766abc73dfa4e690dda80631d3e71a6d523bd9abcab372e6da743122cc548fbe8cfdac5228e7579c8510b2d378adeff2269a2aa057f9f96756365dc411fc6d", 0x8b}], 0x7, &(0x7f00000004c0)=[{0x78, 0x88, 0x7, "065c9c0fa72c26476f4ab6bee6af0a64100daebc6cab207b4bb846cd61e186c44a410020f7de5c7c2af3ce34ee7ce5dede140bb332693944db5bd8af1869fa95000000004e65d0d14249879fcf55e8c95c6d1de291367b8e50958d81ff959991fc519562a8"}, {0xf8, 0x108, 0x8001, "78f7ebe5662f89525e3460d6ea6d66a4cc2593f30abb88f4d7a510e922ccdb4d7a5957b40ce4541a5a04a83f9d0d227fbd302d6cf76cd8256015fc1eeb99f01f28922c7700549c71191600d71f5e08028f2e517ab905d3dbfecc2ae9cce2fd69776ac65c089dc2db6ad63b809306e7c5a04fe40db9e63708e1353899169d6833457a9483e9bf04a44250c782d51b75c7f12b785606512f4d5ca2830b2afa26ed217276c84b5f89a03f329b31b3725a9bb90f773f3d7a8b792a29bf8132f314aba06d55017a852416c7b5e5e2c352696d44654f89de8346e723fa124ab2a12877b0680b"}, {0x108, 0x110, 0x7, "3e6625ce2c75d4ba75aaf1a0708eb145fcb2fe33fd0d44960a99888cd9cd07c48e7f6a695c545404ba44ce5e3db9b690c0044534b8de0a9ca2d5313c77a9fdcfedbffca00805fa978b453ddfb4f9f84e4defdb918ec9a93b9bded205c8ef46cc7b6ca3f8690598c11fb85c06fd2133e550d00a2f9f03d513dde7a7df7e74a3e5ee2cf38ead35c94d02fbd880d35112979de1f4c423b24c6510b361798a3f90217c4ffb88b74e37d5816380e0e8012f6c0a0eb049496b6e3aff7dbbecc03c46699b07a32d1ff55a90369e9b624b0ae50d188ee68cbe866406fdca7838cc5211161db703c67f191a44f3a0204fb71eaedf4919"}, {0x98, 0x11d, 0x7, "3fa6e2072fd34c78b2a6be77ca35b428d2a149cb35dbdb32406596263c58b75b122783764974fd2d3b756616b380a702f641745d487e6807876ef489a9b91569cefaba990f298f2c590173a67386ff49cc24d688580d26e88bcd07d48e75427bf8e4e680d8e2232c510f1a383a345ac73afec54f1cef54eafff0a90bba3b5df81d"}], 0x310, 0x4004080}, 0x48801) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x101000, 0x0) 16:06:57 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:57 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)="6274726673fd", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:57 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000013c0)='ramfs\x00', 0x0, &(0x7f000000a000)) chroot(&(0x7f0000000280)='./file0\x00') socket$rds(0x15, 0x5, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x400000000000005) [ 289.633047] kernel msg: ebtables bug: please report to author: nentries does not equal the nr of entries in the (last) chain 16:06:57 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:57 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x3, 0x300) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000001980)=""/150, 0x96}], 0x1) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000180)=""/133, &(0x7f00000000c0)=0x85) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) 16:06:57 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x20000000000000, &(0x7f0000000240)="8883b3addb733cc1111034d05817cb091d2182f0058158fb21037660666807b8534189cbf114b13a4de2eaaf0e64e1fdc67b383fb1588e5bfc953eba22800b3799499abb49d31ad5005adb643d6f5065ca", &(0x7f0000000200), &(0x7f0000c35ffc), &(0x7f00000002c0)="d0b0be83c2b661fe0b62b8ce15bcf31821d72c5f91814f0e417efd13af1b54e5878b864dc279a45465f9111c9224302ba9f7d3189f6f0448097980fd4ebc7c116bd89d882ab9afa38b1bc6f4a4cbc8d7b46712e41b9c5b4d24e9691f0ec8db6abb44b83e2547e42ef3ef122e629892a6054106c66f4210f28b142c5856dc1bfb8826b7c1e63dade23503d3033fd8e88f717db0b17dd7") wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2800, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000040)=0xfa) getresgid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000380)) ioctl$TUNSETGROUP(r0, 0x400454ce, r1) 16:06:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x141000) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000040)=0x1) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) fcntl$setflags(r0, 0x2, 0x1) ioctl$KVM_ENABLE_CAP_CPU(r3, 0xc008ae88, &(0x7f0000000140)={0x7b, 0x0, [0x40000070]}) 16:06:57 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x2}) getsockname$unix(r1, &(0x7f0000000080)=@abs, &(0x7f0000000000)=0x6e) 16:06:57 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:57 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:57 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x68, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:57 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4a4948613f1dd5d8, 0x1, 0x1000) 16:06:57 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getpeername$inet(r0, &(0x7f00000000c0)={0x0, 0x0, @remote}, &(0x7f0000000100)=0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000240)) ftruncate(r1, 0x80003) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) write(r0, &(0x7f0000000040), 0x0) 16:06:57 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040)=0x25, 0x2000000003) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)={0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000080)=0x2c) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000100)={0x2}, 0x1) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) 16:06:58 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x97ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:58 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:58 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x900000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:58 executing program 5: shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x6000) clone(0x8004000, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7, 0x4ccc3084f12b4c2a) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000080)=0x3) wait4(0x0, &(0x7f0000000040), 0x8, &(0x7f00000000c0)) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f00000001c0)={0x101ff, 0x0, &(0x7f0000ffc000/0x4000)=nil}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000200)={0x6, [0x548, 0x3, 0x5, 0x2, 0x200, 0x8001]}, 0x10) 16:06:58 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:58 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x80804) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000000c0)='./control/file0\x00') r3 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) getdents64(r3, &(0x7f0000000000)=""/188, 0xffffffff00000018) mkdirat(r3, &(0x7f0000fc3ff6)='./control\x00', 0x0) close(r1) 16:06:58 executing program 4: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000240)="2e2f636f6e74726f6cff05", 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0xb) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) 16:06:58 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x101, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0xc, 0x2, [@IFLA_IPTUN_PROTO={0x8, 0x9, 0x29}]}}}]}, 0x3c}, 0x1}, 0x0) r1 = shmget$private(0x0, 0x1000, 0xd4, &(0x7f0000fff000/0x1000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000000)=""/22) 16:06:58 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:58 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:58 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xffffffffffffffff, 0x40000, 0x0) 16:06:58 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:58 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:58 executing program 4: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="0180c200b200b42d87402e"], &(0x7f00000016c0)) r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x6, &(0x7f0000000040), 0x1be) r1 = semget(0x3, 0x5, 0x98) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x18000, 0x0) semctl$IPC_RMID(r1, 0x0, 0x0) 16:06:58 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:58 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 16:06:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-cast5-avx\x00'}, 0x58) r1 = accept4(r0, 0x0, &(0x7f0000000100)=0xffffffffffffff82, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x195) recvmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000080)=@sco, 0x80, &(0x7f0000000580)=[{&(0x7f0000000540)=""/15, 0xf}], 0x1}, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x101000, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, &(0x7f0000000180)) 16:06:58 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x2000000) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r3, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@local={0xac, 0x14, 0x14, 0xaa}, @rand_addr}, 0xc) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x62, &(0x7f00000001c0)={'filter\x00', 0x4}, 0x68) close(r3) dup3(r1, r2, 0x0) [ 291.169602] netlink: 'syz-executor3': attribute type 9 has an invalid length. [ 291.183379] netlink: 'syz-executor3': attribute type 9 has an invalid length. 16:06:59 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1a0ffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:59 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400001, 0x0) ioctl$KDSIGACCEPT(r0, 0x4b4e, 0x17) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x3, 0x688f, 0x6, 0x16, r0, 0xb1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000000000)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0xffffff97]}, 0x48) 16:06:59 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfse', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x700, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:59 executing program 5: shmget(0x1, 0x3000, 0x200, &(0x7f0000ffc000/0x3000)=nil) shmget(0x2, 0x4000, 0x54000020, &(0x7f0000ffc000/0x4000)=nil) shmget$private(0x0, 0x4000, 0x4, &(0x7f0000ffb000/0x4000)=nil) r0 = shmget$private(0x0, 0x4000, 0x2, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000fff000/0x1000)=nil, 0x6000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) uselib(&(0x7f00000001c0)='./file0\x00') remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 16:06:59 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000001c0)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000013000/0x2000)=nil, 0x2000}}) r1 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) close(r1) ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000200)=""/241) close(r0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000040)="44983bb758cc7e24") 16:06:59 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:59 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:59 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000100)) pwrite64(0xffffffffffffffff, &(0x7f0000000040)="5219259b66a1a1c88b30a3fb3aeb0d9bb7f586671d8cc2936b3f8b69595366bdd46041a4461e5d79889f3f253a64be6cd8e341cbabfc0f664228bd3c8db07b9dcdace71dfc4755292a3019e1d1e0794b6bf9a3041b903858c1dc940d3fa773bc2fed6167a0e66c46663472113d49ecc19dbd1f00ad8ccc057a2e20e296bd0218141f2f659dca2330c952300ed4", 0x8d, 0x0) ioctl(r0, 0xc1004110, &(0x7f00000000c0)) 16:06:59 executing program 0: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x10000, 0x0) ioctl$KVM_REINJECT_CONTROL(r2, 0xae71, &(0x7f0000000040)={0x8}) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0x2, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x98) getsockname$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000140)=0xd) close(r1) close(r0) 16:06:59 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x280000, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f00000001c0)={0x0, 0xef, "69c2e3b68abc5332e30ba84eda6428ac11838fb117d7e50c1e389db6a28fcdf7b3bc4c8b26117144004ce348ea6cc9e9e692b3d988a99dcaca19e42d23ba58d5d3bff92703bcf44c2fe44366aba72b21478be58b17e6517f65e8fff275475c805cb9616fd7a6ae47b05ff3f0bbbc81f4bd0e2c5351c2b82726dadc3b15f216f3f82e51870903f5b1b5eac5aee346592411701c8620425fc692519c82696613ca07d3a5975130fe9da389f2d7c49798d2571f7d74caee630582c9bc7a98db2a865f329206222d4cf7e96dd793b304e05187a1bcbf5b9381fe80c03dcf6d7e723421597dc841bf38ba69aeb2afc5150f"}, &(0x7f0000000040)=0xf7) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000002c0)={r1, 0x2d, "634dea25ccc06baf33ceef2a992e7f18f0823473cc7cfc752a34112d355ba65c350fa2b6dd31fcea285a372ce9"}, &(0x7f0000000300)=0x35) 16:06:59 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7209, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:06:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:59 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:06:59 executing program 3: ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xd157, 0x4000) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000140)="cdde9338bf678d8829a9060a74267565e80b7445dc99e1ec7bcfeef8b3b0202ce154e3bcd79a036542b6b11adf539901d2cff8361788d71613eeaba0a182e77b3d7ea6590980712907644a34506150e0dab0f80e2f16bae7c3d729796a9b7220dc27c7414811ec394fed8705184664eb82be0d28eb95b5e9b359c081eb09f8bd58a97579644219fb130ec474bda30a229475ae64f0fe6e3634dd454d536831445887ec3e463f818b34f32a9fc6a78721c00538c5eb3bdc5d6601f232c5e42f5b0c26fceaea8829d552f1c49e256b871e088c0f806071ed16b14d0bbe1463bf15de4537d16b5f37a02634977e") r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000ac5000)='./file0\x00', 0xa4002962) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x3) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) getdents(r2, &(0x7f0000000040), 0x0) 16:06:59 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000000)={'bcsh0\x00', 0x7}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x4080c0, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0xa400, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000140)=r2) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) 16:06:59 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000200)={r1, 0x3, 0xe5, "e8f3c8eda8eea7376e7fc0f1cf7b4d950de8d841fefaad0ee80a95024db2ed410588ebcc1b04fab36260db78c9bea56175cc6b8ba54571bed86ce32a7052319dc5d58969a2dfaa06c47b4c55d0a516b98de96641092192971d1d887c793200fed81eef04bcabbed33e1421eb18c464c631a93d9239a62a25a090ddeaebbaf33119e50de64bf2abb04bf8f92d5396e07527b8c3f1aba76bf8c710bc1bc84756ff18e174439d962f27640a4ff6fd5c09f930ef4c740fde8351c819c0cb0455258930a998d56e6cb7d9a3086a330ba02face4122f878bd750e12a3ea0b6d0d30fa737968b783c"}, 0xed) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 16:06:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:06:59 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:00 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:00 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/hwrng\x00', 0x8000, 0x0) r1 = open$dir(&(0x7f00000018c0)='./file0\x00', 0x80, 0x49) r2 = socket$inet6_dccp(0xa, 0x6, 0x0) r3 = signalfd(0xffffffffffffffff, &(0x7f0000001900)={0x84e}, 0x8) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001940)='/dev/hwrng\x00', 0x40000, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001980)='/dev/ppp\x00', 0x10000, 0x0) r6 = creat(&(0x7f00000019c0)='./file0\x00', 0x4) r7 = syz_open_dev$amidi(&(0x7f0000001a00)='/dev/amidi#\x00', 0x0, 0x0) r8 = socket(0x19, 0xa, 0x2) r9 = mq_open(&(0x7f0000001c80)='bdev\x00', 0x800, 0x100, &(0x7f0000001cc0)={0x9, 0x7, 0x7, 0x2, 0x0, 0x1f, 0x1, 0x10001}) r10 = syz_open_dev$mice(&(0x7f0000001d00)='/dev/input/mice\x00', 0x0, 0x400000) r11 = socket$bt_bnep(0x1f, 0x3, 0x4) r12 = epoll_create1(0x80000) r13 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r14 = syz_open_dev$sndtimer(&(0x7f0000001d40)='/dev/snd/timer\x00', 0x0, 0x480) r15 = socket(0xc, 0x7, 0x4) r16 = socket$can_bcm(0x1d, 0x2, 0x2) r17 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001d80)={0x0}, &(0x7f0000001dc0)=0xc) getresuid(&(0x7f0000001e00)=0x0, &(0x7f0000001e40), &(0x7f0000001e80)) lstat(&(0x7f0000001ec0)='./file0\x00', &(0x7f0000001f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r21 = timerfd_create(0x7, 0x80000) r22 = gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002640)={{{@in=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000002740)=0xe8) lstat(&(0x7f0000002780)='./file0\x00', &(0x7f00000027c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000002880)=[{&(0x7f0000000400)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000001740)=[{&(0x7f0000000480)="421b40bf6e1951befb7add", 0xb}, {&(0x7f00000004c0)="27f0917c9ce36b78f863654b51c3be56a2921106e02662e08041b27fdd3ff0f393020848fab736c1e87f602c2c46d38b4b0ef1438cba9c70bcde48eee7e95c9e473d258a6b98ba8fea108fc2d19bd8c03f90410649d2379b3567fbf2b68472697d411bf654dcca586984306c6e3349bbf5f311116070b77efa44fb26cf42a739511b10e8cefc651459496dbc267cb792d2e8775709d3d61bb3004fc6cd9deb2ee84cce0d", 0xa4}, {&(0x7f0000000580)="1d63932e4e343bf45b3bbdc863383e0a677e9f2e367211bb9ffac0df782a677b9d3098348c7b57914b3d037a6814ab709de37e55e79f6e7b3334958406de99c5484ffb48c52a530dfe7964993a69698205121801485b07b2ae883d65994b2c4579a3c7940ce2c594bd34326cbf0d87499dcaf3fec13bc7c63ecce3618c4210852c822a46e8f5ac4740418dd8fc8a15c07b0b1c72390556517bee5ddf2e11d56c58dacb88bc2422635643fc63", 0xac}, {&(0x7f0000000640)="45387ba5286fc8851767df8d125cfdacc116949794e539de6f81c40223431ac4269e1bed4a2b3485414e73af3789baac559b1aedd64d5789a34b8d6b4e8ae9722808bb61f1858c0e55878b938bb851b5e30c2604e9288ee8d2ffb49f275cc2f0296cf0675a9bf20d44f81f66510c3f1934023d540dec70ce080d27c491c7d78fbc524e89ed431ecb13194cf596a4c498ff465dd2a921a5450500bf1e22c8878c036984073e2640dcd1c49a7a81a8d8871e82dc948144c6f56e6992fe6184f0e595191de1592f0110e878e3990006846e5c050a4f38f8beb1c1dbb847007b2683ea6c30c9935abc133a01469a996db1c8", 0xf0}, {&(0x7f0000000740)="06d1e19942e8067c76ad8169224a5294db712c89843702a2077e338edfaad3b0b073088dbb1949d6bd81202362ddd223f715d94665161d5f7457042c8b147c5d5f036dab5860cc15dabebd28cc4766f10cd6cc1f3c3e7300e9d5a87314550be398a57180475ea92e47ca23cdbf9a871ba85c6ce41a456d456932e1425317ccf4c45aeb8a0861418db4155a631e9f8aec80389808124010af4679dfa2b0a58c2166a7d25a004447caac1fdd0dfcce6bd66210d2f9e772e3f02ea76af1d6aa3921cd17368c5b7bd12dff5843e4e1179186017cc2b7b7d8b10d6353dddaae57613349b515e5ab58a133b5e714691b30dff9e888a520982d2df50f4ecb065ac04932bb2b1258840f21397aaa33d4d61b4b10741fd329f54a9bb405b3131bb44e8fcb37a306396b49cbbfd63aeaf39b67f4717aa372cac982e087a2a0e3ac657362fea6215bc23b125e5da1022f01b6a0d4f8687b76a7b0afb14803389eeb39a1b4beccd85f88445fa1c943e638b764598d8688c0153a065fc589bc5a27207a80b01cb23c41a5c389c631488c75fc0779b5e8e10f851f1049afb43ceb9e150f733ba4da5786ef92b68c9e1a9503c914d8ae4783582d5f6955cbd35e37d72ec3dfdb92db4c3861e2ba72979055042ce1ff16298828b2299a9f74f194516582fe1619cfda0f683385bfe5d9d2f41ab46a6aaaafbc37f834b1be72ed284c8cd8011b773ccc92a94a659d2dec13311652935e29cd3afa52523556d4bbb4fb530c5cf59e28a5f6639a1f63b32db2673803014a68acac90d3074954c2af59d7406f62f86dfec1b39c317c8b5e98cfa21c093050e093c7397c17d57613a5f73b6fe1cac103dbc94915b88fb62c27f585a1c0358b369030f861e3bf4602a94776741862370a3efa914ed1544f35820adc7e8afe4ca4a7318c82a6bce0e83a884db8011083d614eb4ebadd80dc5f8972f9136b5d7665477ba676c32e05b67573c308181e1fbb46edf4d974bd1283139d810596c94afa83ee473153a64f00dbca72985844aef3db8474b3ba8adb2d2806efb483218802990773187b74966f2c52b296cb5af68c11578f92f978f8891e0d055a88a76df1d94c9e8c91bd498e5c947d22ecfdcc7ff7e47086adcd0783d314f7e03523ed7b9fa468ad1b72d17116808f41e75b627db262c2767e60ea8778976d415c9f41f2558667d3345ea9806de79ba976ca79829cbfd9920127f6b08d4f2b0f46fd16d277fa9d730a032a6a31db08a1560fc5566d343631cd2d8b06d8e3326a0f7f56a984e16d5c185434d7d823ee89e4fe604b4ac98d4ebeb81b3e8a3db84f6fa1e57b3f9062f66a8c322562c211e54d0d1234311fdb2ebb22d0cff95cac7b6c72aba64407032edfd3839b3f6dc5a280177a66adbf30edf4dc6c8048673f6ea0d2f996d5ea0994c304398f6a13a504c4f75d2dddf08e63aa3200348ac1567baba3083d0f6984eefb4e44cbe756e4341d6882ffcc2685ff6e4c2fe11eb199aa04ec14f6081f969a214d42f818257979de4b3dbd56af0d9b33db57aa430b9b44ac52061239e95bf6273dd2d8afc424464277167dbee830b239d28c95949ffeed3cd4f447bd96112cc857fbb26489a3386c3b9b3e776e5e37936eb6581d98130ca2a0777203fe083e7a22f03b5fb024a1cc08ec546a387e9fd8a3b2cda67b3ff7b934def3138445a42434ccc035c5ac9a1930a5c04589a51a8621b95a1ae763d11bd843a3652981bfee0124791770d0c4dda47ce9a1d556d4832e0805a61ceb50a0ccbb22973941d6aad4c5a7099620407f23a90e8224a5e714a063c302632710623a5da4a983675191b0e876a84eca6e99ca5f4f2b0442f9ac0ed15769695c7bfd676305ee1457d8a5bd4c0bab904af1eeb2e0f07a7dd25124fc7b6afe07dafd9b674ed6c5c9c78810ca4b84fdf5a1669ea3de1769c87b546f20c7f1e5b51eadedb068f0ca5c74c26f8260e82a11c2eaeb0954eb2b2d1dbffacfdbcfc75b6ad85c5ab73be2df1b79a964e0cdd9addafb68051d29d5c674869e65a968d3cdf180400efa42dbd20cb3fd812320b44124b5c233b67ab2ed1746cc1ae5591061d5f3972f031cbbe2fdb01db08bea362389bae1e12fb0d79b5b4fec7908fd5d49dbe044334d01cb0f326e29b705e12894a5cf4e011806eb2488ff8fc5134fe4c2e58fe2659fe89fe41a0f7447c5c5851349741e756f8ec484b22374617fe2d254c936e04471a3562e3321cc2faa11c52e0bdc9277cd11c51e014bb5123e9572eaffeac3e849b6da841196555e8ce57ea40c9ef5f8952bc7532c72bb10ffd54653714c0aa7e1ed80eeb777a3b3ebaf48cae93b1570b03516505ce20e9f637f9ac3bcc7d700005d0ac2c73e0d3cc7f4f540d5492499170deaef7b4f55010f23d874f1864d6e17571331bd9cc4713d592cf71434f8578cb82b0c8445858917b7c0b22f618ab67a7310c419df9ec8cd49e3b49a412e326e7a8a191a901fd409a98249302b5b585433afdfd9d571ddb568ae82eaa8e83087b83a49ae0a12dc84ac5c688c5f032df42b8a30c9ac345c864914915dfec08726e47144ffa0302da1e0ade9e5644d6218d4b84643a02498da9653a219a7db5d2e1279ad03b650d535502db07faca94d9a654b06f5ac207aba482b932b7e0e6cf6ccda806b2537b8218e49a5b56ed9529d3eae2fa4bd22a487a72410c20a1769f60cf1c3e86385750b5418a445e7a279759e496d2902a05baa0f0fe4b5ab7ab7f07adadd14ec3b88a6c6fbcf3e70b17270dcd6b2788b19a0860c1979db90292b85811f8e852cbc8c63230e4aa402e4604756159fcef4c8e67242c9839d1a6bdfa1a6a12e8313ae799794a54d8cf69be66e5159a693c3f5ffa1e2565d459830788229f92466783b1b4588369f022ab6e273638a46fcac8c35fd38ed801e4e93baa7a719a17695c71ab597aaea85f52ec3a4e1c76ef51d51bc17d70336a4c6457d13f06f1396301a2d9638e02e835dda295ff921ab1b2c6d56b65ee5d380cdadc154858ad306857233ca9f0b10220ee3ad5595b0f58fe06cfd7ea7a2921ad3e348e162c36052181ea28659fcee47a34f880d4d3a24e5b5932f86d0832481d85f708a3abd4bb8de15dff01dfa0fcf7893c36dcbffeb74694ac76d256a076e3368469d382f0324339c1876cc608ac6e5380a190670d70628e0a83babeef885ba7295955da77182dd932c660c05864a741b6b3cac69696c914f756d8cd57a97b08fb3f35841d4f5e8c50423795648e3920748d0955ab6c02be97874717f4ad4fa81429b9e6f0f8c8236a4edbdeb1ce2a8040d2eb86c3280145d9464994b442bb4289d3d2ffbe1ff14f15a659a213462ff1f99b0c2cf49e9070dcf9544bacad76c8e62e29943d0b62d08f10213c6723384faa2eddeb5547f3be1f87cdf31680fe3960992c6dab096c00d0edd2b9188f66835fc1c99a8070177b1f939dafc169522007d9b87fb3ddb358ac880b48102d02a26f9d6d541b3f7d959cf271cb0258ddde58990484b6b10ab216c56b6ca1f76478506854c67d4c047d723c09adc2295de4f2f160bc9583b8b9debfc544f34e02834e834dfcbd07323383e3b76f0ba31c52c0be516897d55a719f63b695c13ea4823ff90ca0ab95f0f884b113cf332d80dbe8ccaef24e0e37db74c9c83bc244cb85bc999b03d3d035469a8e6b74188374d87a6b4d0e6f0462e8ef52909e7d83ac79a96ee97d68ea5f514933cbcf766cc9377a1c3aae636c124235257cbe4bdf58d4e01c56cdf3f7c4263052aef93e4c1c63fa24906802cea4755978f27c9b65e3ea63beb5935d0cde77d25e5e162354f3ce648ec8cad3f371ba54731190980736f4c5f77bd331769488c4126668701d07dec7a7e60a94838690c236f332cd334718b3a1f403ddb4b7da9a014f849e5f35a90676848adbaeddfe95e7cbd8823c5e4675d7c5130af0dcebb24bc8079d10c4098bf23f12a84af8802295c3585bf33c4889ad6e501fde7a06f871ba670ca46538ec037c0cd2fedfb28fe1771c7ba181118d7933ac72a09c325f2f78a7c41dfbe4ef1274022c01b9781cfb4ec3d8cfd52b8c3521e39538196a4fc82fe837e88ca7b8dee2f6bcc776af9370c9304dbf9d4db47361d60a661ab9d97c4d716b8b876d0ea9f357c6bc2b3e651c3150c768dc5d46e5bb639014147dcb930db6bf56a86dbe46be63b35e4bf42e3c00715c4346ed6970abbd6964744ea3a8cebe4e0ec02d22ef8ba8de944723a8e55edd8ba86ca1fd95934b4298319628802a09b3cb6ca7b1d01f9f1d39b598b86cca581404e2956ad001150ae329ed9233979d31d46c56202e4788e0be598973bd83d8349fb32396e9464a4225d08582a450c5b139d184e19e2215011a9080cc53ee6c6e712cc5a140d9f948d76c51fe899f4935d9868402fe35d9302b6a7af224747be5c6913a682d1f21195e353d5bd45a5a66f51295e9edadc9c8ffb9a8de065de126ec6acc90b57f9e9cbdcffb60b7400c6dde9b761a5375bfe432419f7391b80fb62711340699adc737fc02b5bcc08059e44c3146c893e42a68030cf3d05c318b3a6bc041cc97b4175e02af8537f9fb86ee257ac109a41f1f297ba6a97410670a9d96e3b03989bd8fa0a2ba878657ee9d19981c56d69e0da619e70d9b1f2afcc57f97a5c06667736c9bebb187e71682edbd07c3572423aad5087c9d7e60a3d42f9478d9225d9c0178ff85471dabea1603f53c7e7adb8cf3eacdd8c6a2cc75d72e08f8428536e5a20fc9b8f52a920be87ccb941a234c35dba5a816d60249ba52118584200c5bd80130ca0d171cb6ba2c018cb9c02d2c973fc77c01ee57c31f2ca64da34dac43483dbda832f6b22a886d6a959c2556d01cb2528d7c704fece7c3cbadeee018ef4e0fe850707490cefc497c2db21bf0567a9bc9d8e1642fa10b846919b977cd8bea778952716d4cbbf0447963c7038920bf8e70eec4b24305f13a49367b633f447b8a298544258025c181c29614f3e25a2cd1744bcbe11fa3c7b8b5f5e5f5533c81f1adba2e64c93e2cd1bc1c1805541714db36cae7efefc3f797ef30f3f53cc7cfe104497ccb31273f62122e5495fc11e944e01d46b8e002fab7a1bc51ee7c106ed846730f6eef22f68f9ae965a004554684bf498f51bd975c63fc71be2975034d4ad688c2046835d14793f5f1ea402aa350f1ff13968aca4a9250a14fed670672e181ed4c9770fc23e4edd02f383f3a756d3ed848c3c30608f4cbdbb261c697aa160b29f9de6ed97c2109953462e31725173013baeb76c533783f32befc741d65aba5280e1ecff3fb55fb5e2c5f51ab39b430891c2a3b5319e16b65de83a43ea05e2b3eaeb012fa460d9817d1e17d92ca2b6e6bc6d3a911ddd147e9a7490a7c07f409605e719de024119cf2373cbde720ac69a0c71245256fa80c27ec59c1ebdb3c29397a7d17e9bf7e7614bbc4fed0e6ef0a7ff0264f518e3a0fa90204cf85cf68e592c7ce3f47e187d139c8b8b51a1e14e23d80aa8e0a2fcbff329f36167bd8b320ab0b1748c42a3a110445054d98ae2253432640751c1a00ec0cdf2447ec3c2c408736213264e04e878d1fbab8f40a6dbf5aa3ef53f6c341fde612a46f14dc7526f7cd6355cefe75b06fe5e5adfc734fbe220ffc18292b9da69db530becb1855e13d2ac7a220e13504e902dc291b5d2d17b71655e1ef2091a39e9bd89299e8e75c637fce44c3b07477078b3553c0f0f2eb97aeeead0ace01bb7707ead0cb92b27bded06792956b49ff09f597af7517c1cce", 0x1000}], 0x5}, {&(0x7f00000017c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000001880)=[{&(0x7f0000001840)}], 0x1, &(0x7f0000001a40)=[@rights={0x30, 0x1, 0x1, [r1, r2, r3, r4, r5, r6, r7]}, @rights={0x18, 0x1, 0x1, [r8]}], 0x48, 0x40000}, {&(0x7f0000001ac0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000001c40)=[{&(0x7f0000001b40)="c820ae97b9bdb27cc40d0cec993125a765e3b53962709a5998bceb6497b0aa232faf76e995ae8fb4749d880266831f970cf93a877f56b621c1a54f4c3a591ecc341d644c669e2ac0cef1a644e875205d40e61c2c6cb0307f717bf952732c45db88c40396951dd0dd6fc2cd5661db8292bc796efe9fb01f5e2c2c636ca572cd60d9a8cadf679b50510bcf9cb0994621dff6feb67a5bb9ff25c9f231b054966e826d54eea56efa42adfa58ac9ae1eb7c926bc1086d2f58dd395c97c3b224e8219d23b3a776da76066e060a3f32311c796189d9", 0xd2}], 0x1, &(0x7f0000001f80)=[@rights={0x38, 0x1, 0x1, [r9, r10, r11, r12, r13, r14, r15, r16, r17]}, @cred={0x20, 0x1, 0x2, r18, r19, r20}], 0x58, 0x20000000}, {&(0x7f0000002000)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000002580)=[{&(0x7f0000002080)="f8d088d01c2d378ec261f075e405d851e2cd18e46e3b6d2555c20a8b62a5bc40fe10e7c781e1b02738f8a1f95123238740020eb7392af930e8730385588e9a902a2d95a1d276caddcda2fbaa0951dbb3d39a85b1975cad2231871b3c1108601a84c92c4e3fd63c135301f0d2c7838ad5b787145bb4c2343f403a9dc9561bfe2506aba012cd9115ecb3f39fb8b5964826e34a608cbe88353c3a601f352cdb460d2c7dc426eac46be926235a45eb8393ec822e8c7667ebd32d4faef8767c1a50bbf10ab31f2892dfe7cc8bde6c7e9e1e6c2c1b498b2ab4e5768f8ce30f47d29897aa", 0xe1}, {&(0x7f0000002180)="8401268398d7f3df2e102b3b7e3c1b15a33470436244a91daa72a3dea8b035165fcf47383157abb70db797b4be45908032f34bdcae77580f7f2a59a260544950387b7a34a7add518c0ac234a0b8d39690593b6ff15749f97cbba2014c9cb29772f1479", 0x63}, {&(0x7f0000002200)="5d55243405ca0a94e39e5ada7d5a3acd7362bfcb87", 0x15}, {&(0x7f0000002240)="a90a3476074354d61b21d0373a9a3e34c4862a", 0x13}, {&(0x7f0000002280)="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", 0xfa}, {&(0x7f0000002380)}, {&(0x7f00000023c0)="18e542b17a2bde2b5c99e0567f33d46df1bedb6040b70093b5ee64475a93299408075f", 0x23}, {&(0x7f0000002400)="aa5dbd214c2b89b0385d6afd13856019b3a78dcbf7324163c28f4676ce39cb4c7bc4c5a6cb04cfa2f7d3eda0a5bc0120cc1450d361e33ec6455a320effc90d2f05a81b57d644d3d976c5be324f39b944c60ecd94de673b1b87f75613071b6b55102704643ee9961e413c1b367ab84ed32afa077304721b9d185a1f0a79e3d2b29caf94de31968ff97bce7264d97e601e6ccfb95ff28452af663da4aae027652f1a5c59c50f198a9cac27b1e303bc7bb91fefb3a7e45d7410297ed391cf826daba8989317081979ff95e7c56520a1bcc2f00514de6bb9e096f193e5", 0xdb}, {&(0x7f0000002500)="c2e46460553de403fd73c01f3fc75b946077592700f6eb08bd2a610d6c3e738574da75b457985f700e791025bca1c31c81714938ff81f12616361d93d6b8447a6ec02d8c166659537146ea6df6054dba2210e76d4cfb00400a3894292110e74fbd3b", 0x62}], 0x9, &(0x7f0000002840)=[@rights={0x18, 0x1, 0x1, [r21]}, @cred={0x20, 0x1, 0x2, r22, r23, r24}], 0x38, 0x24000000}], 0x4, 0x8000) r25 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r25, 0x10d, 0x2, &(0x7f000079bffc), &(0x7f0000000000)=0x4) fcntl$getownex(r25, 0x10, &(0x7f0000000040)={0x0, 0x0}) ioctl$sock_SIOCGPGRP(r25, 0x8904, &(0x7f0000000080)=0x0) r28 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x0, 0x8000) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r28, 0xc0a85322, &(0x7f0000000200)) kcmp(r26, r27, 0x1, r25, r25) accept4$nfc_llcp(r28, &(0x7f0000000300), &(0x7f0000000380)=0x60, 0x80800) timer_create(0x6, &(0x7f0000000100)={0x0, 0x37, 0x2, @tid=r26}, &(0x7f0000000140)=0x0) timer_gettime(r29, &(0x7f0000000180)) setsockopt$inet6_MRT6_ADD_MIF(r28, 0x29, 0xca, &(0x7f00000002c0)={0x326, 0x1, 0x6, 0x101, 0x101}, 0xc) ioctl$sock_inet_SIOCGIFDSTADDR(r25, 0x8917, &(0x7f00000000c0)={'veth1\x00', {0x2, 0x4e23, @loopback=0x7f000001}}) 16:07:00 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000080)={0x2, 0x5, 0x40, {0x0, 0x989680}, 0x9, 0x6}) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r2, 0xffffffffffffff7f) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x400, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x0, 0xfff}, &(0x7f0000000380)=0x98) 16:07:00 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000001580)='/dev/audio\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000015c0)={0x1, [0x1]}, &(0x7f0000001600)=0x6) 16:07:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffff97, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:00 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:00 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:00 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 16:07:00 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:00 executing program 4: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000001580)='/dev/audio\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000015c0)={0x1, [0x1]}, &(0x7f0000001600)=0x6) 16:07:00 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff5, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:00 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x22000, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000040)={0x3ff, 0xf6, 0x9}) 16:07:00 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\b', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x0, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:00 executing program 4: r0 = socket(0xa, 0x2, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) mbind(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3, &(0x7f0000000040)=0x42, 0x9, 0x0) sendmsg(r0, &(0x7f0000000700)={&(0x7f00000005c0)=@in6={0xa, 0x4e24}, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000001000)}, 0x0) 16:07:01 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dsp\x00', 0x40180, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x4e23, @multicast1=0xe0000001}}, 0x7, 0x2, 0xfff, "7b2620571053da1affbd2cbabc93202db3968df6414928f02c8f554d622bb9975fb4bedf5526d42ffcb6f04ab773cf6ce4212f64e5ed92501c8bb76cf6a86132e942d920ea2ebbaf6121c6c8f3ce28d8"}, 0xd8) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x1, 0x4) ioctl$VT_ACTIVATE(r0, 0x5606, 0xffff) r1 = socket$inet6_udp(0xa, 0x2, 0x0) unshare(0x40000000) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) socketpair(0x1, 0xb, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_LAPIC(r3, 0x8400ae8e, &(0x7f0000000040)={"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"}) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000580)={0x1, {{0x2, 0x4e22}}, {{0x2, 0x4e22}}}, 0x108) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r4, 0x111, 0x1, 0x7ff, 0x4) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000006c0)={0x0, 0x80000000, 0x30, 0x6, 0x7000000}, &(0x7f0000000700)=0x18) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000740)={r5, 0x5b, "c82b90eeec1203157c78bcaeb49b7b0bc764c73f83f5d7ffd583cc1d96dccdc754358b5bb3c4568338f80e5ee7e3a88c340586530c2048ad1816a05f439ddd7b33d06106e2aca82aa16309f74e10dafa181ecb43c8ca4431e474b4"}, &(0x7f00000007c0)=0x63) [ 293.776048] IPVS: ftp: loaded support on port[0] = 21 [ 293.812465] IPVS: ftp: loaded support on port[0] = 21 16:07:01 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = accept4(r0, &(0x7f0000000180)=@in6={0x0, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x80, 0x80000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e22, 0x80, @empty, 0x6}}, 0x5, 0xbfe, 0x100, 0x5, 0xfe00}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000380)={r2, 0x4}, &(0x7f00000003c0)=0x8) setrlimit(0x0, &(0x7f0000000000)) timer_create(0x1, &(0x7f0000000540)={0x0, 0xd, 0x6, @thr={&(0x7f0000000400)="ca60a53406c5adfd29777a48f55b8894af4608151eaf1596026db16afa", &(0x7f0000000440)="d0a93afc5c7cf2bf1577f0b65555cb714c5f4acbe0c011655745d6b04f70fe5f837e5c315a6d1b62a827d63f4fede36faa5e388dde5c79f3699d18a5024293762eb67f0c95ec8c48a849b1685df18901107f1a21f40ff971403be21a68bd3d353cb0388636cf3db451616c4159455024fcbd9a72ff95cd472accef6a0e84f1694bcf626620c50beedca3ee6d5656604c0cc252cf618ef826f763c12eeac138b445663ad25632b4ae266d02ba449763154a672b2511c5877dd2ea4f2e34373242a6be3e94df631d87f115"}}, &(0x7f0000000580)=0x0) timer_gettime(r3, &(0x7f00000005c0)) chdir(&(0x7f0000000140)='./file0\x00') clone(0x0, &(0x7f0000001340), &(0x7f0000000100), &(0x7f0000000080), &(0x7f0000000140)) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)) r4 = syz_open_dev$vcsn(&(0x7f0000000600)='/dev/vcs#\x00', 0x9, 0x10000) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r4, 0x80045530, &(0x7f0000000640)=""/145) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000040)=[{0x7, 0xba3}, {0xf, 0x3}], 0x2) 16:07:01 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:01 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cryptd(ctr-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000140)={0x0}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffff9c, 0x84, 0x71, &(0x7f0000000240)={0x0, 0x5}, &(0x7f0000000280)=0x8) r4 = fcntl$getown(r0, 0x9) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f00000003c0)=r4) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000002c0)={r2, 0x7, 0x1, 0x1, 0x8, 0x1f, 0x0, 0x687, {r3, @in={{0x2, 0x4e21, @rand_addr=0x6}}, 0x2, 0x4, 0xfffffffffffffffb, 0x5, 0x5}}, &(0x7f0000000380)=0xb0) recvmsg(r1, &(0x7f0000000100)={&(0x7f0000000180)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000040)=[{&(0x7f00000016c0)=""/209, 0x20001791}], 0x1, &(0x7f00000017c0)=""/201, 0xc9}, 0x0) 16:07:01 executing program 5: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)="1800"}, 0x10) write$P9_RREADLINK(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="10000000000000000000000000000000e7687f2aad75a7956c19db0d69e12d3864dd205b413ad6ef32b290ca1e1afed102a04b60eee91898d15a1560b1922323d29a531e0d9d57372831717f32f0923d3335ce125e2671f9afe3942f1ef23d7290ce02ca1889f8fd07b8ded0b7efea63507a5fe437a85da4946f7d584437356b7856cb888aace064da2e183eb247016eacfef4287ffdd2e0014c018477fe57b6c66ea6d6a76d070f32fc331536d34c42999f6f31d79fbf9fe9d6d93f504909842586926dbb33544f7124e9382eb156ade8eefeef5c1b41dbf33257ea6fa29e76"], 0x10) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) 16:07:01 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:01 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x3) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000040)=0xfffffffffffffff9, 0x2) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={0x0, 0x7fff}, 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0x4ee) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7, @loopback={0x0, 0x1}, 0x8}, {0xa, 0x4e24, 0x7f, @remote={0xfe, 0x80, [], 0xbb}, 0x8}, r3, 0xab}}, 0x48) getsockopt$inet_udp_int(r0, 0x11, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) mount$9p_xen(&(0x7f0000000300)=')vmnet1&(\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x288040, &(0x7f00000003c0)={'trans=xen,', {[{@debug={'debug', 0x3d, 0x10000}, 0x2c}]}}) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000002c0)={0x0, 0xe70013c}, 0x8) bind$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) 16:07:01 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000002ff0)={0x1d}, 0xb) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f00000000c0)={@rand_addr=0x3}, 0x8) sendmsg$key(r0, &(0x7f0000cbe000)={0x0, 0x0, &(0x7f0000005ff0)={&(0x7f0000000000)={0x5, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@dev={0xfe, 0x80}, 0x0, 0x0, 0x4}, @sadb_x_filter={0x5, 0x1a, @in6=@local={0xfe, 0x80, [], 0xffffffffffffffff}, @in6=@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, @sadb_x_nat_t_port={0x1}]}, 0x68}, 0x1}, 0x0) 16:07:01 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f00000003c0)={0x0, 0x8, 0x7, 0x8, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}, {}]}) clone(0xfffffffffffffffc, &(0x7f0000000640), &(0x7f0000000440), &(0x7f0000000040), &(0x7f0000000640)="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") wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 16:07:01 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:01 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:01 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:01 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash-clmulni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="0adb0900000000fcffffff3a8426ffffffffb6", 0xfffffe93) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000f00)=[{0x0, 0x0, &(0x7f0000000e40), 0x0, &(0x7f0000000e80)}], 0x1, 0xc000) accept4$inet(r1, 0x0, &(0x7f00000000c0), 0x0) 16:07:02 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x3, &(0x7f0000000000)=0x0) close(r0) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x4, 0x2000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x8000, 0x1000, 0x1, 0x2, r2, 0x100000001}, 0x2c) socket$inet(0x2, 0x200000000000006, 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140)}]) 16:07:02 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f0000000340)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x101000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000300)=0x7fffffff) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @broadcast=0xffffffff}}}, &(0x7f0000000040)=0x84) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=r1, @ANYBLOB="ff0f0000000200ffff3700f9ff020007fff20000"], &(0x7f00000002c0)=0x18) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 16:07:02 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x972, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:02 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)="6274726673a0", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:02 executing program 3: r0 = memfd_create(&(0x7f0000049000)='\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x2) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) write$sndseq(r0, &(0x7f0000042f70)=[{0x26, 0x0, 0x0, 0x0, @tick, {}, {0xf401}, @addr}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}], 0xffffffbd) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, &(0x7f0000000000)=0x14, 0x4) 16:07:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:02 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0x40008001}, 0x1c) bind$inet6(r1, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60d8652b00140600fe8000000000000000000000000000aafe8000000000000000000000000000aa00004e20", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB='\x00'], &(0x7f00000002c0)) 16:07:02 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x801, 0x0) write$P9_RAUTH(r0, &(0x7f0000000040)={0x14, 0x67, 0x2, {0x0, 0x2, 0x1}}, 0x14) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 16:07:02 executing program 4: r0 = socket$inet6(0xa, 0x1000000000001, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x3, 0x6) r2 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x7, 0x0) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x6}, 0x2c) getsockopt$inet_mreqsrc(r1, 0x0, 0x8000000000000053, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000040)=0xc) 16:07:02 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf5ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:02 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='coredump_filter\x00') sendfile(r0, r1, &(0x7f0000000000)=0xffffffffffffffff, 0x0) 16:07:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x4b9180c11688253a, 0x8) connect$llc(r0, &(0x7f00000001c0)={0x1a, 0x1, 0xa979, 0x492, 0x2, 0x2, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000c26fec)={0x1, 0x2, 0xff, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001100)={r1, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000300)={r1, &(0x7f00000002c0)}, 0x10) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000040)=0x2) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x400001e5) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000200)={0x0, 0x6, 0x1, 0x200, 0x5}) mkdir(&(0x7f0000000240)='./file0\x00', 0x40) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000480)={r2, &(0x7f0000001140)="d6542c66783c807be3a6b4346aded1b0c36fd127442190bcf27ab4dcd8f4e60926232d20b7be6c61fe3ad797dc4876775124d6d5f6722e7f142f198f51752a92339108663dd372a61a8d96b6074124de2c355ad64e0645aa4fc0866c7c6e7901d7f34dc4074239abfb490be0f105f296c86e4eb50be76bc679ee8a0c41e2428ea4555bb01f844502e41a8d04a3f3619f2659b995c54ae365f37283be67fc50dee72d6ab4c7675e9ca1fa4abc0f75f765d535ce7d8efc8d2b26b35c73c1ab53d7f2b7abbcbcde8fca653e1e88207537de76f2d8d4d42ca87066511132cfe3f89040760899923d333f04fe4b50857d0b3f0111390331bf7160e0de940bc90550cc082da8838902d4b2395bc7abc7deff1de060c4a7f02877c224789e605c1232fccc4abf71b7a20347f0f7255641c008ad38ad0c1064baf12344e7fa20550f02eca2181e727b2c9d30db1e23d2f9a538898b04b6913ac06a29c446fe38f49eebf77bbc726480812f101944a226a2cefd6ba2087349c7e5a2801a950500398468cd20682ef465ad4ed9800c079e7f0219ef5d23f3081705acefd5ba0417c082a700f1940a0e3db725cee11729aced10532b8c99e04db781e30da636535f15587fc17697dd83b84a1ce7d88f71bc5ce23c4bdf81412d55a98832cc43d0a6753a1d4b51e8b8b2178c5ecaedba1ba484a306e06d49e24153e59ba4d6f6bedc763d50c743051cca7c17b638b49d345e8c066a393ac25ff3bab9b5a65b9ae812a11e325b51a9b000d4a27895206892e56124f6cfaf15de8724ca7870d507fab991fff94289d058712c2ee3a34c820470d2fc2974aad653edca197e3042c403a958be2a0fdeb76b2fcdbb3b4dcf797a6817c64eae664de3b786113e228acd207a1b89d8238ed0282b083347a1bbf22ce148b0fbbaf1f63e2566942c6308999b5914a9954c80668a31dc89abc77c6c710c59e560d3364c6b58158262758f6784a51a66122b1eda5ee78ff12dde57b216456507ee4730c54ce96a241096d6639cb39e9f70e0a13b3261b19bab6d4c59477399d7da43a50b7e7efcfaf1513c717882a0d481ee0ed8fea9a8b1813c9f21b3ce526ea325fd1183aac60943dceb1111f50adfde5cf1e67e1bd24a831ae579230887d8fda94e297e842d7c13dee7319a62c959b43746b7ae70c4580a7c6f20577f369c3ffa53c3d489309e8fc481e18ecd7623c831a1525addf09ecbb88c0970cb8758dc0a6fa25f5b58457d60c66ed9d77b49c21bf826be9b5a89592e19b024623b233611d19be18de5fa578b88b61281f04b9c9ed20f69b95104c407812b6c94fe4c32215137f8c4f146b2700d7aa466aa44dcdb90a8b0ebda45937cb9328e267317d1b533922425cd327247735db250c9cdd50faf5eb9b297b8fd90a2dd021bb6b88ece04954349675d8a8128517108f541d8ccd8af1abc3522c8d269651d6593f4000e87ee25b62b8bbf2873f380c926d12f1abddb943bf5e3f11c6c5dcd6ed8462bbdde3313d4c55a7c4f5db51f9943a5244f9106db95118b46009802d51e06cf3a228028f8025660fde0732dfdcdbd876483006f8e50a1e6d64361b63f1bd3e15d03f400451496a6452652751b11eabab42db320a334fed0db9ec859543bfb71197230d7ade366d2fa2e361469b5623465c0e1290c0ebcc99da30e8d26e57e19bf467526fd34d2d03507cc85d4c553295b10d9bc67c57f2d9482e988e3bb2cf8f24328746036fd18671d49daada9b04c3b60865cbd2c5914d32d39a03efb01c588c606ee841f47c41c062a3e3716c44b050f348ec61fd2132507ed995dcaed56150e1843082f3e9797583aed0a37cca51f1fe8e6d5b5a7586a17db8a38e6d015195fdf0ac4fe600579c77f08116c0d4827ccf91094c56f70c8c9a9a529b9701ee9ca5a0f84d88f02dd8372118476f387bd48fa7ed2a1b4d89d9c0127fb4f3c61ad6194841a555ae4c3c25473ab49fab13e4ee9731c175f1ac02aa0767ea3e9e763025632a4d0b112aec2cf63bb1d94afa85f29df47713b704f6a4f8d949f52a22fb984b5b33dac4b8d1f849c5a9d08464b6099cf03eed29e88c1103d505c1e2f33cbb33818c00bfd8d5af0c35f5f05ef14eb69e710bac0564681cd6e3ce8cce75d0cfc67eaa326b0a05ce34c222f469d635ad66fa7d5240ccc9d3296d23663f76d57472c52b765858332829200080eca32a5b7c82fe275d213508ac8137e4f9e5b53b20d0ba3e719a0dd748ddb02b4a524c9be99bd5cb75d961ca58223c7259c172b623c59fb23faf2f01a1aad1ffb49eac27974cbbafa58d546e88f77186af39645371f34fe2d7401108f82f021216b7c6a3d29bf0f384b012f2022e18490266f1c82fd47e172dc6a1ee0c00fc1480e37f50932c7b55cf81247c4a481c1edcfd1288822e29dd23851c2974d5b5226b725302813055524838eefd5c3b82d7e664a3f61dfe49a9417c5db362c4e3b16d25ce7eb566d1690e69c56b345fe5bd01e6144c216cb768dbb857d9537239f1d32a83f360875a66cc453aee90a31a04806e4d881d4a47aa659139823075c265fbf074613aef2d2e5f9076cbb654e2c01010d5b1917ff2dfadcef5d2b3772c4cb8afee1af6f3964b8bb47d97db388dcc73c6c2ab742b90420d464c15add98e8132aab4cb9285c2c0e4801df8a78e49b761057020682a40a5292b01033f3c743bd8a137f2b0cd5db57978cdc9bc868c1363acb5c7502282014b2138037318feecdb7f3682d16c2b7523ba513c4097a80df32d891058e0b56b8397b8458491b7549aa18cba75bc496756fd552e9929d97b3d419b9b442685f3ae745e362810db2dfbdb434b27ef743b454426651b4d038227ad5b31990261e283fa86bb96f62930a797d8b24098807e6dc25d40a29d676414ceb2cf4e94622f2f9e3d84b44a73ae794677ea885c276192e1a24d573637a55928bbb7e2b6ffdd07254f82f1ac4531c15ec774329d1c084415dbdcc67203fab2997fa499a13601558182b259fe2cf7a2b97439a5f18dd10ec7197582d13fbdf8081f3780be0c2b1927a84728a80f365a8b60ecb356519dc66e23bd9477216e119ddc58c37b0bcf5f775006976ca1d665a0389f5325ee07dabceb8025bf9b48be4e255a58712e5b1442bbf2d722975c9caf45206d14805ae8d7f6314d0618568dff04febdb59f10b778065d5dab3be03303e56e37452a0ab3b16660643059ed94fd93631fa606a1f1e732226617619465a6fdfe6e04683163b876d103b304f62dca106ae06a75a40379fbc22667cfd2d667d143ffa3e6aa580e8b99b037226a031d3c95e8c1f568ede0a505124af7a4db27a7611ec42ffe46cc9083d2e7695717e5aaf8d0f9f5f7b09bef3f5f0073d715368cd03bf417f2568060235573f2bd55f0418173ed9be362385959eb45373bae7c695a26bdec5bbb9ff36e9c0b781f47304cf26cb6360f6ccc40d734b0b3da1e0fa8d35c69c68773cd1f2b4f2529159d384bacbae367eb4e26c29969b440cde37309b7d01b4212eb324b637120d9f8620ccfad5abdb9b975f9eb357db131f107b5f1b5cc1b7b18997531b2d3e9beaf8ce8cb4580b946652bebc4e979532d255ccb7074df4b1b3a5c532372ca1e1554b1feb746df137febc91c0dfb72bb07afa7aa84861729d1dc9168a894fbffd30d146203157a85a7951eb644a3aa9b651e35565864855d0d4abd1455c05215cd2f422669307380a6b3f8dd78277a0c1800eef097eb91616863ba0dec91dcb66488a5c805cb749e1337808405146dd9226bf3cddac9ddab5f3ed50485a08022ea90645a245c11169ae3810b12f51ae13d496e0ea48f9f88be7a2548a9075938ab76638db44274826b1c09068f79296c1cdbdf1171e19e48c466b2679c456aa97238c602aa9a75ec366b3a9379641b80573483c2f98303ac4b8017a9a77fbc9f2f538ed41eb520c7daca9fe98bd92f85b0245fc5781e6b6eb12122177bfaa9049bdb737225d8e60da63f7d1845fa95516ab1f3f71f245b6f6e68c3cf5d4b018b11959eac99424ba64a994497b5f63037d0160109c03a5a94806b468516a8e40478fa1bd8c9780a8bfeff21ef36bbd7b3aa32c63014c744dbb21a7c6fae8bea7f0235db0f5b885607056bddb5d002f99c994af0770c057f6b486b461c1dc55b804325893063b38bd3044d1f8a1997fb87c7b5b80bcb43103104d1b0118ee5dc7438552f0907857995706f061487f807cd1fb0bce06df0369c74b1ac7929d4fd2c1972cc1092f5df3a2c26af0bb1878a91d520a53f5cc1486237f1fb2df2156f939f9e64d0c5563939bbb85c5880dc2060693d6337b76b1ef74f5e97bf14cafe589b4d5c9b623301c35a0f47e4a0e5aee9d28f5e8d3a05f428108171c87bc71b7f59dcbec39469e21518e452af04cb0c337c195b9062555db6cee40e865a99efeed76cfecc4f50f39109bc470b7e800c0139c5c58c4da8b325b64b52556200c9fd185c218d76f3dab4b78b367a6b1136e22ea9d05f8562b237e3a6c4864acbf2dc99bdbcf39c768b16f067218abfc860b0ae788bd194e910991dc151754a7badb8a719ec114c4ec3c6f50dbf3848f8f1e4852745b6f498e6d1f93a7cf2a654be7c55b588b2bbe29e49c40545b19d87be1f980d4096da70912e69013b24bc41aa7532497ad99b6de7e355c8fd0e230d069cdd0dad195054def7a3d0f1056fea14dbe6dccb177a2bed8a03585517283e371b246a5ede8d007bc63a1c66e43a0b8f1112a8820917bfe22a835b14fb2c975772a3dd9fb85698163d95309e0a1eb15a2b970afd6a45931d28815edd9a5f7a1f9003272266dababfb4c22bc3c2f6279497ecad47eb6533a6695533539840075234af1c4340a1d253492d7b5a83c56cac5877bd5679a1c118fcc1384e8a8c8b03d2e29ac78d2de71b1b7236fc3833a3ccd9baba515559af650f984fb09821222f57fb6d4a00e8811a85e1616d6db42377f41a5026a14f5a9fec4dd6e05d05aff157b7463c94c82b4dd6b51a116386e917f145113da45a6653a56b888b54cca7c9723afa45461cabaefcc505ea8bf3ff714ef1fc16a49ec9fa5f66b9e578fd67b7248c93cd2917a0c8524bafc17efc256a409de08af1c46c3aa7ece918286bc4ad5431c7d7deca60122a2c8e8907109c2ae70118be551e9fd1c1e5f1991ee64f21c368fa32a4c5648a6c87291de2555dd2aadd6fc284a9dc8e19b40a1074b8a50167273b3a81e1595bb6eac6fbdf6f6b76bc116defe7aa83e76c2d802a5f5ec1a02871d35db8ceff87e7e0dfbe99146c69db3fd15706de218814c7c9426ac83fa506af7046aefe1cc52b5aea951298fb2f47a42ceac0f4b345d20117ebc88efb05969dfabfac03f1828383126d2b29087c8b056449c91b43424e4dd694d13be799c679d0f2d28d6aff6166bcfdd5c06a60609c271b8194d07293fa743e2374f5d4066637b30b3d75abf389e3ac9bddbbe40cea1546790ba5fa8c5791616f06ba34f25dde875572558aa3b9281dd46a1649df9dbc91634cb24367e3299cac14173907f4be220eb9fd877592e6f6f8f90b1b08a02411acd0a2fe8dc4dc4036209c68f7153c3e5f8515a2b8262afe4a7037c6241fa9344241c383ef120fb22866b6de2a89a126368fb0b18cacbb9a3900a8fd37236f3d934bec280946be6a1e1323fc7d02524831c18dd64a309b9c48826cd781b3f75bbbd294762a6ebe72e529fb3fde63f76d9c9347fc635d5b9ba1252b438d53e464517d2cfe53bbc19ce9a62cdb6f25cce167b02", &(0x7f0000000380)="4853a1ed874f8c15480db264c71f27a87b117452f07ffb25bddd627f402af66540557d1e246ece9fe568cd90255dd61e9da6a30a23bcf039b5326aa1ea4598cbf967904e8482eab8a039b82d1cbc5fae63c348cda7c339884c9e302be1eebaf087dcda5809b95562af40b62c0d8a44cee2f886ff460a03f97ac6d5d394d99054a3d865b3c6b8aecf6d7903df2bbcfcd9fa14e436a1f2d9c07fbe7880eb263fdb06d9b06d2b491adef43480634d65172a77e35da7078227c563166140307c658af3254a0cf6be5ded9dcd4e6e21e4fa78a54510044fd93c3feccee894d053e5b50e15a9de240a0a7413c43ef0"}, 0x20) ioctl$KVM_NMI(r2, 0xae9a) write$binfmt_script(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="23216d643573756d2d776c616e302720205d272573656c696e7578fe706f7369785f61636c5f616363ba535e7196f2bf9126b8d3bc036573734020776c616e302e5b292d252c6d696d655f747970656b657972696e67925c6264657670707031766d6e6574300af7c85dd85450fe75802d2e91be3981e9d081c9d75d6c87e78406b52d6bcdac8fc2e25879585a8a6f7b8aaf3b41a894f8ab27a8532a1c874fa0905de2b63404aba264e813c62e87e8e2450233b6e2e8bf49bd32b9752ac6f99ca5352b015b09f3b96a53c35ff8d12588d48296b61e2b71a13d96a9d29c6e3c35528ef2a13172fc02de60466f9a000000000000000000"], 0xff) socket$inet(0x2, 0x800, 0x6) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000280)={0x0, 0x401}, &(0x7f00000002c0)=0xc) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340)={r3}, 0x8) 16:07:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:02 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfbffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:02 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000)={0x0, 0xfffffffffffffffb}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000001c0)=r1, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000200)={'team0\x00', 0x0}) bind$xdp(r0, &(0x7f0000000240)={0x2c, 0x4, r2, 0xc, r0}, 0x10) 16:07:02 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000100)="025cc83d6d345f8f762070") r1 = epoll_create1(0x0) fcntl$lock(r1, 0x7, &(0x7f0000000000)={0x1, 0x0, 0x200000000000}) fcntl$lock(r1, 0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x8}) fcntl$lock(r1, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x4005d50, 0x2}) fcntl$lock(r1, 0x6, &(0x7f00000000c0)={0x2, 0x0, 0x3}) 16:07:02 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:03 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)="6274726673fe", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x972, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:03 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 16:07:03 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000240)=ANY=[]) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e24, 0x3e9d, @remote={0xfe, 0x80, [], 0xbb}, 0x2}, @in6={0xa, 0x4e21, 0x81, @loopback={0x0, 0x1}, 0x8}, @in6={0xa, 0x4e24, 0x4, @mcast2={0xff, 0x2, [], 0x1}, 0x3}, @in6={0xa, 0x4e22, 0x8000, @mcast2={0xff, 0x2, [], 0x1}, 0xd47}, @in6={0xa, 0x4e20, 0x91, @mcast1={0xff, 0x1, [], 0x1}, 0x5}, @in={0x2, 0x4e23, @multicast1=0xe0000001}, @in={0x2, 0x4e23, @multicast1=0xe0000001}], 0xac) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0xc0185879, &(0x7f0000000000)={0x0, 0x0, 0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}) 16:07:03 executing program 3: sched_setaffinity(0x0, 0x8, &(0x7f0000000480)=0x5) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1}, 0x0, 0x0, r0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000480)) read$FUSE(r1, &(0x7f0000001000), 0x1000) read$FUSE(r1, &(0x7f00000020c0), 0x1000) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x20400, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r2, 0x11, 0x1, &(0x7f0000000180)=""/249, &(0x7f0000000080)=0xf9) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_DIRENT(r1, &(0x7f0000000500)={0x90, 0x0, 0x2, [{0x1, 0x0, 0xb, 0x0, 'em1nodevem1'}, {0x0, 0x0, 0x1, 0x0, ','}, {0x0, 0x0, 0x1c, 0x0, "2b73797374656dcc6370757365746367726f7570246367726f757015"}]}, 0x90) 16:07:03 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000040)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/zero\x00', 0x44000, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000cc0)={0x18, 0xfffffffffffffffe, 0x7, {0x1f}}, 0x18) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000140)=ANY=[@ANYBLOB="02000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000c40)={0x1000, 0x16000}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x7, 0x101, 0x19, 0x7, 0x9}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000180)={r4, 0x1}, &(0x7f00000001c0)=0x8) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000001780)) write$binfmt_aout(r0, &(0x7f0000000200)={{0x0, 0x8, 0xfffffffffffffff7, 0x1e7, 0x28, 0x7, 0x75, 0xffffffff}, "35237ed069550ce164663095cae4c94ae2e00fd08cb333ce99f9c68a4b28", [[], [], [], [], [], [], [], [], [], []]}, 0xa3e) 16:07:03 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1a0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 295.735788] FAT-fs (loop4): bogus number of reserved sectors [ 295.741688] FAT-fs (loop4): Can't find a valid FAT filesystem 16:07:03 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:03 executing program 3: r0 = socket$inet6(0xa, 0x4, 0x44) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x100800, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40096100, 0x2) 16:07:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:03 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x9, 0x400000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x149, @mcast2={0xff, 0x2, [], 0x1}}, {0xa, 0x4e21, 0x2, @mcast2={0xff, 0x2, [], 0x1}, 0x9}, r1, 0x8}}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0xe3, 0x1, 0x200000000000}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000106451554028000000009500000000000000a7de930b800a1badaa91471a49b6371d782a3d3c87486d9edd77670e11e9fb47413c3b0dbe207b1e39eb723fa16c678da0057c3e5d8a6ee28227f9020200e946418abcb373c42ec376e85f3b443742ff08d1af626e54e596bdaeda889eb5b82216bd464a1bc109912ccf"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0x3bc, &(0x7f00001a7f05)=""/251}, 0x2e) 16:07:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:03 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) sched_getattr(r0, &(0x7f0000000040), 0x30, 0x0) getpgrp(r0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) ftruncate(r1, 0x400) 16:07:03 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:03 executing program 4: r0 = socket$nl_xfrm(0xa, 0x5, 0x84) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x200, 0x0) ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f0000000080)) setsockopt$packet_int(r1, 0x107, 0x2000004000009, &(0x7f00000000c0)=0x8, 0xffffffffffffff7c) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x29, 0x48, &(0x7f0000000040)=0x402, 0x4) [ 295.905024] FAT-fs (loop4): bogus number of reserved sectors [ 295.911150] FAT-fs (loop4): Can't find a valid FAT filesystem 16:07:03 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$packet(0x11, 0x2, 0x300) fcntl$notify(r0, 0x402, 0x1c) getsockopt$packet_int(r1, 0x107, 0xb, &(0x7f0000000000), &(0x7f00000003c0)=0x4) 16:07:03 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 296.101149] QAT: failed to copy from user cfg_data. 16:07:03 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000000c0), 0x0) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg(r2, &(0x7f00000031c0)=[{{&(0x7f0000000140)=@can={0x1d}, 0x80, &(0x7f0000000780)=[{&(0x7f00000006c0)="14", 0x1}], 0x1, &(0x7f0000003640)=ANY=[]}}], 0x1, 0x48015) sendmmsg(r2, &(0x7f0000006fc0)=[{{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000740)="e3", 0x1}], 0x1}}, {{&(0x7f0000006800)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa}}}, 0x80, &(0x7f0000006f40)=[{&(0x7f0000006e40)}], 0x1}}], 0x2, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x4802, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f00000000c0)={0x4, 0x6, 0x0, 0x937, 0x2}, 0x14) 16:07:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:03 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @host=0x2}, 0x10) r1 = memfd_create(&(0x7f0000000040)='+security]bdev@vboxnet1systemlo\x00', 0x3) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000080)=0x1) 16:07:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000002000)="24000000100007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000001100ffffba16a0aa1c0009b356da5a80d18bec4c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1000000000000297, 0x0, 0xfffffecc}, 0x0) 16:07:03 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x0, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:03 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x20000000, &(0x7f0000000140)="c27d467f0759cf25a4b477c91280571da0197002c2a847df09000000", &(0x7f0000000080), &(0x7f00000001c0), &(0x7f0000000100)) r0 = getpid() wait4(r0, &(0x7f0000000040), 0x0, &(0x7f0000000280)) r1 = socket(0x1a, 0x0, 0x86) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000000)=0x2, 0x4) remap_file_pages(&(0x7f0000ff4000/0xc000)=nil, 0xc000, 0xfffffffffffffffa, 0x0, 0x4000000000000000) 16:07:03 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:03 executing program 3: r0 = socket(0xa, 0x3, 0x39) sendto$unix(r0, &(0x7f0000000cc0), 0xe0, 0x0, &(0x7f0000000d00)=@abs, 0x6e) recvmsg$kcm(r0, &(0x7f0000000740)={&(0x7f0000000340)=@vsock={0x0, 0x0, 0x0, @my}, 0x80, &(0x7f0000000440), 0x0, &(0x7f0000000940)=""/242, 0xf2}, 0x0) ioctl$sock_bt(r0, 0x8906, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000000)={0x0, 0x58, "db0bb93700c87249e44e91f791e4b8d8d887dd5428d0a6d88be954d6f827bc22a102733efbbb37820834ca8cf619c83e52b53d96a05ab6de6454a6493bbdec30792558c20e9d76c4d67b619e23c1cc699114b8686177fd5e"}, &(0x7f0000000080)=0x60) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r1, @in={{0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1, 0xfffffffffffffffb, 0x9, 0x6, 0x5b}, &(0x7f0000000180)=0x98) 16:07:04 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) write$binfmt_misc(r1, &(0x7f0000000080)={'syz1', "abe21d24dd00c0e93570d0ea648cec7815d7204ec1"}, 0x19) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) r2 = syz_open_dev$binder(&(0x7f000000fff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000000000)=[@acquire={0x40046305}], 0x0, 0x0, &(0x7f0000012fc7)}) close(r1) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x0, 0x0, &(0x7f0000000f4d)}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f000000cf68)=ANY=[@ANYBLOB], 0x0, 0x0, &(0x7f0000000680)}) r3 = dup(r2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death={0x400c630f}], 0x1, 0x0, &(0x7f00000001c0)="10"}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000340), 0x1, 0x0, &(0x7f0000000380)="1c"}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000180)={0xc, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="106308400300e09cca900e2dc3c7eed9d5dd28ae05d2b47c7421d7"], 0x1, 0x0, &(0x7f0000000100)="c8"}) 16:07:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:04 executing program 0: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfe, &(0x7f0000000500)=[{&(0x7f0000000440)="859424891a2b60403a3af0551d6af36312ecc297b3b2e7d5b06701483eb649b3e94291e56d4e98c5cb8042e25402b0188af4b136fafb878c727a781b71bff8bc7b77032773"}, {&(0x7f0000000540), 0x0, 0x5}], 0x0, &(0x7f0000000580)={[{@gid={'gid', 0x3d}, 0x2c}]}) r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x100000001, 0x400001) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f00000001c0)={{0x0, 0x800000008}, {0x7, 0x7fffffff}, 0x1, 0x2, 0x4693}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='hugetlbfs\x00', 0x0, &(0x7f00000001c0)) 16:07:04 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:04 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) pkey_alloc(0x0, 0x2) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0xb9812) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x301000, 0x0) connect$llc(r0, &(0x7f0000000200)={0x1a, 0x339, 0x1, 0x8, 0x0, 0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x10) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x8800, 0x0) faccessat(r1, &(0x7f00000011c0)='./file0\x00', 0xc, 0x800) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400000, 0x0) read$FUSE(r1, &(0x7f0000001200), 0xfffffffffffffcbb) 16:07:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x0, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:04 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 296.734298] binder: 22422:22430 unknown command -1974471240 [ 296.740303] binder: 22422:22430 ioctl c0306201 20008fd0 returned -22 [ 296.756234] binder: 22422:22430 unknown command 0 [ 296.761524] binder: 22422:22430 ioctl c0306201 2000dfd0 returned -22 [ 296.768337] binder: 22422:22430 BC_CLEAR_DEATH_NOTIFICATION death notification not active [ 296.867267] ISOFS: Unable to identify CD-ROM format. 16:07:04 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x10, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:04 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1a0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) [ 296.953754] ISOFS: Unable to identify CD-ROM format. 16:07:04 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000080)={@rand_addr=0xb053, @local={0xac, 0x14, 0x14, 0xaa}}, 0xfffffff0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) ioctl$BLKRAGET(r1, 0x1263, &(0x7f00000000c0)) r3 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000140)={0x2, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) setsockopt$inet_int(r2, 0x0, 0x14, &(0x7f0000000100), 0x4) 16:07:04 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x8, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap='mmap', 0x2c}]}}) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e20}, 0x10) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 16:07:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x0, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x80000) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:04 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)="627472667306", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:04 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:04 executing program 5: clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000a80)='/dev/audio#\x00', 0xffffffffffffff9c}, 0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000b00)={0x0, 0x8}, &(0x7f0000000b40)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000b80)={r1, 0x401}, &(0x7f0000000bc0)=0x8) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) r2 = syz_open_dev$audion(&(0x7f00000008c0)='/dev/audio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000900)={0x0, @in6={{0xa, 0x4e22, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0xcbe2}}, 0x100000001, 0x7, 0x80000000, 0x1, 0x9}, &(0x7f00000009c0)=0x98) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000a00)={r3, 0x36, "d650e4362ffa530b5ac66e1df6c51a81dca046545d67ec043cbf97f944e03e8fea50113f3b1b3f0dda464b9f54dd176ca6ccfe05ec66"}, &(0x7f0000000a40)=0x3e) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) process_vm_readv(r4, &(0x7f0000000480)=[{&(0x7f00000001c0)=""/246, 0xf6}, {&(0x7f0000000040)=""/47, 0x2f}, {&(0x7f00000002c0)=""/228, 0xe4}, {&(0x7f00000003c0)=""/145, 0x91}], 0x4, &(0x7f0000000840)=[{&(0x7f00000004c0)=""/197, 0xc5}, {&(0x7f00000005c0)=""/233, 0xe9}, {&(0x7f00000006c0)=""/69, 0x45}, {&(0x7f0000000740)=""/165, 0xa5}, {&(0x7f0000000800)=""/4, 0x4}], 0x5, 0x0) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) [ 297.544080] binder: 22422:22510 BC_DEAD_BINDER_DONE 2d0e90ca9ce00003 not found 16:07:05 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000000)={{{@in=@multicast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8931, &(0x7f0000000340)={'veth0\x00', r1}) [ 297.682108] binder: 22422:22525 tried to acquire reference to desc 0, got 1 instead [ 297.692857] binder: 22422:22525 unknown command -1974471240 [ 297.698878] binder: 22422:22525 ioctl c0306201 20008fd0 returned -22 [ 297.712087] binder: 22422:22524 unknown command 0 [ 297.719082] binder: 22422:22524 ioctl c0306201 2000dfd0 returned -22 [ 297.728105] binder: 22422:22524 BC_CLEAR_DEATH_NOTIFICATION invalid ref 0 16:07:05 executing program 4: syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x390, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f00000071c0)=[{{0x0, 0x0, &(0x7f0000006140)=[{&(0x7f0000006000)=""/103, 0x67}, {&(0x7f0000006080)=""/160, 0xa0}], 0x2, &(0x7f00000061c0)=""/4096, 0x1000}}], 0x1500, 0x0, &(0x7f0000007380)={0x0, 0x1c9c380}) 16:07:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:05 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) unlink(&(0x7f0000000000)='./file0\x00') r1 = syz_open_dev$mouse(&(0x7f0000002680)='/dev/input/mouse#\x00', 0xfffffffffffffffb, 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000026c0)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000002700)=0x10) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000002740)={r3, 0xf5, 0x3}, 0x8) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000002640)=ANY=[@ANYBLOB="020f000007000400002000000000000005f73608bb000500000000000a000000000000007da0b530000000000000000000eaff000000000200000000"], 0x38}, 0x1}, 0x4004800) r4 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x8, 0x90000) socket$inet6_sctp(0xa, 0x1, 0x84) clock_gettime(0x0, &(0x7f0000002400)={0x0, 0x0}) write$sndseq(r4, &(0x7f00000024c0)=[{0x9, 0xde, 0x9, 0x7fff, @time={0x77359400}, {0x64, 0x7fffffff}, {0x5, 0xffffffff}, @quote={{0x62, 0xfff}, 0x0, &(0x7f00000023c0)={0x0, 0x7, 0x10000, 0x100000000, @tick=0x3, {0x2, 0x9}, {0x9, 0x6}, @ext={0x1000, &(0x7f00000013c0)="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"}}}}, {0x9, 0x10000, 0x0, 0x1, @tick=0xaf, {0x4, 0xc92c}, {0xffffffffffffb73d, 0x8b9}, @connect={{0x2, 0x7fffffff}, {0x0, 0x5}}}, {0x1, 0x3ff, 0x600000000000000, 0x15800000000000, @time={r5, r6+30000000}, {0xc55}, {0x3}, @note={0x8000, 0x400, 0xc05, 0x10000, 0x7}}, {0x9, 0x8, 0x8, 0x9, @time, {0x54e, 0xfe26}, {0x0, 0x100000000}, @quote={{0xfff, 0xa00}, 0x401, &(0x7f0000002480)={0x1f, 0x5e6acc41, 0xffffffff00000000, 0x66, @tick=0x20, {0x3c8a, 0x100000000}, {0xacc, 0xfff}, @ext={0x1a, &(0x7f0000002440)="616106e0ae91e3358474854744962c007f9a5503f0d8e4ff4c90"}}}}, {0xa4, 0x3, 0x6, 0x4, @tick=0x10000, {0x100000000000000, 0x2}, {0xfff, 0x6}, @queue={0xfff, {0x6, 0x7fffffff}}}, {0x8000, 0x9, 0x4, 0x5, @tick=0x1, {0x4335, 0x50}, {0x7ff, 0x8001}, @raw8={"21e486a81d0394c5f31141f6"}}, {0x80000000, 0x2, 0x2, 0x3ff, @tick=0x5, {0x5, 0x2}, {0x7, 0xffff}, @time=@tick=0xffffffffffffffe0}], 0x150) r7 = add_key(&(0x7f0000001240)='keyring\x00', &(0x7f0000001280)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000012c0)="a7862f013bbea4faf149f1fe02a316fb2db7bb14117820a2fd131067aaf460d835da0b919dff5efcecb41296f50f24a4c1a6b39376abb3b55b27fe18a6c2c359d81770a2e9b73cfb36f31a206db097347a9ea6ec52659c20b2203ea8f1c3717c480c4ad84099e5930e00162698291c452ed8", 0x72, 0xfffffffffffffffc) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000002840)={0x1, 0x800c, 0x4, 0x1, r2}, 0x10) getegid() add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000240)="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", 0x1000, r7) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x4e23, 0x6, @loopback={0x0, 0x1}, 0x1}, @in={0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e20, @broadcast=0xffffffff}, @in={0x2, 0x4e22, @loopback=0x7f000001}, @in6={0xa, 0x4e23, 0x80000000, @mcast1={0xff, 0x1, [], 0x1}, 0x1}, @in6={0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, [], 0x10}, 0x2}, @in6={0xa, 0x4e20, 0x77be, @mcast1={0xff, 0x1, [], 0x1}, 0x1}], 0xa0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000100)=0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000002780)={{0x6, 0x5276}, 'port1\x00', 0x41, 0x450, 0x9, 0x93, 0x1, 0xeee, 0xd3, 0x0, 0x2, 0x6}) getsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f0000001340)=0xa9, &(0x7f0000001380)=0x2) sched_rr_get_interval(r8, &(0x7f0000000140)) 16:07:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:05 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:05 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:05 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) r0 = socket(0x1, 0x801, 0x8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000000400)=0xe8) sendmsg$can_raw(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x1d, r1}, 0x10, &(0x7f0000000300)={&(0x7f00000002c0)=@can={{0x0, 0x4, 0x100000001, 0xfffffffffffffffc}, 0x6, 0x1, 0x0, 0x0, "ed3f7e4e0bdad857"}, 0x10}, 0x1, 0x0, 0x0, 0x810}, 0x4000084) r2 = creat(&(0x7f0000000380)='./file0\x00', 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000003c0)={0x10200, 0x1, 0x2, 0x2000, &(0x7f0000ffe000/0x2000)=nil}) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000000), 0x40000000, &(0x7f00000001c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 16:07:05 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000002480)={0x1, 0x5, 0x100020000000007, 0x2}, 0x2c) r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x9, 0x400000) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000180)=0x20, 0x4) write$P9_RRENAME(r1, &(0x7f0000000140)={0x7, 0x15, 0x2}, 0x7) vmsplice(r1, &(0x7f0000000780)=[{&(0x7f00000001c0)="5e59a1d22320075cb4fef7c764a3031e7eb3634136de7c015a2d6f7a27c8f6d58467df1c62db5024b649a405c209a3124fea8abea7617b819f683cfe43eaf8abe08223de8bbb82c3b7d07e9d45400b28038cdae34ca5856cf0014a13419c1d1d8432ecb553ef69cf5661be0aa5ca6bb1cb20d7cb5f9ad6a4c306b30c00a5e1e809dcafd22b4c3813bae26187eccd72efa423354c248f64698e1be949a6b6c24f12aed26096bcfc0e797205f899307a23af1c3dd2ab144f5580b078438109c8377a28", 0xc2}, {&(0x7f00000002c0)="ce9b50ceea85876cf43a7de2ce6d4e5e7200", 0x12}, {&(0x7f0000000300)="b72ea158c3c8e0b61b011e15d237b13048", 0x11}, {&(0x7f0000000340)="1e4c848f186f12c03d414b0fa2b384d43bfcda85692addd618066c14f0ef1ad0cffe9b07c7dfe5009d20696cfddf7b3022003e29136614074463e3d4c056af2d358bc82fc027a19954c5e0b2e9a397cfac05349c440986f2468c28a31136", 0x5e}, {&(0x7f00000003c0)="ff7a19ff0c85af68cb15c06c33293535d826ed9d60e0c685bd67459a17660e2b5555fb226ff60709c30b352fb57c1fc11eef4320aaed94bfeca28b0405efa9bd7fec1485ef3fbaf17b8825b2824973502fcb28d69e2d0bf6ae6180767f7c0e3eac093d9a9d906c29d7af04b058edd686ec2ec68715b337e5aaa8cf3d00049cd939251d8262d0a5e8b87a42567b44ba5c602f4640d2614b56d4d4c130821d1e76fbdd1d", 0xa3}, {&(0x7f0000000480)="3c16bff14235b87763d2ff72a8016242a21451af444b491e5a8d7130f69befffee5ba6c2355d653fe344b962064c026358a8ec577dce2b4393624576a03938bcc31ac83146eb74d330e12f193d6d48bd5f815c3c4665ff71cacd52b338496856a96b44a0c2c392ba651576", 0x6b}, {&(0x7f0000000500)}, {&(0x7f0000000540)="5e6627828bec1c1d203221fd997c2a0b1b144407bc9ce446f444d688521d4cd0a6d7d6246c9f5c5ae5ff2124842793566f947852664d1e0ca36d2ba70169e5c0657262987d370ae86952c7119670d651d92a08ee4253e7ec6781c7227f49275b1fcf7d217dc719d307b9abe12bb79a7752368a0344447e730007b7a9d9df06068c3e7f771305b255115ea642482ea235e5f596987a64392bbe9d07671cb2a06c411a0e7756ae3e4432ea68ca99a32225125fdfe6fcc394a1caced3d1f339bfd36a28df6d755d852c4fc56ab0ae9c832fd0d1a7075f58c6dfe27235", 0xdb}, {&(0x7f0000000640)="3e80f053bee1309b", 0x8}, {&(0x7f0000000680)="1bbc548e007b9dcc85b8d01fbe9e885608b2f69e094f8dbdb2923480834b0cd7b481d535e4742198cdba4366c4a3f5581afc9c6244fdd8a53d712f1b886a9f70a49da3720b141b4c0cf848702aea4c5245fe7dcecd2ab9c4d760f586bedf8ef12f43bf112b211a68f24615da2eae3da33d129e87a038830d36319fafc55587edff5375ad1c787a6b975227d9402db3f6ce50267bc9d16fd74464e6f576a5d0498463a9c43696ee64f6464630fb0039b7349e84aed50d71044063f0eb44f9fadbb9a7cddbb3715a4d3dfcae44e6275b5f9631097054f8602a38d849448a8fcc0095a567a70df611bc22a30f1197e8b7b301710a21cbe0f4dc", 0xf8}], 0xa, 0x1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f0000ab2000), &(0x7f0000da1000)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00004f1ff0)={r0, &(0x7f0000068000)}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000500)={0x4, 0xaad6df007e7a79e5, 0x7fff, 0x4d, 0x0}, &(0x7f0000000840)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000880)={r2, @in6={{0xa, 0x4e21, 0x3ff, @dev={0xfe, 0x80, [], 0x19}, 0x3}}}, &(0x7f0000000940)=0x84) 16:07:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a00, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1000000012000, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000080)=""/138) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000030807031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 16:07:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:05 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:05 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000dec000)={0x2, 0x400004, 0x1, 0x7, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f00000001c0)="c2", &(0x7f00000000c0)=""/152}, 0x18) modify_ldt$write(0x1, &(0x7f0000000000)={0x401, 0x20000800, 0x2000, 0x20000000000, 0x4, 0x0, 0x4, 0x3ff, 0x3, 0x5}, 0x10) 16:07:05 executing program 0: setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f00000000c0)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, &(0x7f0000420000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x108) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x108) 16:07:05 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:05 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x42108000, &(0x7f0000000000), &(0x7f0000000440), &(0x7f0000c35ffc), &(0x7f0000000140)) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x12040, 0x0) connect$pptp(r0, &(0x7f00000003c0)={0x18, 0x2}, 0x1e) bind$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x0, @loopback=0x7f000001}}, 0x1e) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="09000380000001001f00"], &(0x7f0000000480)=0xe) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000004c0)={r1, 0xff}, 0x8) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000001c0)=0x0) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f0000000400)={0x39, 0x7fff, 0x5}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000240)={{0x3, 0x2, 0xffffffffffffffd2, 0x83ea, '\x00', 0xff}, 0x5, 0x0, 0x7897, r2, 0x1, 0x80, 'syz1\x00', &(0x7f0000000200)=['[wlan0,vboxnet0*\x00'], 0x11, [], [0x9, 0xfffffffffffffffa, 0xffffffffffffffe5, 0x7]}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000380)='bbr\x00', 0x4) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) connect(r0, &(0x7f0000000600)=@nl=@proc={0x10, 0x0, 0x25dfdbfd, 0x20000}, 0x80) 16:07:06 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha512-avx)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x3ac) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000040)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000100)={0x0}) r4 = mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000000, 0x20010, 0xffffffffffffff9c, 0x25) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000003c0)={0xec, 0x0, &(0x7f0000000240)=[@release={0x40046306, 0x1}, @clear_death={0x400c630f, 0x1, 0x1}, @acquire_done={0x40106309, r2}, @clear_death={0x400c630f, 0x3}, @decrefs={0x40046307}, @dead_binder_done={0x40086310, 0x1}, @reply={0x40406301, {0x4, 0x0, 0x1, 0x0, 0x10, 0x0, 0x0, 0x30, 0x38, &(0x7f0000000140)=[@fd={0x66642a85, 0x0, r0, 0x0, 0x4}, @flat={0x776a2a85, 0x10a, r3, 0x3}], &(0x7f0000000180)=[0x68, 0x68, 0x38, 0x0, 0x78, 0x48, 0x0]}}, @reply_sg={0x40486312, {{0x0, 0x0, 0x4, 0x0, 0x10, 0x0, 0x0, 0x0, 0x8, &(0x7f00000001c0), &(0x7f0000000200)=[0x30]}, 0x40}}, @free_buffer={0x40086303, r4}], 0x63, 0x0, &(0x7f0000000340)="d13bb4290312604d0e90adf13953f8260152fe9bb83bfb8b9be9751180ab57379bc193c4090f02d47530375b3c33affb8b930a8227503c0828ddcb29f296862fbc162eb8689c2dc7e11986180f66a26709acfa1ada479bba757dc89932cf7398585275"}) 16:07:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x500, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:06 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha1-avx)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000140), 0x0) r2 = accept$alg(r1, 0x0, 0x0) r3 = accept4(r2, 0x0, &(0x7f0000000080), 0x0) sendmmsg$inet_sctp(r3, &(0x7f0000001d40)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @multicast2=0xe0000002}, 0x10, &(0x7f0000000140), 0x0, &(0x7f0000000380)}, {&(0x7f0000001b80)=@in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10, &(0x7f0000001d00)}], 0x2, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x600800, 0x0) write$FUSE_DIRENT(r4, &(0x7f0000000140)={0xb0, 0xfffffffffffffff5, 0x2, [{0x3, 0x8, 0x4, 0x7f, ']@-^'}, {0x2, 0x10000, 0x1, 0x4, ']@-^'}, {0x3, 0x3, 0xfffffffffffffeff, 0x9, '{'}, {0x6, 0x9, 0xf, 0x5, 'hmac(sha1-avx)\x00'}, {0x0, 0x72, 0x0, 0x9}]}, 0xb0) 16:07:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:06 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:06 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socket$kcm(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x2c) setsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f0000000000)="d0820673211a81cb3a2680a320ac95583697bc28f6c6586d97661bcb5ac46f339b211c628e294b75a76c6139cee1442afeff3ac44b126e284b46e0890ddcce724b00f164c546d9dd395cc4c4ddedf28f51c6a07cafca68a9dfad320a21208766964446e4c2dd6b6bde2e97e1e7423b6fef5bfd99b56c0d79d0c1ad402f6650ddeb9c0b93d77c6f634d89cf0e40019c5c1181ecfd1849602287259c9b0dc45f174d6af9832ac14c27b4a1e0154b46e6046805e23a91af073ae1d481b015545ae658eea4cba2136e07b31e92", 0xcb) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f0000000000), &(0x7f0000000140)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000000c0), &(0x7f0000000140), 0x1}, 0x20) [ 298.778882] IPVS: ftp: loaded support on port[0] = 21 16:07:06 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 298.829383] IPVS: ftp: loaded support on port[0] = 21 16:07:06 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000080)="295ee1311f16f477671070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) listen(r1, 0x43) r2 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x4b0881, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000340)={'vcan0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x20, &(0x7f0000000380)={@remote, @dev, 0x0}, &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000bc0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000cc0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000d40)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000000d80)={0x0, 0x0, 0x0}, &(0x7f0000000dc0)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000e00)={'vcan0\x00', 0x0}) getpeername$packet(r2, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000001900)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000001940)={'team0\x00', 0x0}) accept4$packet(0xffffffffffffff9c, &(0x7f0000001980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000019c0)=0x14, 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000001a00)={'vcan0\x00', 0x0}) getsockname(r2, &(0x7f0000001b80)=@xdp={0x0, 0x0, 0x0}, &(0x7f0000001c00)=0x80) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000001c40)={@empty, @remote, 0x0}, &(0x7f0000001c80)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001cc0)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001d00)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000001e00)=0xe8) accept(r0, &(0x7f0000001e40)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000001ec0)=0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000001fc0)={'vcan0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002000)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@local}}, &(0x7f0000002100)=0xe8) getpeername$packet(r1, &(0x7f0000002200)={0x0, 0x0, 0x0}, &(0x7f0000002240)=0x14) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000002280)={@remote, 0x0}, &(0x7f00000022c0)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000002400)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x27, &(0x7f0000002480)={@local, @multicast2, 0x0}, &(0x7f00000024c0)=0xc) getsockopt$inet6_mreq(r0, 0x29, 0xe3e57c6c7a7d6744, &(0x7f0000002500)={@dev, 0x0}, &(0x7f0000002540)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000025c0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000002600)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000008ec0)={0x0, @dev, @dev}, &(0x7f0000008f00)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000009000)={'bond_slave_1\x00', 0x0}) accept4(r2, &(0x7f0000009100)=@can={0x0, 0x0}, &(0x7f0000009180)=0x80, 0x80800) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000009c00)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000009bc0)={&(0x7f00000091c0)={0x9e0, r4, 0x20, 0x70bd26, 0x25dfdbfb, {0x1}, [{{0x8, 0x1, r5}, {0x90, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0xf0, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x80}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xffff}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r10}, {0xf0, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x10001}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'broadcast\x00'}}}]}}, {{0x8, 0x1, r12}, {0x1b0, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x100000000}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x1}}, {0x8, 0x7}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'broadcast\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r14}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x100000000}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r15}}}]}}, {{0x8, 0x1, r16}, {0x11c, 0x2, [{0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x2c, 0x4, [{0x10001, 0x3f, 0x4, 0x4}, {0x3ff, 0x10000, 0x9, 0x1000000}, {0x7, 0xffff, 0x1000, 0x5}, {0x10001, 0x6, 0x5, 0x3}, {0x4, 0x1, 0xfffffffffffffff8, 0xa01d}]}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r17}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x14, 0x4, [{0x9, 0x3, 0x0, 0x1000}, {0x3, 0x5, 0x2, 0x40}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x24000000000000}}, {0x8, 0x7}}}]}}, {{0x8, 0x1, r18}, {0x7c, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8, 0x3, 0x5}, {0x10, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r19}}}]}}, {{0x8, 0x1, r20}, {0x74, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r21}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r22}, {0x1f0, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x800}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0xc, 0x4, [{0x1, 0x9, 0x800, 0x643cf7af}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r23}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r24}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r25}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r26}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r27}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r28}, {0x168, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r29}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r30}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xe6}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r31}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x10200000000}}, {0x8, 0x6, r32}}}]}}]}, 0x9e0}, 0x1}, 0x80) sendto$inet6(r2, &(0x7f0000847fff)='_', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x6}, 0x14) 16:07:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@empty, @broadcast, 0x0}, &(0x7f00000000c0)=0xc) getresuid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000200)=0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in=@local={0xac, 0x14, 0x14, 0xaa}, 0x4e23, 0x0, 0x800, 0x40, 0xa, 0xa0, 0x20, 0xbf, r1, r2}, {0x6b79, 0x8, 0x100000000, 0x3ff, 0x90f, 0x1, 0x0, 0x40}, {0x2, 0x1, 0x100, 0x3}, 0x2000000, 0x0, 0x1, 0x0, 0x3, 0x2}, {{@in6=@dev={0xfe, 0x80, [], 0x1f}, 0x4d4, 0x32}, 0xa, @in=@loopback=0x7f000001, 0x3505, 0x3, 0x2, 0x6, 0x5, 0x3}}, 0xe8) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x0, 0x11011, 0xffffffffffffffff, 0x0) 16:07:06 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:06 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x13f, 0x100b}}, 0x20) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f00000000c0)={'vcan0\x00', {0x2, 0x4e22, @multicast1=0xe0000001}}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000140)=0x800) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x102d}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xa, 0x5, &(0x7f0000346fc8)=ANY=[@ANYBLOB="1800000100000000fffffff40000000061100061000035131b870600000000000000000000009500"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0x3bc, &(0x7f00001a7f05)=""/251}, 0x2e) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'syzkaller1\x00', {0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}}) 16:07:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:06 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfbffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1f00, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:07 executing program 0: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f00000000c0)={0xfffffffffffffff8, 0x80, 0x8, 0x5b5a4853, 0x7, 0x1}) r1 = socket$can_bcm(0x1d, 0x2, 0x2) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x200c0, 0x0) sync() connect$can_bcm(r1, &(0x7f0000000040)={0x1d}, 0xfffffffffffffef3) 16:07:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000705ff4)={0x10, 0x0, 0x0, 0x400000000006}, 0xc) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x2c, 0x1) getsockopt$netlink(r0, 0x10e, 0x9, &(0x7f00000001c0)=""/8, &(0x7f0000706ffc)=0x7) 16:07:07 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:07 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x100, 0x101000) ioctl$RTC_PIE_OFF(r0, 0x7006) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000300)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0xfff, 0x8c000) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000280)=0x5, 0x4) r2 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x40000005519, 0x1) getpeername$llc(r2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000001c0)=0x10) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000200)=[{0x0, 0xfe00000000000000}, {0x4, 0xffffffffffffff0b}, {0x2, 0x4}], 0x3) 16:07:07 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:07 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000040)=0x2) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x0) lseek(r1, 0x0, 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) fallocate(r3, 0x20, 0x0, 0x8000) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x40080, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) dup2(r1, r2) 16:07:07 executing program 3: ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f00000000c0)=0x3) r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)={0x6, 0x258, 0x4, "55adfaa6f93f"}) ioctl(r0, 0x40084149, &(0x7f00000000c0)) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r1, 0x4, 0x70bd27, 0x25dfdbfb, {0xa}}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x4050) 16:07:07 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\f', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:07 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, {0x4}, 0x80001, 0x8001}, 0xe) getsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040), 0x2) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x800, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r1, 0x0, 0x0, 0x10001, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) 16:07:07 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) rt_sigsuspend(&(0x7f0000000000)={0xffffffffffffffc0}, 0x8) 16:07:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:07 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0xc0, 0x0) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000000040)={0x1, 0x6}) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) 16:07:08 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)="6274726673f6", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:08 executing program 3: r0 = epoll_create1(0x0) r1 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x5, 0x509040) ioctl$KVM_GET_IRQCHIP(r2, 0xc208ae62, &(0x7f0000000100)={0x0, 0x0, @ioapic}) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) dup2(r1, r0) 16:07:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x0, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = dup(r0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r1, &(0x7f0000006000/0x18000)=nil, &(0x7f0000000040)=[@text16={0x10, &(0x7f0000000000)="2e362a597db81e000f00d0f0830600501bc124f1b833018ed866b9840400000f32b827010f00d8b834018ed8ba4100b80300ef9b", 0x34}], 0x1, 0x41, &(0x7f0000000080), 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x5d, &(0x7f0000000580), 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000180)=ANY=[@ANYBLOB="fc"]) ioctl$KVM_RUN(r3, 0xae80, 0x0) 16:07:08 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf4ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:08 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="01034d") write$P9_RCREATE(r0, &(0x7f0000000040)={0x18, 0x73, 0x2, {{0x40, 0x4}, 0x5}}, 0x18) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x51000}]}) accept4(r1, &(0x7f0000000080)=@ax25, &(0x7f0000000100)=0x80, 0x800) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000180)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000240)=0x0) syz_open_procfs(r2, &(0x7f00000001c0)='setgroups\x00') 16:07:08 executing program 4: pipe2$9p(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0x1fb, 0x4d}, 0x7) write$P9_RWALK(r1, &(0x7f0000000080)={0x16, 0x6f, 0x2, {0x1, [{0x64, 0x4, 0x6}]}}, 0x16) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u', 0x2c}]}}) write$P9_RREADDIR(r1, &(0x7f0000000480)={0x2a, 0x29, 0x1, {0x0, [{{}, 0x0, 0x0, 0x7, './file0'}]}}, 0x2a) write$P9_RREADDIR(r1, &(0x7f0000000280)={0x5b, 0x29, 0x1, {0x0, [{{}, 0x0, 0x0, 0xd, './file0/file0'}, {{}, 0xfffffffffffffff8, 0x0, 0x13, './file0/file0/file0'}]}}, 0x5b) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c}) removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=@random={'osx.', 'version=9p2000.u'}) 16:07:08 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:08 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) sendto$inet(r1, &(0x7f0000de1fff), 0xfffffffffffffd43, 0x20008005, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f00000001c0)={{0xa, 0x4e24, 0x7, @loopback={0x0, 0x1}, 0xc7}, {0xa, 0x4e23, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x100000001}, 0x81, [0x400, 0x800, 0x1, 0x1f, 0x621, 0x20, 0x1, 0x9]}, 0x5c) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x9}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f00000002c0)={r3, 0x4, 0x10, 0x5, 0x8000000000000}, &(0x7f0000000300)=0x18) shutdown(r1, 0x0) recvfrom(r1, &(0x7f0000000040)=""/98, 0x62, 0x21, &(0x7f0000000140)=@nl=@unspec, 0x70a000) 16:07:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:09 executing program 5: socketpair(0x10, 0x4, 0x9, &(0x7f00000001c0)={0xffffffffffffffff}) setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000240)=0x7, 0x4) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RAUTH(r1, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x10, 0x3}}, 0x14) r2 = shmget$private(0x0, 0x4000, 0x54000003, &(0x7f0000ffb000/0x4000)=nil) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x400, 0x0, 0x0) 16:07:09 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x97ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf5ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:09 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) syz_open_dev$binder(&(0x7f000000cff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/md0\x00', 0x200, 0x0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000019000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r2 = gettid() openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x0, 0x0) munlockall() r3 = syz_open_dev$evdev(&(0x7f0000012fee)='/dev/input/event#\x00', 0x0, 0x0) tkill(r2, 0x7) ioctl$EVIOCSABS3F(r3, 0x401845ff, &(0x7f0000000040)={0x6, 0x4, 0x100000000, 0x5, 0x100000000}) 16:07:09 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:09 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x14) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000000c0)={'team0\x00', r0}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snapshot\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f00000002c0), &(0x7f0000000300)=0x8) connect$netlink(r1, &(0x7f0000000240)=@proc={0x10, 0x0, 0x25dfdbff, 0x34}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xf, 0x0, &(0x7f0000001fd8)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x20, 0xc3, &(0x7f0000000100)=""/195, 0x41f00, 0x1, [], r2}, 0x48) [ 301.636016] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 16:07:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:09 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x10000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:09 executing program 4: rt_sigsuspend(&(0x7f0000000040), 0x8) ustat(0xff, &(0x7f0000000080)) clock_nanosleep(0x0, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, &(0x7f0000000100)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x80000003, 0x8031, 0xffffffffffffffff, 0x0) pkey_free(0xffffffffffffffff) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000180)=""/177) 16:07:09 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0x600900) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000040)=ANY=[@ANYBLOB]) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 16:07:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:09 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x650c0000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:09 executing program 0: r0 = gettid() r1 = socket$inet(0x2, 0x7, 0x8) connect$inet(r1, &(0x7f0000000300)={0x2, 0x0, @loopback=0x7f000001}, 0x10) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000100), &(0x7f0000000400)}}, &(0x7f0000583ffc)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000e60000)) tkill(r0, 0x15) 16:07:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:09 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:09 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f00000001c0)="f120c55277ef35958b9821ef2a78ab9b797148ba967276aebf44f7840a774164715cd18d9433abfc7cc231119441e773508baab0b3bb6c6f40df97c5269e16630e4190153eddb2b954bb22ca6bc8b6b967c852dd9341462191010a839954e95cb5c73810b2713fbbecb378f83323c10cd624169cc7c964049e20aaea8067f66cb955f1145cbab701e09fc8762ed85a18ed08a2c725a51b19188bebed36e541cf728552970271329c004d3f61eff253e6df0cdc0c1d", &(0x7f0000000040), &(0x7f0000000000), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 16:07:09 executing program 0: r0 = socket(0x13, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000002f00)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000002ec0)={&(0x7f0000000100)=@ipv4_newroute={0x28, 0x18, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x7}, @RTA_ENCAP={0x4, 0x16}]}, 0x28}, 0x1}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004080)={{{@in=@rand_addr, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000002e80)=0xe8) sendmsg$kcm(r0, &(0x7f0000004840)={&(0x7f0000004180)=@xdp={0x2c, 0x2, r1, 0xf}, 0x80, &(0x7f0000004280)=[{&(0x7f0000004200)="995654cc7e69013e5354e2fb9c56eb0e11f298fa7b05d542007fb3e1a2cee115af1704b7e23453fb15c1b871c2ed38bfb17e03035fbfe4d3c658ec522268c8438129313016cc77c1d762626d", 0x4c}], 0x1, &(0x7f00000042c0)=[{0x20, 0x115, 0x7f000000, "da7b6c85a9a85c20781403a0f1128278"}, {0x98, 0x1ff, 0x593f, "82e3d3490422810f0629724788705094181c33f11b2dc5e78d30c72df8f6424e73580539961bde93875e02984b276bf6fdbaa44ff62c0ee8cc769e291644ec8aadfc2049021918d0d47a7e75c51250ca8148f03dd927da514489699a878425792f9c68e4de0e264c3d970bbd1bfb81c223b2cadd8c63b565228093dd72bf36de0296"}, {0xa8, 0x110, 0x3, "d0b104fcb7b1833aba7e320346abff2330f3eeae5b90741098f5cb0d3b1a71aeaf6ceff01c070d74fc190bdacda075779826426708e05b8ff359fbeb32f25ce33423afd93982a9b5d14081e016a215ff57f8977fb4e35c50fa8d4ef2f516cc5cb2d2f7c0f34fafc300b6981edb414b690dfbac376ea8df0d0b0f88a9fb877d83f7c1ae09a35978cd6d8ece02868f09131d"}, {0x80, 0x115, 0x8b, "491f137cfa75b92cc1f7ce35e94bc8e05ac354ab87aed6b0a73c0f04e2322ea358299b3deac591d4612064c9a6b0244b899d9d129d48d394a4880c1e2188dc6e06b1278e818e3f6120ac4b4905f8df1986ceb66a60fc4f3745f82d25ae060c9954169d806f2290d99562e1d09d"}, {0xe8, 0x0, 0x4, "4c7c3518cf9d2198150277016133f3c61752ba3b9bcd890b3da065a9dc02ca3d042dd18e0dcd707aedc80d6f900b9b0501f7001d7a9ddd04f35a9e36e793b5e15513007cd717321dd9d834e3217f00954cec61af7fb33c099f418aef92d231f4d27773d4f27da41565b02292237fbc08116defe06bcc46cac006acfee73c68cb8806f6f67be096b00ff834b7a6d68adf891e2ea83d48f28dca878be36f38274625433d9c733bbb93f32501d2d8574b78c0582885b67bdcd18a9efa1b96fedbec3e145644f3aecec9313352b30fe59a0d9967acc1bcfe"}, {0x98, 0x0, 0x1, "77d18ed479b284df20d772a0e4d14eb588674534ff9d7c1bdb15f465cbb5c797b30f1a8691822ad2b65e9def3e7a6607092616fd7e090d7648736747006afbbb77eb918157a380ab983189ddfcb59a1dc6bfc7508358ea59d43053eb8d036e7d5b3be0fa9697ea5daf2b4e87a8c8b745b9de0cc583b792966421208334075272ef44a77cd6c018"}, {0xf8, 0x112, 0x800, "ef7e8049ee97b0f03350970abca6ff70194d4a6f5e2642b5f3f909e11b6018a5c189a0ab4c211791269a4ab6fdcf225e3d018bf937d54180bf9d583f210a1f061893ec5f73f154b2ce664c3be553f7b02f010792c18b647a8525779f8ec089f5e26dce11603c9cccb8c35bc62d9756d9d3493b075e4eb0bb97e30fb372ca40a49385a3ae9ccfa8013136f49059fd8c380f8244037faf497f6d1e0109a08d2888703aeb5b28dbf701e73a8c5017afda9ecb9f099c2a9553b779196e8feb8afad90c3dcca0a9798bb1b758936716966dfd04bf7ea807f0666e856a890e73910d34d042db6734"}, {0x48, 0x116, 0x240000000000, "14259420d82aac679822e467fa198a41fee318a44a23e5a77b8438ff687f434fb67d8b4db9688479fea2e1a2a5c1a8f77036c7e74d"}, {0x50, 0x108, 0x546c, "60b7de6afbefc60abcc9b7921b0fc0ed813e354174830baf302a7116dd9679ed856a04895704d4618acbf8ee64659f0f6dd4d88c4c6b27840db30859488f"}, {0x68, 0x107, 0x5, "0d2174087b8684faeb1938477a5247dbb9ef84e22ff9de6a30c2cd02040f4bdbd2bee5619438bfe05139e87988b400e48ccb3ddeb42d9929f20d2a539a4a72eb2448424b8c5c07d678e317b3b091c31663"}], 0x558, 0x44004}, 0x10) io_setup(0x4, &(0x7f0000000040)=0x0) io_destroy(r2) 16:07:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfd, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:10 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:10 executing program 3: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000640)=@filter={'filter\x00', 0xe, 0x2, 0x470, [0x0, 0x20000140, 0x20000310, 0x20000580], 0x0, &(0x7f0000000080), &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x1b, 0x0, 0x0, 'bridge_slave_0\x00', 'veth1_to_team\x00', 'dummy0\x00', 'eql\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x120, 0x150, 0x1a0, [@statistic={'statistic\x00', 0x18, {{0x0, 0x8}}}, @rateest={'rateest\x00', 0x48, {{'veth0_to_bridge\x00', 'irlan0\x00'}}}]}, [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8}]}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x1, [{{{0x11, 0x0, 0x0, 'syzkaller0\x00', 'gre0\x00', 'bpq0\x00', 'nr0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @empty, [], 0x110, 0x110, 0x240, [@mark_m={'mark_m\x00', 0x18}, @arp={'arp\x00', 0x38, {{0x0, 0x0, 0x0, @multicast1=0xe0000001, 0x0, @multicast1=0xe0000001, 0x0, @random="a8d6c454aa8f"}}}]}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:su_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x4e8) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2d49, 0xa0000) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r1, 0x1, 0x2}, 0x14) 16:07:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:10 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:10 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x101800, 0x4) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000001c0)={0x3ff, {{0xa, 0x4e23, 0x4, @local={0xfe, 0x80, [], 0xaa}, 0x3ff}}}, 0x88) 16:07:10 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r1) request_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000100)=':\x00', 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r2, 0x5, 0x2}, 0x14) getpeername(r2, &(0x7f0000000140)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000240)=0x80) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000280)={@ipv4={[], [0xff, 0xff], @rand_addr=0x100}, @mcast1={0xff, 0x1, [], 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0xed, 0x5, 0x1, 0x0, 0x3, 0x30, r3}) [ 302.782023] binder: 22918:22927 ioctl 401845ff 20000040 returned -22 16:07:11 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xfff, 0x20000) write$P9_RFSYNC(r0, &(0x7f0000000040)={0x7, 0x33, 0x2}, 0x7) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/rt_cache\x00') pread64(r1, &(0x7f0000000100)=""/67, 0x1c, 0x8000000001) 16:07:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:11 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x20000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:11 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:11 executing program 0: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r1) request_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000100)=':\x00', 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r2, 0x5, 0x2}, 0x14) getpeername(r2, &(0x7f0000000140)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000240)=0x80) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000280)={@ipv4={[], [0xff, 0xff], @rand_addr=0x100}, @mcast1={0xff, 0x1, [], 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0xed, 0x5, 0x1, 0x0, 0x3, 0x30, r3}) 16:07:11 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000001c0)=0x4) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x80000000, 0x100000000, 0x0) 16:07:11 executing program 3: chmod(&(0x7f0000000180)='./file0\x00', 0x70) r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x90000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1000000, 0x31, r0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) ioctl$KDDISABIO(r1, 0x4b37) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x200000, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r2, 0xae78, &(0x7f0000000140)=0x2) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x200000, 0x0) ioctl$TUNGETIFF(r3, 0x800454d2, &(0x7f0000000080)) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0x40045532, &(0x7f0000000000)=0x3) r4 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x80000001, 0x400000) ioctl$RTC_WKALM_SET(r4, 0x4028700f, &(0x7f0000000240)={0x0, 0x0, {0x27, 0x1, 0xe, 0x8, 0xa, 0x0, 0x2, 0x14b}}) 16:07:11 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000080)={0x0, 0xcc, "bf0ef02842c06d81aeaaacc68ed6c6bec5edaf61780a41fe1c8b8793ba5687347afac264048d5708ee0d50348b2029ca8134452c83e0a9d70d357607dca90d617279d559bfdeceaf1162a6bdede131ec7602467fdb8dcc677f473c305838ead9172c1e2878691c4b11598ef73011db930dc818de50698a2b43ca1ee2de660dfc1e41ed9919e12e36cdcbcd6e02e270c77eb39be7b2267485f0e78549ce1dfaaa243e57610c27c7e7d5a6a33bf8bdcce4d3d21806b5f1ace1b14aa047f0dc862e782d360e11081af0cfb47ad1"}, &(0x7f0000000000)=0xd4) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={r1, 0x1000}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x7b, &(0x7f0000000040)={0x7ffffffffffffff6, [0x200, 0xd7, 0x1, 0x4, 0x80200000, 0x4, 0x6, 0xfffffffffffffffe]}, 0x14) 16:07:11 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:11 executing program 3: syz_mount_image$minix(&(0x7f00000003c0)='minix\x00', &(0x7f0000000480)='./file0\x00', 0x0, 0x0, &(0x7f0000000880), 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d}, 0x2c, {'group_id', 0x3d}, 0x2c}) read$FUSE(r0, &(0x7f00000020c0), 0x1000) capset(&(0x7f0000000040)={0x20071026}, &(0x7f0000000080)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0xc00, 0xc00}}, 0x50) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400000, 0x0) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) 16:07:11 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x15, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d34") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1a0ffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:11 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000040)="9b484b20bd77ed1f9f9a325cd6baa3f25e481dcab590", &(0x7f0000000000), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 16:07:11 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:11 executing program 0: r0 = memfd_create(&(0x7f000003e000)='\'', 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x82) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000001000)={0x0, 0x0, 0x0, "9ec77a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) r3 = memfd_create(&(0x7f000003e000)='\t', 0x0) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1b, 0x0, 0x110120, 0x0, 0x2}}, 0x50) r4 = syz_open_dev$sndseq(&(0x7f000011c000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) dup2(r4, r3) write$sndseq(r3, &(0x7f0000e6ffd0)=[{0x1e, 0x0, 0x0, 0x3fd, @time}], 0x30) [ 304.112873] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop3. 16:07:11 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x72090000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x4000, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000001c0)={{0x6000, 0x2, 0x9, 0x0, 0x100, 0xfff, 0x3, 0x80000001, 0x6, 0x4, 0x3, 0x4}, {0xf000, 0x6000, 0xe, 0xfffffffffffffffc, 0x2, 0x2e16, 0x7f, 0x3, 0x81, 0x2000000000000000, 0x7f, 0x7}, {0x10f005, 0xf000, 0x4, 0x7, 0xe4, 0x3ff, 0xff, 0x4, 0x1, 0x400, 0x0, 0xfffffffffffff8fa}, {0x16000, 0x7000, 0x10, 0x0, 0x200, 0x0, 0x40, 0x80000000, 0x4, 0x7, 0xfff, 0x80000001}, {0x6000, 0x100000, 0xd, 0x9449, 0x2, 0x1, 0x8001000000000, 0x48e41da7, 0x800, 0x7, 0x800, 0x4}, {0x0, 0x5000, 0xb, 0xfffffffffffffff8, 0x3ff, 0x7, 0x17, 0x6, 0x6, 0x5, 0x9, 0x6}, {0x3001, 0xf000, 0xf, 0x4, 0x8, 0x6, 0x6, 0xff, 0x800, 0xffff, 0x1, 0x1ff}, {0x4, 0x10000, 0xf, 0x687, 0xffffffff00000001, 0x4, 0x0, 0xffffffff, 0x8, 0x7fff, 0x7fff, 0xa3}, {0x100000}, {0x4000, 0xf000}, 0x2, 0x0, 0xd000, 0x4000, 0x4, 0x100, 0x6000, [0x98b8, 0x7, 0x8000, 0x8]}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4068aea3, &(0x7f0000000140)={0x94}) 16:07:11 executing program 5: shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200a00, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r0, 0xc008ae09, &(0x7f00000001c0)=""/94) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={0x0, 0xfde}, &(0x7f0000000240)=0x8) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000300)={0x3, 0x1, 0x6938, 0x9}, 0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000280)={r1, 0x401, 0x7fff, 0x100000001, 0x2ed0, 0xffff}, &(0x7f00000002c0)=0x14) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 16:07:11 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x650c000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:11 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x40, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xc, 0x2, 0x4, 0x4000000000008, 0x8, r0, 0xfff}, 0x8e09) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={r1, &(0x7f0000000040)}, 0x10) write$P9_RVERSION(r0, &(0x7f0000000000)={0x15, 0x65, 0xffff, 0x7, 0x8, '9P2000.u'}, 0x15) 16:07:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c2134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa684020000", 0x0, &(0x7f0000000200)) chroot(&(0x7f00000003c0)='./file0\x00') r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000200)=[@textreal={0x8, &(0x7f0000000100)="2e650f983df3cf0f01751a6a000f320fae29670f01ca0f01dfbaf80c66b8114eeb8266efbafc0cec0f01c8", 0x2b}], 0x1, 0x0, &(0x7f0000000080), 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x7fff, 0x921a816e37e330f4, 0x5, 0x4b3e}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000000400)={r4, 0x3f, 0x6f, "bf7cf54d0a40bd7ddbea1e072e9ebce3f7cc86439108559f8e38a16d36e72ee3f5dafb2dd53d4caa0b8dc69040e7dfee5b40114db96a00d60eb30ca44406d11b018cc8bee13fdcc5a4f89748df77fa61d9e4a9f3fbfbee673d5e472718a5c06c69d06f613e3f408156f13090d4a9ed"}, 0x77) 16:07:11 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xedc0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:12 executing program 5: shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x4000) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000240)) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400240, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000380)={{0xa, 0x4e21, 0x1f, @mcast1={0xff, 0x1, [], 0x1}, 0x100000001}, {0xa, 0x4e24, 0x8001, @empty, 0x4}, 0x7, [0x75, 0x81, 0x140000000000, 0xff, 0x6, 0x3ff, 0x3, 0xfffffffffffffffc]}, 0x5c) r2 = request_key(&(0x7f0000000080)='id_legacy\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000400)='/dev/audio\x00', 0xfffffffffffffffb) keyctl$describe(0x6, r2, &(0x7f0000000440)=""/4096, 0x1000) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f00000001c0)={0x50000, 0x0, [0x8001, 0x5, 0x80000000, 0xbd, 0x81, 0x8, 0x7, 0x5]}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000280)) gettid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000340)) r3 = getpgid(0x0) syz_open_dev$usbmon(&(0x7f0000001440)='/dev/usbmon#\x00', 0x9, 0x80) wait4(r3, &(0x7f0000000300), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 16:07:12 executing program 3: futex(&(0x7f0000000040)=0x4, 0xb, 0x4, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000080), 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, &(0x7f000000b000)={0x77359400}, &(0x7f0000000040), 0x0) futex(&(0x7f0000000000), 0x1, 0x1, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)=0x1, 0x2) 16:07:12 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:12 executing program 4: r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg(r0, &(0x7f0000003900)={&(0x7f0000000040)=@un=@abs, 0x80, &(0x7f00000038c0), 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB="f800000000000000170100000900000059b42fda6bc9cfab1dd0fd2e07b20ce72caf2fbc5ab19694cf190d5ddb4395165b69cf1aa0ee7ccbe240fb2f7eef7beb8b074bfa829c3438bdff2c5231ba272e157242bdd962ab27c0181b6338445bf7b1fa1fc4e90bd4675df31dca066f342cadd229706564952b2b976178c335af4b7da7bc7719a7a993fcd28f39bf34da030bea8ace63f3c472f0b79b333892cfdaa1bcce5797291e8d4f9081a87ff492e6984381bc33b4aef935fd88fa50ee2db34bda1378d893c6199f505ed318a931690551e26e584b8d49758f479e7a41a79ba503201a3c4810d6962838d1ae4a69560ce7e375ccc60000a8010000000000000701000005000000"], 0x108}, 0x0) 16:07:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c2134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa684020000", 0x0, &(0x7f0000000200)) chroot(&(0x7f00000003c0)='./file0\x00') r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000200)=[@textreal={0x8, &(0x7f0000000100)="2e650f983df3cf0f01751a6a000f320fae29670f01ca0f01dfbaf80c66b8114eeb8266efbafc0cec0f01c8", 0x2b}], 0x1, 0x0, &(0x7f0000000080), 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x7fff, 0x921a816e37e330f4, 0x5, 0x4b3e}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000000400)={r4, 0x3f, 0x6f, "bf7cf54d0a40bd7ddbea1e072e9ebce3f7cc86439108559f8e38a16d36e72ee3f5dafb2dd53d4caa0b8dc69040e7dfee5b40114db96a00d60eb30ca44406d11b018cc8bee13fdcc5a4f89748df77fa61d9e4a9f3fbfbee673d5e472718a5c06c69d06f613e3f408156f13090d4a9ed"}, 0x77) 16:07:12 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff4, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 304.968984] QAT: Invalid ioctl [ 304.985809] QAT: Invalid ioctl [ 304.999228] QAT: Invalid ioctl 16:07:12 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400000, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x5, 0x1, 0x7}) [ 305.019266] QAT: Invalid ioctl 16:07:12 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x40000, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000000c0)={r0}) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x2f84) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000140)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}) close(r3) close(r2) ioctl$KVM_ASSIGN_SET_INTX_MASK(r3, 0x4040aea4, &(0x7f0000000000)={0x10, 0x37c8aadd, 0x10001, 0x5, 0x100000001}) 16:07:12 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffa0010000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f76") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:12 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="27b36a91f0eb3f00000070") getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x4b, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) 16:07:12 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:12 executing program 5: shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) rt_sigaction(0x13, &(0x7f0000000000)={0x2, {0x7fffffff}, 0x0, 0x4}, 0x0, 0x8, &(0x7f0000000040)) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 16:07:12 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:13 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000340)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="3000008010040000000000787b68afb75c91e9fffb47f3319dfc51a6333dd730d98c60b70155d1f0e6c7c862c4c16c0f819cd436a37bb8ecad5585b3", @ANYBLOB="000000000000000010001200080001007369740004000200"], 0x2}, 0x1}, 0x0) 16:07:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080)={0xa}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x13a) getsockopt$inet6_tcp_buf(r0, 0x11a, 0x0, &(0x7f0000000680)=""/4096, &(0x7f0000000180)=0x3) mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) 16:07:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:13 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 16:07:13 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x9000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:13 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:13 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:13 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x49, &(0x7f0000000000), &(0x7f0000000080)=0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x12d, &(0x7f0000000340)={@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x20}, @random="e829f650db0f", [{[], {0x8100, 0x5, 0x81}}], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, &(0x7f0000000180)={0x0, 0x0, [0x4d2, 0x0, 0x388]}) syz_emit_ethernet(0x0, &(0x7f0000000140)=ANY=[], &(0x7f00000001c0)={0x0, 0x4, [0x0, 0x0, 0x65f]}) 16:07:13 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:13 executing program 0: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYBLOB="c40027e1a4d5ad696271bfc85bca4c8d4934fdc56259088899ee0848434a11c92166e7e3484d6d8767a31a80e0260f684fd0c79280a7afba3d912edb10d0325b039edb9a2e0b2d6e591af145638f2a5b5c03691ae51d7ab91f174cbf04148d5bc7c1509e33a3b2fc7fed62557ff6ebf0db3b693d11e4812d125b51a95a99b1bb2722e35ce87795b413bfe83f008dcaa2180db86e059e0c960403f1010001000028d7"], &(0x7f0000000000)=0x2) r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x14, 0x0, &(0x7f00000001c0)=[@acquire_done={0x40486311}], 0x0, 0x0, &(0x7f0000000200)}) 16:07:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:13 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2040, 0x0) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000040)={0x5, 0xffff, 0x101, 0x101, 0x3}) shmctl$IPC_RMID(0x0, 0x3) 16:07:13 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8000, 0x0) r1 = mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3000004, 0x10010, 0xffffffffffffff9c, 0x3a) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000040)={r1}) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0xfff, 0x8) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) [ 306.427059] binder: 23345:23355 got transaction to context manager from process owning it [ 306.435623] binder: 23345:23355 transaction failed 29201/-22, size 55080-0 line 2843 [ 306.452439] binder: BINDER_SET_CONTEXT_MGR already set 16:07:13 executing program 4: r0 = dup(0xffffffffffffff9c) accept4$unix(r0, &(0x7f0000000180), &(0x7f0000000200)=0x6e, 0x80800) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x1002, 0x400) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0xb) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000000c0)={'lo\x00', &(0x7f00000019c0)=@ethtool_perm_addr={0x20}}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x101000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r2, 0x111, 0x5, 0x3f, 0x4) r3 = getpgrp(0xffffffffffffffff) ptrace$peek(0x1, r3, &(0x7f0000000040)) 16:07:14 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfeffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 306.473075] binder: 23345:23365 ioctl 40046207 0 returned -16 [ 306.481694] binder_alloc: 23345: binder_alloc_buf, no vma [ 306.488245] binder: 23345:23355 transaction failed 29189/-3, size 55080-0 line 2967 16:07:14 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae89, &(0x7f0000000040)) 16:07:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f7620") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:14 executing program 3: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={0x0, 0x1000, 0x4}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000240)={r1, 0x81}, 0x8) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x40000, 0x0) ioctl$RTC_VL_CLR(r2, 0x7014) sendto$inet(r2, &(0x7f0000000100)="5a12f4331019b57c623d232940c4ffca9c344f90840204caf17adb10b4f92350d9e1c7b815ceb45fd153564fea63267e2a69337e2b3c7adf6ed400f6b56e9da16a65efd64f135b27642045e66b6948b1d854f48cb72bacf79761a78655621e07dc019623fba7a1a0dd1351c8e9735083ed01dd3937edeb19e4b6e48f27d6e78c350230af0433", 0x86, 0x4000, &(0x7f0000000040)={0x2, 0x4e24}, 0x10) shutdown(r2, 0x0) setsockopt$bt_hci_HCI_FILTER(r2, 0x0, 0x2, &(0x7f00000000c0)={0x0, 0x5, 0xfffffffc}, 0xfffffe70) [ 306.550437] binder: undelivered TRANSACTION_ERROR: 29201 [ 306.557038] binder: undelivered TRANSACTION_ERROR: 29189 16:07:14 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x2000000004000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 16:07:14 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ppoll(&(0x7f00000000c0), 0x0, &(0x7f0000000140)={r1, r2+30000000}, &(0x7f0000000180)={0x33}, 0x8) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f00000001c0)='./file0\x00', 0x5, 0x4, &(0x7f0000001600)=[{&(0x7f00000002c0)="b883d1cbd607a6eb64fef6ec14a5aeba90072e493b6d1870deb7507553bd7c97161f630509adf5265e7b891f47b3583402f670a2868630ddd23847a5a1ce4c1435f45beecb587d1ffacb900f01a260e1074942d25e7d9e4ab0550f7d0a75b01ff32e751809209e3fdb04ca32c05f18ccbc2fd612835b153db43610b6914f67fa4fd4993b5b3c7448e1bbf67943105e34de312cd4333edbf3b64374696b755dbeb482b0", 0xa3, 0x2}, {&(0x7f0000000240)="e3a5bf8498fea160dd82997bcb1dd0d10f8152bea67b3e1468ea9de7a3fc8421f74f6e5f", 0x24, 0xfff}, {&(0x7f00000003c0)="e0d151e16061bd06f6d2db02068edb93521e1bdb20cdf18747172ef5fe5cec7423352da329adbdd676d2f665b2bfd01a00dd9c3ffc1d4c34341a73585d00e6f04043c5f8e70edd605acb1724e0f1a43e9466ab8a346aa3980069a484d2bfcedd8c3f1e63b5e8af07d3c5a6d572ee5f1e17f2875b9f89c6077ecbea428fb9e260dcf87fa530d7bbfca3f8602d44a0e5cbe1b2e579cd4b13acc5d82def17d4455ccbfacec4cedd7fb07c9f78e97a1a058bb68ee0ad586b7732322063ecbca2d9cffb8f9cfb4c12dd7714bc741180343653cb38b1f43492906d2572450b0396e842f6dbf9d39cf6e1499f742bc713a12b343159ecfa", 0xf4, 0x3}, {&(0x7f0000000500)="79464266a006aa42a2c48f18a10206be8765a194a5e4d5c0a9a729e7599671cd41210d17bd9b35d8da8097b1110e311a2c15de5d498000d3eaf29eceeb0dc3659c19a7c7f2529c06d9d30e691ce03092a11aabe986ce9dfd41eff9519ddc7116bdbac24e8f5639607771f1b91cab2143ccb35a5a8b01b21a9d2038d1e64f22b789112a467d088349d6ae24ce5bc01122836d135b8fe907c75c7d9c1ceb60ab5e88685b8ddc53e351919cc9429fd0285dee4c531dddf352f1584a4dee253209b1", 0xc0, 0x4}], 0xc0080, &(0x7f00000005c0)={[{@umask={'umask', 0x3d, 0x8}, 0x2c}, {@errors_remount='errors=remount-ro', 0x2c}]}) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x22, 0x0) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000040)={0x4, 0x0, [{0x40000001, 0x401, 0x800, 0x10000, 0x9}, {0x2, 0x4, 0x1, 0x6, 0x9}, {0xc0000009, 0x0, 0x20, 0x7, 0x8}, {0x80000007, 0x4, 0x2, 0x5c, 0x6}]}) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r3, 0x80dc5521, &(0x7f0000000600)=""/4096) write$binfmt_elf32(r3, &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x1) ppoll(&(0x7f0000000280)=[{r3}], 0x1, &(0x7f0000000200)={0x0, 0x1c9c380}, &(0x7f0000000380), 0x8) ioctl$int_in(r3, 0x80000040045010, &(0x7f00000004c0)=0x2) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f0000001680)={{0x1, 0x3, 0xa0000, 0x2, 0x104}, 0x6, 0x3, 'id0\x00', 'timer1\x00', 0x0, 0x101, 0x1, 0x3, 0x2}) ioctl$UFFDIO_UNREGISTER(r3, 0x8010aa01, &(0x7f0000001780)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) dup(r3) 16:07:14 executing program 3: r0 = add_key(&(0x7f0000000180)="7321ea0f0934c5053cf5b3a07668561e91063e3b2486595400", &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000280)="2229fc78be733abd9c8e11b82e052e354424ba241fc01b93b710e7a5e469d384257af63cfbcf0f2c7d286ef061571681912649fd2c51cb391abf63ae8090246d834657c76f8701644061f7b479c0c28b4d82bb3e0dd66f06dfc90cf78c2ad983076e62d6c42cf4466514c23db6cd848c3b277848b89a0e5503362f5bc8018778c38eb78f3b52ee83d30cf415ed6e25c0ec09df26a8030f1e602851717cc8d094319f7007102ff98d4a6fec842077926343cbb762d645c7f6750579aea1a2d7a0dba022c891bd", 0xc6, 0xfffffffffffffffb) r1 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x81, 0x402000) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000006c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="ab000000bdc32913922c6e7f9e7dd91ebb91cb32367df61e108f25e18bb0428a6de4471eab2928c1e4a6c71c11c893f30f3b7f336ac064e8e50faa3f889ce72f32fdf51937735b0e2c4818a2cae8f99da1a9b9aee6bd1a13af0d682b80355dc72140fca787501f9314b96ad62071fe3e8b8f2e8617bf8ae77a975a88c7c22d9bbf7ddab591879edde083fece24a3f1b30e5d4db150ca820afbf2bbad19790a2d0a6be8ff182aa107946ae4a37a88dfc459e2e1cce97338110a284de48a75c224c63138376eaca224b90f60f2664c6a75e162d7afbb02f872fd9c4e73f001350643e7cc7da712e77675ec0bd2c304fce59fc8c79d41393c"], &(0x7f0000000640)=0xb3) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000680)={r2, 0x400, 0x30}, 0xc) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000380)={0x0, 0x2, 0x10, 0x4, 0x7ff}, &(0x7f00000003c0)=0x18) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000400)=@assoc_value={r3, 0xdbe}, 0x8) add_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000080)="a6c7a4b2be059aefee398f33f950e1cd16a952d81e918bb7d4799bd3fd66782cdf3c186719bfbb470d21e73c18c4bf809f50168be4a3332f09b63d2f0aa395058829b9aed881e3a1645657948ecc68e8fd97b43c10ff0f76b64d6b3ab965420092dfcea7ae7c5c59acba1e", 0x6b, r0) request_key(&(0x7f00000001c0)='id_legacy\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a}, &(0x7f0000000240)='logon\x00', 0xffffffffffffffff) keyctl$set_reqkey_keyring(0xe, 0xc7747f7b29a3c7ed) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000440)={{{@in=@dev, @in=@rand_addr}}, {{@in=@local}}}, &(0x7f0000000540)=0xe8) 16:07:14 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1500000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:14 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000300)='/dev/audio#\x00', 0x0, 0x80) write$P9_RSYMLINK(r1, &(0x7f0000000340)={0x14, 0x11, 0x1, {0x66, 0x0, 0x4}}, 0x14) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r4, 0x117, 0x5, 0x0, 0x6) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000380), 0x4) ioctl$KVM_SET_PIT2(r2, 0x4070aea0, &(0x7f00000001c0)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={"626f6e643000000000f98b00"}) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000005000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000040)="0f425f69f20f38f10b650feda5000066b9800000c00f326635004000000f30b80d008ec86666de3c0f01cf260f01cb2665660f3a618c0060540fc76b39", 0x3d}], 0x1, 0x0, &(0x7f00000002c0), 0x0) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$bt_BT_RCVMTU(r4, 0x112, 0xd, &(0x7f00000002c0)=0xf7, 0x2) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) 16:07:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfbffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:14 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x7, 0x0, 0x90, 0x401, 0x1, 0x7f, 0xffffffff}, 0x0) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0xfffffffffffffffc) 16:07:14 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) splice(r0, &(0x7f0000000000), r0, &(0x7f0000000040), 0x0, 0x8) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x10cd}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x12, &(0x7f0000000300)=ANY=[@ANYBLOB="180000154165700000000000bf11000000000000000058ebe4a0bcffb8d11a000000000000950000000000000022531f7c87fca3568e24a0a5c47f91d5d6ef0abf3644ce4eb482c45e42fb93068d5d0cf96e9674ec5cf1ea5ec7012504c2b7f313ecc7f53c8e0d1bdf3d360690e5609843f0f136e3ebed1da5dcc64e519a92dc4dcfafb4412335265ef884de0332ea5c89"], &(0x7f000031cff6)='syzkaller\x00', 0x3c, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x80040, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f00000002c0)={0x3, &(0x7f00000000c0)=[{}, {}, {}]}) 16:07:14 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:14 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000000)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) [ 307.359210] pit: kvm: requested 56990 ns i8254 timer period limited to 200000 ns [ 307.371700] pit: kvm: requested 43580 ns i8254 timer period limited to 200000 ns [ 307.381441] pit: kvm: requested 30171 ns i8254 timer period limited to 200000 ns [ 307.390893] pit: kvm: requested 30171 ns i8254 timer period limited to 200000 ns 16:07:14 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x9000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountstats\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000040)={0x3ff, 0x4, 0x800, 0x0, 0x5}) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000280)=""/169, 0xa9}], 0x1, 0x21b) 16:07:15 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) socketpair(0x4, 0x80003, 0x20f6, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r2, &(0x7f0000000140)={0x14, 0x67, 0x1, {0x40, 0x1, 0x1}}, 0x14) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x12820, 0x0, 0x0, 0x5}, 0x0, 0x0, r2, 0x0) socket$inet(0x2b, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0xff, @remote={0xac, 0x14, 0x14, 0xbb}}, @in6={0xa, 0x4e20, 0x3f, @remote={0xfe, 0x80, [], 0xbb}, 0x7}, @in6={0xa, 0x4e23, 0x8, @mcast2={0xff, 0x2, [], 0x1}, 0x800}, @in6={0xa, 0x4e22, 0x5, @empty, 0x3}, @in6={0xa, 0x4e24, 0x3, @empty, 0x80000000}, @in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xa}}, @in6={0xa, 0x4e24, 0x750c, @empty, 0x1}], 0xbc) sendto$inet(r0, &(0x7f0000001880)="d0", 0x1, 0x20000801, &(0x7f00000011c0)={0x2, 0x4e23}, 0x10) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f0000000200)={0x7, 0x5000}) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') 16:07:16 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x8) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80800) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000040)={@in={{0x2, 0x4e20, @multicast2=0xe0000002}}, 0x0, 0x4, 0x3, "e7158819ebe074cc60f57c5f7899e534a4dd7b78da2206a804bd5176c20e35bb8eb48d09fd729a83c3ecc46c63b7e094b2f1eac3ff66fa557fea85fc16516cd3da5fcafc5f9049c9cbe50e35f926ea43"}, 0xd8) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x48000}, 0x48080) ioctl(r4, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") sendmsg$nl_generic(r3, &(0x7f0000028fc8)={&(0x7f0000007ff4)={0x10}, 0xc, &(0x7f0000015ff0)={&(0x7f0000023000)={0x1c, 0x20, 0xaff, 0x0, 0x0, {0x1000a}, [@generic="fffffe0121"]}, 0x1c}, 0x1}, 0x0) 16:07:16 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) 16:07:16 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x9bf3ffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:16 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x408440, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000100)={{0x9, 0xca8}, 0x0, 0x3, 0x9, {0x0, 0x486d}, 0x400, 0x6}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="a700000069809d405c903e6d6cf7dcac12771d3ab7feab1dd9226bb5d1348989d19be7d94c8dccb77a8ff3416a261f5568ea35ff1b3515f98bc9dfc8ed19ddede61f6f550c9fa73cde4a95fbbe390a5c0302bfdd2ee9b3ea9fd1264aef610489ad462e040a4d818b4a596d80ec73d0d2b9776a90e398926951bcdecd7b33fe16e00b3732a5a9fddb107b056dc6187d5a49d8d55ea3361af888809652deb497670938ba3f7bcc569bf95a26216644c2d58518"], &(0x7f00000000c0)=0xaf) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={r2, @in={{0x2, 0x4e20, @rand_addr=0x9}}}, &(0x7f0000000340)=0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x30, &(0x7f0000000000)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, @in={0x2, 0x0, @rand_addr=0x7fffffff}, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14}}]}, &(0x7f0000000080)=0x10) 16:07:16 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x0, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:16 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00003c1000), 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000300)=[@in={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}], 0x20) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000ac0)="5a1606d3d72c70330ed87cd5459c05dd", 0x10}], 0x1}, 0x8080) sendmsg$alg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000140)) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000140)="ee7e2e3fb08a05ce46c0da6748884ca69a6810c101f744f486df4335cc96144b005b3c0077c2615a320f501962a2046dcb4de3282db71e0599790172e5784146683101e3072b18d68a17791c852360de825fd6402865ab9ba90b19eb9e285d2ac230919bf42b1ba7f95b711ca0bf3c2403218c4c56c01cde1c710bde3051878d862bd7cbf44f39a621b165d30eca61ae32fda9cdaf388bc4af68ec652b2081881a7b06b64cd8e248dbcf1db59bf0f9e6a804bf901a", 0xb5}, {&(0x7f00000003c0)="32951b4989554be78c221538ccbe2bc1d24df2d5a66cda4c295d6966bef2a88836f3968274010eb3a843eb4c60da02d6133f824158d20a96caeca6f4e5ff9f64605f090dfa6e780fb3c908d0beaf8ece46d2b867b443818a405299be73bd2308d7028cb5c6e7685b33d770cebf2a957c7d686966e07be32d6c48af6e24bdcad64e5d66e9a0e39e74afa653196744cdccbfa8ba5a88", 0x95}], 0x2, 0xe) recvmsg(r2, &(0x7f0000000a80)={&(0x7f0000000480)=@pppol2tpin6, 0x80, &(0x7f0000000080)=[{&(0x7f0000000280)=""/92, 0x200002dc}], 0x1, &(0x7f0000000a00)=""/111, 0x6f}, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x220080, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0x80045500, &(0x7f0000000500)) 16:07:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2300, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:16 executing program 0: socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001700)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000001140)=[{&(0x7f0000000080)="7588eaf7fd459aab10f2b049194efb15d2b3ef88cf60c23476fda1a96d9b982122695d6b9a61210aedb4d56184134a04e7ba94f4150cccadef9d37a5f46b0cda0e9afdd01399e0fe0fa1726fbf87ddbbe0d5b3249c28522709a6141b97d28a72eba69e2f89dbd93778c7f0c1315db7020508e918e3b4f0f212906327a6a8b2be36e915c12901ce9566", 0x89}, {&(0x7f0000000140)="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", 0x1000}], 0x2) r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x3) r2 = syz_open_dev$admmidi(&(0x7f0000001180)='/dev/admmidi#\x00', 0x769, 0x402041) sendmsg$inet_sctp(r2, &(0x7f00000016c0)={&(0x7f00000011c0)=@in6={0xa, 0x4e20, 0x7, @local={0xfe, 0x80, [], 0xaa}, 0x7}, 0x1c, &(0x7f0000001640)=[{&(0x7f0000001200)="efc76852bed2f89b62d800ca9b74956aeea0eaefd30b50210a7237e791f7b27709ba0e3250753c26f11252a6916fa4376470526946336e157277c658e112", 0x3e}, {&(0x7f0000001240)="a200ec90488165e800a7c8", 0xb}, {&(0x7f0000001280)="9c4d5a7061756cd9c43e1eb58a3ff861039ac9c10d3df56c7e859013ac54669bb869b08a57f8838be1523e811edf3d27c2d0", 0x32}, {&(0x7f00000012c0)="ef38d29d753babe412a954da200d0159f8e25e3af57e0dabad840fac2111c2852129f91ff087387b5a56ff3f108c5649cb64c5741afe47c4021f1081b2ca7681743705ca3a5e77bc47446b68fad17c5159513cc57a2acc167b8717e93d0c299107b58a64c3974d1986f27b6cdd464565861447a9a285559b8fb639268f019b82b81a467e649ea768d13914220ac2e994af1bb18b7759bfb494222ebe775ec8dc7b9c41a7c924f94a40716ae31c8009a7143f4f05de0b3677f988b685d30d91aa042340ae51c26191221ab0d48859f685", 0xd0}, {&(0x7f00000013c0)="f80ec8f431f345e944c0903e683c6b97f9c638e1cb8117a3bd5f36c10bcd80a1e488e5ff0206f7a49fa4dec4fc428ed9897a699e94e4c8ed3554a41d8c6972b102bef16c396e2553fa8f2bb324c95c4a2916ecd47aa735cac71faf157cd1ccea26fdce127b2505befdb43faee4111627a44a304dfe0682926794977e8e5a1b10b5d5b9da1ded5aba8653e6b5a4b1ed1c2890d7be1381006a8b17d7940eb7e0bd0ad98df760", 0xa5}, {&(0x7f0000001480)="1d1949", 0x3}, {&(0x7f00000014c0)="9c602abab2d88e534ff216d2b3833b67ac9df034f0a7bac44c1be73c66c79f3f4510f0e669af666c85339f8cbc80e6ebb35d5f4929fc80ac6c35bef4291ba911e6ea5bdf5fc36bd3d97c5df5b3bb56f0741e348a7135fd23b31bc077d7a599c649beee0263ca07635709f31084b856fb2d08275a6b05175aec3db8fe34b411aecac5dcb3f15ac50cf014599d360e4816286c95f820bce97f110caa21cf4737afbf8c5602f98324da6de0362b8697dc8624863ec923ed540b8905e62d2ccbb978d68a0fc156a4825f2627796c5ab61eef393b0a9ab2869c6ecf1ce6bfb92a64074f7e93edae2b", 0xe6}, {&(0x7f00000015c0)="be2f96ae95a661e70f9c934b561e0ee569c1050f17ad299a192fe0dadcfa60c573bb66025c2ad6852f67c4ef2ecdd6d61752122654654eb1e821d4f5fe2b053281946052a560981c919e622dabe4da328300bbb676f98c107cba13eaadec94cec6f32839", 0x64}], 0x8, 0x0, 0x0, 0x40041}, 0x40) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000000), 0x2) 16:07:16 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:16 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa0010000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:16 executing program 1 (fault-call:10 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:16 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0xffffffffffffffff, &(0x7f0000000400), &(0x7f00000003c0), &(0x7f0000000440), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x40) fcntl$addseals(r0, 0x409, 0xc) r1 = open(&(0x7f0000000000)='./file0\x00', 0x400, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r2, 0x2, 0x0, 0x0, 0x0, @ib={0x1b, 0x2, 0x3, {"c588023a6dc21ce3a3c69612bdb42d30"}, 0xd370, 0x2, 0x2}, @in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x19}}}}, 0x118) ioctl$sock_inet_sctp_SIOCINQ(r1, 0x541b, &(0x7f0000000380)) 16:07:16 executing program 3: getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) 16:07:16 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f00000000c0)="3ed82b0f01cb3e360fa2ba4200ed670f08b8dd0b8ec8d9fd0f3066b9800000c00f326635002000000f300f233a", 0x2d}], 0x1, 0x0, &(0x7f0000000140), 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r3, 0x4018ae51, &(0x7f0000000140)={0x2, 0x3, 0x7f}) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f0000000040)={0x3}) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x0, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SMI(r4, 0xaeb7) ioctl$KVM_RUN(r4, 0xae80, 0x0) 16:07:17 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(ecb-camellia-asm)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r2 = accept$alg(r1, 0x0, 0x0) flock(r2, 0x9) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmsg(r2, &(0x7f0000003700)={&(0x7f0000000100)=@ax25, 0x80, &(0x7f00000035c0)=[{&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f0000000280)=""/47, 0x2f}, {&(0x7f00000025c0)=""/4096, 0x1000}], 0x3, &(0x7f0000003640)=""/186, 0xba}, 0x0) 16:07:17 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x400000000000000, 0x400000000000) 16:07:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000000c0)=ANY=[@ANYBLOB="050000000000000000000005000000000100000000004000000000010000000000000025000000ffffffff00040000000000000a00000006ed"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000080)={0x1, 0x0, [{0x186, 0x0, 0x80000}]}) r3 = open(&(0x7f0000000000)='./file0\x00', 0x20000, 0xc0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, &(0x7f0000000100)={0x8, 0x0, 0x10000}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000040)={0x3}, 0x1) [ 309.833593] FAULT_INJECTION: forcing a failure. [ 309.833593] name failslab, interval 1, probability 0, space 0, times 0 [ 309.845109] CPU: 0 PID: 23616 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 309.853611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.863003] Call Trace: [ 309.865589] dump_stack+0x1c9/0x2b4 [ 309.869201] ? dump_stack_print_info.cold.2+0x52/0x52 [ 309.874376] ? lock_acquire+0x1e4/0x540 [ 309.878342] ? get_pid_task+0xd8/0x1a0 [ 309.882221] should_fail.cold.4+0xa/0x11 [ 309.886267] ? lock_release+0xa30/0xa30 [ 309.890228] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 309.895331] ? find_vpid+0xf0/0xf0 [ 309.898873] ? __f_unlock_pos+0x19/0x20 [ 309.902834] ? lock_downgrade+0x8f0/0x8f0 [ 309.906979] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 309.912523] ? proc_fail_nth_write+0x9e/0x210 [ 309.917013] ? proc_cwd_link+0x1d0/0x1d0 [ 309.921068] ? lock_acquire+0x1e4/0x540 [ 309.925035] ? lock_acquire+0x1e4/0x540 [ 309.929013] ? fs_reclaim_acquire+0x20/0x20 [ 309.933326] ? lock_downgrade+0x8f0/0x8f0 [ 309.937479] ? check_same_owner+0x340/0x340 [ 309.941806] ? fsnotify_first_mark+0x350/0x350 [ 309.946383] ? __fsnotify_parent+0xcc/0x420 [ 309.950696] ? rcu_note_context_switch+0x730/0x730 [ 309.955612] ? fsnotify+0x14e0/0x14e0 [ 309.959421] __should_failslab+0x124/0x180 [ 309.963671] should_failslab+0x9/0x14 [ 309.967488] __kmalloc_track_caller+0x2c4/0x760 [ 309.972358] ? strncpy_from_user+0x510/0x510 [ 309.976762] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 309.982329] ? strndup_user+0x77/0xd0 [ 309.986128] memdup_user+0x2c/0xa0 [ 309.989688] strndup_user+0x77/0xd0 [ 309.993311] ksys_mount+0x3c/0x140 [ 309.996844] __x64_sys_mount+0xbe/0x150 [ 310.000818] do_syscall_64+0x1b9/0x820 [ 310.004699] ? finish_task_switch+0x1d3/0x870 [ 310.009202] ? syscall_return_slowpath+0x5e0/0x5e0 [ 310.014213] ? syscall_return_slowpath+0x31d/0x5e0 [ 310.019143] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 310.024157] ? prepare_exit_to_usermode+0x291/0x3b0 [ 310.029170] ? perf_trace_sys_enter+0xb10/0xb10 [ 310.033839] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 310.038676] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.043854] RIP: 0033:0x455ab9 [ 310.047027] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 310.066190] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 310.073895] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 16:07:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x97ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 16:07:17 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7400, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:17 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:17 executing program 1 (fault-call:10 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 310.081246] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 310.088518] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 310.095793] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 310.103065] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000000 16:07:17 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'veth1_to_bond\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={@mcast1={0xff, 0x1, [], 0x1}, 0x4f, r1}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r4 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$SCSI_IOCTL_GET_IDLUN(r3, 0x5382, &(0x7f0000000000)) ioctl$RTC_EPOCH_SET(r2, 0x4008700e, 0x0) dup2(r4, r3) 16:07:17 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) write$sndseq(r0, &(0x7f00000001c0)=[{0x4d, 0x4, 0x6, 0x5, @time, {0x599b, 0x8001}, {0x1, 0x4}, @addr={0x1f, 0x3}}, {0x101, 0x1, 0x7, 0x5, @tick=0x7fffffff, {0x4, 0x7c04}, {0x7}, @addr={0x1, 0xff}}], 0x60) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) r1 = getpgid(0x0) wait4(r1, &(0x7f0000000000), 0x40000004, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000000, 0x400000000000, 0x14002) 16:07:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003c1000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, 0x0, 0x0, 0x0, 0x0, {0x1}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6}]}]}, 0x28}, 0x1}, 0x0) r2 = fcntl$getown(r0, 0x9) r3 = getpgrp(0xffffffffffffffff) rt_tgsigqueueinfo(r2, r3, 0x30, &(0x7f0000000100)={0x10, 0x7, 0x180000, 0xe20}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000040)=0x2, 0x4) getsockname$packet(r1, &(0x7f0000000080), &(0x7f00000000c0)=0x14) [ 310.491904] kvm [23638]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0x186 data 0x80000 [ 310.511306] kvm [23638]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0x186 data 0x80000 16:07:18 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x37dc12502000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:18 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:18 executing program 4: sched_setattr(0x0, &(0x7f0000000040)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00001f0ff8)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000bc000)=@abs, 0x8) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) write$P9_RWSTAT(r2, &(0x7f00000000c0)={0x6, 0x7f, 0x1}, 0x7) poll(&(0x7f0000000000)=[{r1, 0x84ae}], 0x1, 0x0) close(r0) 16:07:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffff0700, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) [ 310.759670] FAULT_INJECTION: forcing a failure. [ 310.759670] name failslab, interval 1, probability 0, space 0, times 0 [ 310.771112] CPU: 1 PID: 23676 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 310.779657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.789001] Call Trace: [ 310.791600] dump_stack+0x1c9/0x2b4 [ 310.795226] ? dump_stack_print_info.cold.2+0x52/0x52 [ 310.800432] ? __kernel_text_address+0xd/0x40 [ 310.804936] ? unwind_get_return_address+0x61/0xa0 [ 310.809859] should_fail.cold.4+0xa/0x11 [ 310.813925] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 310.819036] ? save_stack+0xa9/0xd0 [ 310.822655] ? save_stack+0x43/0xd0 [ 310.826283] ? kasan_kmalloc+0xc4/0xe0 [ 310.830158] ? __kmalloc_track_caller+0x14a/0x760 [ 310.835001] ? memdup_user+0x2c/0xa0 [ 310.838712] ? strndup_user+0x77/0xd0 [ 310.842522] ? ksys_mount+0x3c/0x140 [ 310.846247] ? do_syscall_64+0x1b9/0x820 [ 310.850305] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.855667] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 310.861207] ? proc_fail_nth_write+0x9e/0x210 [ 310.865692] ? proc_cwd_link+0x1d0/0x1d0 [ 310.869833] ? lock_acquire+0x1e4/0x540 [ 310.873796] ? lock_acquire+0x1e4/0x540 [ 310.877760] ? fs_reclaim_acquire+0x20/0x20 [ 310.882075] ? lock_downgrade+0x8f0/0x8f0 [ 310.886401] ? check_same_owner+0x340/0x340 [ 310.890710] ? lock_release+0xa30/0xa30 [ 310.894672] ? rcu_note_context_switch+0x730/0x730 [ 310.899586] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 310.904606] __should_failslab+0x124/0x180 [ 310.908836] should_failslab+0x9/0x14 [ 310.912625] __kmalloc_track_caller+0x2c4/0x760 [ 310.917291] ? strncpy_from_user+0x510/0x510 [ 310.921690] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 310.927230] ? strndup_user+0x77/0xd0 [ 310.931032] memdup_user+0x2c/0xa0 [ 310.934563] strndup_user+0x77/0xd0 [ 310.938177] ksys_mount+0x73/0x140 [ 310.941705] __x64_sys_mount+0xbe/0x150 [ 310.945669] do_syscall_64+0x1b9/0x820 [ 310.949555] ? finish_task_switch+0x1d3/0x870 [ 310.954044] ? syscall_return_slowpath+0x5e0/0x5e0 [ 310.958968] ? syscall_return_slowpath+0x31d/0x5e0 [ 310.963889] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 310.968892] ? prepare_exit_to_usermode+0x291/0x3b0 [ 310.973924] ? perf_trace_sys_enter+0xb10/0xb10 [ 310.978592] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 310.983442] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 310.988616] RIP: 0033:0x455ab9 [ 310.991789] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:07:18 executing program 1 (fault-call:10 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 311.010972] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 311.018669] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 311.025943] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 311.033372] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 311.040632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 311.048070] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000001 16:07:18 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000000)="ef") r0 = getpgid(0x0) perf_event_open(&(0x7f00000001c0)={0x7, 0x70, 0x9, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x40080, 0x1, 0x7, 0x1ff, 0x4, 0x0, 0x5, 0x7, 0x9ed, 0x7, 0x2, 0x32e, 0x4, 0x2, 0x9, 0x8, 0x3, 0x7, 0x2400000, 0x200, 0x3, 0x2, 0x2, 0x113, 0x200, 0xfff, 0x4, 0x6, 0x7, 0xfffffffeffffffff, 0x0, 0x1000, 0x2, @perf_bp={&(0x7f0000000040), 0x4}, 0x88, 0x401, 0x1000, 0x7, 0x34, 0x800, 0x3}, r0, 0xf, 0xffffffffffffff9c, 0x9) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 16:07:18 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='.\x00', &(0x7f0000000100)='bpf\x00', 0x40, 0x0) 16:07:18 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80000, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000140)) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f0000000040)) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000100)) getpeername(r1, &(0x7f0000000080)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, &(0x7f0000000380)=0x80) 16:07:18 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffff7f, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:18 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x74000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) [ 311.532561] FAULT_INJECTION: forcing a failure. [ 311.532561] name failslab, interval 1, probability 0, space 0, times 0 [ 311.543974] CPU: 0 PID: 23724 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 311.552481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.561842] Call Trace: [ 311.564461] dump_stack+0x1c9/0x2b4 [ 311.568164] ? dump_stack_print_info.cold.2+0x52/0x52 [ 311.573433] ? __kernel_text_address+0xd/0x40 [ 311.577970] ? unwind_get_return_address+0x61/0xa0 [ 311.582921] should_fail.cold.4+0xa/0x11 [ 311.586980] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 311.592162] ? save_stack+0xa9/0xd0 [ 311.595779] ? kasan_kmalloc+0xc4/0xe0 [ 311.599658] ? __kmalloc_track_caller+0x14a/0x760 [ 311.604519] ? memdup_user+0x2c/0xa0 [ 311.608265] ? strndup_user+0x77/0xd0 [ 311.612068] ? ksys_mount+0x73/0x140 [ 311.615785] ? __x64_sys_mount+0xbe/0x150 [ 311.619935] ? do_syscall_64+0x1b9/0x820 [ 311.624007] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 311.629553] ? __sched_text_start+0x8/0x8 [ 311.633710] ? lock_acquire+0x1e4/0x540 [ 311.637689] ? fs_reclaim_acquire+0x20/0x20 [ 311.642002] ? lock_downgrade+0x8f0/0x8f0 [ 311.646147] ? check_same_owner+0x340/0x340 [ 311.650466] ? lock_release+0xa30/0xa30 [ 311.654434] ? check_same_owner+0x340/0x340 [ 311.658745] ? rcu_note_context_switch+0x730/0x730 [ 311.663676] ? __check_object_size+0xa3/0x5d7 [ 311.668171] __should_failslab+0x124/0x180 [ 311.672396] should_failslab+0x9/0x14 [ 311.676201] kmem_cache_alloc_trace+0x2cb/0x780 [ 311.680865] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 311.686405] ? _copy_from_user+0xdf/0x150 [ 311.690552] copy_mount_options+0x5f/0x380 [ 311.694776] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 311.700303] ksys_mount+0xd0/0x140 [ 311.703830] __x64_sys_mount+0xbe/0x150 [ 311.707796] do_syscall_64+0x1b9/0x820 [ 311.711697] ? syscall_slow_exit_work+0x500/0x500 [ 311.716528] ? syscall_return_slowpath+0x5e0/0x5e0 [ 311.721452] ? syscall_return_slowpath+0x31d/0x5e0 [ 311.726391] ? prepare_exit_to_usermode+0x291/0x3b0 [ 311.731394] ? perf_trace_sys_enter+0xb10/0xb10 [ 311.736164] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 311.741002] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 311.746177] RIP: 0033:0x455ab9 [ 311.749365] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 311.768541] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 311.776237] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 16:07:19 executing program 1 (fault-call:10 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 16:07:19 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000003c0)='net/xfrm_stat\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='\x00'}, 0x10) epoll_pwait(r1, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x6, 0x8, &(0x7f0000000380)={0x4}, 0x8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0x14) bind$packet(r1, &(0x7f00000001c0)={0x11, 0x17, r2, 0x1, 0x6, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) fdatasync(r1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)={0x0, 0x0}) wait4(r3, &(0x7f0000000340), 0x3ffffffc, &(0x7f0000000280)) pselect6(0x40, &(0x7f0000000400)={0x9, 0x1ff, 0x9, 0x101, 0xffffffff, 0x7, 0xb2, 0x5}, &(0x7f0000000440)={0x4, 0x85, 0x7, 0x80, 0x80, 0x80000001, 0xdee4, 0x7}, &(0x7f0000000480)={0x5a0c8ed5, 0x4, 0x6, 0x100000000, 0x3, 0x8, 0x8, 0x7fffffff}, &(0x7f00000004c0), &(0x7f0000000540)={&(0x7f0000000500)={0x1}, 0x8}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) [ 311.783499] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 311.790756] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 311.798014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 311.805268] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000002 16:07:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_settime(0x0, &(0x7f0000000100)={0x77359400}) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x4000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'vcan0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000005c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000580)={&(0x7f0000000200)=ANY=[@ANYBLOB="300000002600000727bd7000fedbdf2500000000", @ANYRES32=r1, @ANYBLOB="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"], 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x400, 0x0) accept4$vsock_stream(r2, &(0x7f00000000c0)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x800) 16:07:19 executing program 4: recvmsg(0xffffffffffffffff, &(0x7f0000001580)={&(0x7f0000000040)=ANY=[], 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000400)=""/17, 0x11}, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='attr/fscreate\x00') epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000000)={0x18}) pwritev(r0, &(0x7f0000001400), 0x2a6, 0x7ffffffff000) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast1=0xe0000001, @broadcast=0xffffffff, @multicast1=0xe0000001}, 0xc) sendfile(r0, r0, &(0x7f0000000040), 0x101) 16:07:19 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 16:07:19 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000240)=ANY=[]) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = fanotify_init(0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x80, @loopback={0x0, 0x1}, 0x80000001}}}, &(0x7f0000000180)=0x84) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000240)={r3, 0x10, &(0x7f0000000200)=[@in={0x2, 0x4e21, @multicast2=0xe0000002}]}, &(0x7f0000000280)=0x10) fanotify_mark(r1, 0x19, 0x2, r0, &(0x7f00000001c0)='.\x00') 03:33:20 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)="1402010000000000ee", 0x9) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x80000000, 0x2) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000100), 0x4) ioctl$TCXONC(r1, 0x540a, 0x3ff) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @local={0xac, 0x14, 0x14, 0xaa}}, 0x8) sendto$inet(r0, &(0x7f0000e76000)="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", 0x5b5, 0x804, &(0x7f0000bc8ff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x200000, 0x0) 03:33:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 03:33:20 executing program 5: shmat(0x0, &(0x7f0000e00000/0x200000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) shmget$private(0x0, 0x3000, 0x200, &(0x7f0000ee6000/0x3000)=nil) 03:33:20 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffff39b, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 312.476193] FAULT_INJECTION: forcing a failure. [ 312.476193] name failslab, interval 1, probability 0, space 0, times 0 [ 312.487668] CPU: 1 PID: 23775 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 312.496320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.505852] Call Trace: [ 312.508450] dump_stack+0x1c9/0x2b4 [ 312.512070] ? dump_stack_print_info.cold.2+0x52/0x52 [ 312.517274] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 312.522284] ? bpf_prog_kallsyms_find+0xde/0x4c0 [ 312.527051] should_fail.cold.4+0xa/0x11 [ 312.531115] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 312.536224] ? lock_release+0xa30/0xa30 [ 312.540196] ? kasan_check_read+0x11/0x20 [ 312.544341] ? rcu_is_watching+0x8c/0x150 [ 312.548501] ? is_bpf_text_address+0xd7/0x170 [ 312.552998] ? kernel_text_address+0x79/0xf0 [ 312.557401] ? __kernel_text_address+0xd/0x40 [ 312.561887] ? lock_acquire+0x1e4/0x540 [ 312.565860] ? fs_reclaim_acquire+0x20/0x20 [ 312.570175] ? lock_downgrade+0x8f0/0x8f0 [ 312.575149] ? check_same_owner+0x340/0x340 [ 312.579474] ? save_stack+0xa9/0xd0 [ 312.583102] ? rcu_note_context_switch+0x730/0x730 [ 312.588127] ? kmem_cache_alloc_trace+0x152/0x780 [ 312.592961] ? copy_mount_options+0x5f/0x380 [ 312.597375] __should_failslab+0x124/0x180 [ 312.601621] should_failslab+0x9/0x14 [ 312.605418] kmem_cache_alloc+0x2af/0x760 [ 312.609557] ? lock_acquire+0x1e4/0x540 [ 312.613532] getname_flags+0xd0/0x5a0 [ 312.617329] user_path_at_empty+0x2d/0x50 [ 312.621485] do_mount+0x180/0x1fb0 [ 312.625023] ? check_same_owner+0x340/0x340 [ 312.629336] ? lock_release+0xa30/0xa30 [ 312.633315] ? check_same_owner+0x340/0x340 [ 312.637632] ? copy_mount_string+0x40/0x40 [ 312.641863] ? kasan_kmalloc+0xc4/0xe0 [ 312.645744] ? kmem_cache_alloc_trace+0x318/0x780 [ 312.650583] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 312.656111] ? _copy_from_user+0xdf/0x150 [ 312.660255] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 312.665791] ? copy_mount_options+0x285/0x380 [ 312.670301] ksys_mount+0x12d/0x140 [ 312.673925] __x64_sys_mount+0xbe/0x150 [ 312.677937] do_syscall_64+0x1b9/0x820 [ 312.681820] ? finish_task_switch+0x1d3/0x870 [ 312.686329] ? syscall_return_slowpath+0x5e0/0x5e0 [ 312.691252] ? syscall_return_slowpath+0x31d/0x5e0 [ 312.696278] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 312.701288] ? prepare_exit_to_usermode+0x291/0x3b0 [ 312.706294] ? perf_trace_sys_enter+0xb10/0xb10 [ 312.710955] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 312.715790] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 312.720972] RIP: 0033:0x455ab9 [ 312.724149] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 312.743329] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 312.751042] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 312.758323] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 312.766113] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 03:33:20 executing program 1 (fault-call:10 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 312.773458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 312.780715] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000003 03:33:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xffffffffffffffc1, 0x2000) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) bind$alg(r0, &(0x7f0000000180)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(aegis256)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ffffffff82f4dd6f515b9aad52af35285c860709ce151e788f9eae9b03790126", 0x20) r2 = accept$alg(r0, 0x0, 0x0) recvmmsg(r2, &(0x7f000000cfc0)=[{{&(0x7f0000000100)=@ax25, 0x80, &(0x7f000000cec0)=[{&(0x7f00000014c0)=""/4096, 0x1000}], 0x1, &(0x7f000000cf40)=""/99, 0x63}}], 0x1, 0x0, &(0x7f000000d180)) 03:33:20 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0xfe, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)=@ipv4_newrule={0x34, 0x20, 0xa3bc010931239d7f, 0x0, 0x0, {0x2, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, [@FRA_GENERIC_POLICY=@FRA_UID_RANGE={0xc, 0x14}, @FRA_SRC={0x8, 0x2, @rand_addr}]}, 0x34}, 0x1}, 0x0) [ 313.284772] FAT-fs (loop0): bogus number of reserved sectors [ 313.290842] FAT-fs (loop0): Can't find a valid FAT filesystem 03:33:20 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:21 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x4) [ 313.343189] FAT-fs (loop0): bogus number of reserved sectors [ 313.349125] FAT-fs (loop0): Can't find a valid FAT filesystem 03:33:21 executing program 0: r0 = epoll_create1(0x0) io_setup(0xdb51, &(0x7f0000000040)=0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x203, 0x0) io_cancel(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x8, r0, &(0x7f0000000080)="913dc05a86b06be7bd6242f3898c9f8ccd2fc6c2a56be61a06d7aa0ddcea787a63b79cd9ba96468f69395f1ad5dd99e47abbebe3dd0c04328acab705231fdb4fe6a68b153ccd7fbb8bbd82a3edb3836b46ce4d8e9ac85d771dc33ae4f5dec91042828fedfd4fa127b17b185598b3863be61a57aa688f63602922c39a20c072c1bb9c", 0x82, 0x7f, 0x0, 0x1, r2}, &(0x7f00000001c0)) epoll_create1(0x0) fsetxattr(r0, &(0x7f0000000c80)=@random={'security.', '/selinux/enforce\x00'}, &(0x7f0000000000)="eca5ba1bcd4179be815a498512c718", 0xf, 0x80) 03:33:21 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xedc0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) [ 313.468156] FAULT_INJECTION: forcing a failure. [ 313.468156] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 313.480016] CPU: 0 PID: 23827 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 313.488515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.497969] Call Trace: [ 313.500581] dump_stack+0x1c9/0x2b4 [ 313.504207] ? dump_stack_print_info.cold.2+0x52/0x52 [ 313.509426] ? trace_hardirqs_on+0x10/0x10 [ 313.513684] should_fail.cold.4+0xa/0x11 [ 313.517747] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 313.522847] ? kasan_check_read+0x11/0x20 [ 313.526992] ? trace_hardirqs_on+0x10/0x10 [ 313.531490] ? trace_hardirqs_on+0x10/0x10 [ 313.535746] ? mnt_get_count+0x150/0x150 [ 313.539805] ? dput.part.26+0x276/0x7a0 [ 313.543775] ? shrink_dcache_sb+0x350/0x350 [ 313.548096] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 313.553286] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 313.558820] ? should_fail+0x246/0xd86 [ 313.562723] ? is_bpf_text_address+0xae/0x170 [ 313.567214] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 313.572306] __alloc_pages_nodemask+0x36e/0xdb0 [ 313.576979] ? kasan_check_read+0x11/0x20 [ 313.581126] ? rcu_is_watching+0x8c/0x150 [ 313.585279] ? __alloc_pages_slowpath+0x2d00/0x2d00 [ 313.590299] ? is_bpf_text_address+0xd7/0x170 [ 313.594793] ? kernel_text_address+0x79/0xf0 [ 313.599211] ? __kernel_text_address+0xd/0x40 [ 313.603706] ? lock_acquire+0x1e4/0x540 [ 313.607675] ? fs_reclaim_acquire+0x20/0x20 [ 313.611997] ? lock_downgrade+0x8f0/0x8f0 [ 313.616140] ? lock_release+0xa30/0xa30 [ 313.620107] ? check_same_owner+0x340/0x340 [ 313.624439] ? save_stack+0xa9/0xd0 [ 313.628061] cache_grow_begin+0x91/0x710 [ 313.632117] kmem_cache_alloc+0x689/0x760 [ 313.636271] ? lock_acquire+0x1e4/0x540 [ 313.640246] getname_flags+0xd0/0x5a0 [ 313.644041] user_path_at_empty+0x2d/0x50 [ 313.648187] do_mount+0x180/0x1fb0 [ 313.651714] ? check_same_owner+0x340/0x340 [ 313.656027] ? lock_release+0xa30/0xa30 [ 313.660001] ? check_same_owner+0x340/0x340 [ 313.664780] ? copy_mount_string+0x40/0x40 [ 313.669015] ? kasan_kmalloc+0xc4/0xe0 [ 313.672904] ? kmem_cache_alloc_trace+0x318/0x780 [ 313.677742] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 313.683361] ? _copy_from_user+0xdf/0x150 [ 313.687504] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 313.693033] ? copy_mount_options+0x285/0x380 [ 313.697520] ksys_mount+0x12d/0x140 [ 313.701140] __x64_sys_mount+0xbe/0x150 [ 313.705105] do_syscall_64+0x1b9/0x820 [ 313.708985] ? finish_task_switch+0x1d3/0x870 [ 313.713472] ? syscall_return_slowpath+0x5e0/0x5e0 [ 313.718393] ? syscall_return_slowpath+0x31d/0x5e0 [ 313.723318] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 313.728328] ? prepare_exit_to_usermode+0x291/0x3b0 [ 313.733330] ? perf_trace_sys_enter+0xb10/0xb10 [ 313.737988] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 313.742837] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 313.748449] RIP: 0033:0x455ab9 03:33:21 executing program 1 (fault-call:10 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 313.751638] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 313.770918] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 313.778640] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 313.785908] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 313.793189] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 313.800449] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 313.807730] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000004 03:33:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000b5dfa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha1-avx\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r1, 0x0, 0x4, 0x0) sendfile(r1, r2, &(0x7f0000000000), 0x400) 03:33:21 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000100)) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) fallocate(r1, 0x0, 0x0, 0x10000) socket$inet6(0xa, 0x0, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1c3, 0x0, &(0x7f0000000580), 0x0) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x800) sendfile(r1, r6, &(0x7f0000d83ff8), 0x8000fffffffe) 03:33:21 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x20000, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x100013, r0, 0x0) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$VT_DISALLOCATE(r1, 0x5608) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 03:33:22 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:22 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000140)=0x4, 0x1) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="696f63a821727365743d61736369692c00"]) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) creat(&(0x7f0000000180)='./file0/file0\x00', 0x20) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) 03:33:22 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x9bf3, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:22 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x6, 0x400000) openat$cgroup_ro(r1, &(0x7f0000000180)='io.stat\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e22}, 0x1c) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) getpeername$unix(r3, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r2, &(0x7f00000003c0), 0x0, 0x4008000, 0x0, 0x0) write$binfmt_script(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0xb) 03:33:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) [ 314.459662] FAULT_INJECTION: forcing a failure. [ 314.459662] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 314.471550] CPU: 0 PID: 23882 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 314.480026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.489370] Call Trace: [ 314.491952] dump_stack+0x1c9/0x2b4 [ 314.495578] ? dump_stack_print_info.cold.2+0x52/0x52 [ 314.500760] ? trace_hardirqs_on+0x10/0x10 [ 314.504984] should_fail.cold.4+0xa/0x11 [ 314.509058] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 314.514188] ? kasan_check_read+0x11/0x20 [ 314.518331] ? trace_hardirqs_on+0x10/0x10 [ 314.522553] ? trace_hardirqs_on+0x10/0x10 [ 314.526775] ? mnt_get_count+0x150/0x150 [ 314.530827] ? dput.part.26+0x276/0x7a0 [ 314.534790] ? shrink_dcache_sb+0x350/0x350 [ 314.539122] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 314.544132] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 314.549659] ? should_fail+0x246/0xd86 [ 314.553533] ? is_bpf_text_address+0xae/0x170 [ 314.558032] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 314.563135] __alloc_pages_nodemask+0x36e/0xdb0 [ 314.567793] ? kasan_check_read+0x11/0x20 [ 314.571936] ? rcu_is_watching+0x8c/0x150 [ 314.576074] ? __alloc_pages_slowpath+0x2d00/0x2d00 [ 314.581078] ? is_bpf_text_address+0xd7/0x170 [ 314.585563] ? kernel_text_address+0x79/0xf0 [ 314.589962] ? __kernel_text_address+0xd/0x40 [ 314.594449] ? lock_acquire+0x1e4/0x540 [ 314.599367] ? fs_reclaim_acquire+0x20/0x20 [ 314.603688] ? lock_downgrade+0x8f0/0x8f0 [ 314.608022] ? lock_release+0xa30/0xa30 [ 314.611984] ? check_same_owner+0x340/0x340 [ 314.616293] ? save_stack+0xa9/0xd0 [ 314.619907] cache_grow_begin+0x91/0x710 [ 314.623968] kmem_cache_alloc+0x689/0x760 [ 314.628114] getname_flags+0xd0/0x5a0 [ 314.631901] user_path_at_empty+0x2d/0x50 [ 314.636037] do_mount+0x180/0x1fb0 [ 314.639562] ? kasan_check_write+0x14/0x20 [ 314.643782] ? copy_mount_string+0x40/0x40 [ 314.648005] ? kasan_kmalloc+0xc4/0xe0 [ 314.651895] ? kmem_cache_alloc_trace+0x318/0x780 [ 314.656730] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 314.662258] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 314.667797] ? copy_mount_options+0x285/0x380 [ 314.672282] ksys_mount+0x12d/0x140 [ 314.677125] __x64_sys_mount+0xbe/0x150 [ 314.681111] do_syscall_64+0x1b9/0x820 [ 314.684989] ? finish_task_switch+0x1d3/0x870 [ 314.689474] ? syscall_return_slowpath+0x5e0/0x5e0 [ 314.694392] ? syscall_return_slowpath+0x31d/0x5e0 [ 314.699334] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 314.704341] ? prepare_exit_to_usermode+0x291/0x3b0 [ 314.709368] ? perf_trace_sys_enter+0xb10/0xb10 [ 314.714060] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 314.718896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 314.724079] RIP: 0033:0x455ab9 [ 314.727545] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 314.746734] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 03:33:22 executing program 1 (fault-call:10 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 314.754445] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 314.761707] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 314.768963] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 314.776586] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 314.783939] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000005 03:33:22 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x400000) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000040)={0x3, 0x28, [0xff, 0x26, 0x100, 0x8, 0x7, 0x6, 0x5, 0x6, 0x6, 0x3]}) write$P9_RLCREATE(r0, &(0x7f00000001c0)={0x18, 0xf, 0x1, {{0x40, 0x0, 0x5}, 0x5}}, 0x18) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 03:33:22 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x28e, 0xfffffffffffffffb, 0x0) [ 315.175308] hfs: unable to parse mount options 03:33:22 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffff7f, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 315.211712] FAT-fs (loop0): Unrecognized mount option "ioc¨!rset=ascii" or missing value 03:33:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) epoll_create(0x5) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}, [@IFLA_GROUP={0x8, 0x1b}]}, 0x28}, 0x1}, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x1f, 0x410401) write$FUSE_DIRENT(r1, &(0x7f0000000240)={0x158, 0xfffffffffffffffe, 0x1, [{0x0, 0x3, 0x30, 0x2, 'posix_acl_accesseth0(wlan1/$[usereth0systemwlan0'}, {0x0, 0x5, 0x39, 0xffffffffffff0000, 'vboxnet1[keyringproc-\']/systemeth0posix_acl_accessselinux'}, {0x4, 0xfffffffffffffff9, 0x6, 0xc552, '\\ppp0/'}, {0x5, 0xd7c9, 0x18, 0x80, ':ppp0procppp1*^vboxnet1.'}, {0x6, 0xffffffffffffffa6, 0x3b, 0x4, 'systemvboxnet0trustedposix_acl_access.selfeth1wlan0ppp1proc'}]}, 0x158) 03:33:22 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x650c, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) [ 315.388065] hfs: unable to parse mount options [ 315.403316] FAULT_INJECTION: forcing a failure. [ 315.403316] name failslab, interval 1, probability 0, space 0, times 0 [ 315.414832] CPU: 0 PID: 23944 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 315.423346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.432711] Call Trace: [ 315.435303] dump_stack+0x1c9/0x2b4 [ 315.438927] ? dump_stack_print_info.cold.2+0x52/0x52 [ 315.444120] ? putname+0xf2/0x130 [ 315.447598] ? filename_lookup+0x397/0x510 [ 315.451838] ? user_path_at_empty+0x40/0x50 [ 315.456158] ? do_mount+0x180/0x1fb0 [ 315.459861] ? __x64_sys_mount+0xbe/0x150 [ 315.463998] should_fail.cold.4+0xa/0x11 [ 315.468047] ? do_raw_spin_unlock+0xa7/0x2f0 [ 315.472444] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 315.477538] ? kasan_check_write+0x14/0x20 [ 315.481761] ? do_raw_spin_lock+0xc1/0x200 [ 315.485986] ? trace_hardirqs_off+0xd/0x10 [ 315.490215] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 315.495322] ? debug_check_no_obj_freed+0x30b/0x595 [ 315.500341] ? path_lookupat.isra.46+0x27d/0xbf0 [ 315.505094] ? trace_hardirqs_off+0xd/0x10 [ 315.509332] ? quarantine_put+0x10d/0x1b0 [ 315.513482] ? lock_acquire+0x1e4/0x540 [ 315.517472] ? fs_reclaim_acquire+0x20/0x20 [ 315.521782] ? lock_downgrade+0x8f0/0x8f0 [ 315.525922] ? check_same_owner+0x340/0x340 [ 315.530235] ? lock_downgrade+0x8f0/0x8f0 [ 315.534371] ? rcu_note_context_switch+0x730/0x730 [ 315.539293] __should_failslab+0x124/0x180 [ 315.543518] should_failslab+0x9/0x14 [ 315.547331] kmem_cache_alloc_trace+0x2cb/0x780 [ 315.551997] ? kasan_check_write+0x14/0x20 [ 315.556233] ? do_raw_read_unlock+0x3f/0x60 [ 315.560554] vfs_new_fs_context+0x5a/0x700 [ 315.564778] do_mount+0x5cf/0x1fb0 [ 315.568343] ? kasan_check_write+0x14/0x20 [ 315.572579] ? copy_mount_string+0x40/0x40 [ 315.576834] ? kasan_kmalloc+0xc4/0xe0 [ 315.580744] ? kmem_cache_alloc_trace+0x318/0x780 [ 315.585603] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 315.591170] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 315.596797] ? copy_mount_options+0x285/0x380 [ 315.601374] ksys_mount+0x12d/0x140 [ 315.605002] __x64_sys_mount+0xbe/0x150 [ 315.608986] do_syscall_64+0x1b9/0x820 [ 315.612866] ? finish_task_switch+0x1d3/0x870 [ 315.617349] ? syscall_return_slowpath+0x5e0/0x5e0 [ 315.622268] ? syscall_return_slowpath+0x31d/0x5e0 [ 315.627184] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 315.632188] ? prepare_exit_to_usermode+0x291/0x3b0 [ 315.637231] ? perf_trace_sys_enter+0xb10/0xb10 [ 315.641888] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 315.646719] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 315.651890] RIP: 0033:0x455ab9 [ 315.655074] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 315.674210] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 315.681909] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 03:33:23 executing program 1 (fault-call:10 fault-nth:7): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 03:33:23 executing program 0: sched_setattr(0x0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0xa001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f0000000080)=0x4, 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) [ 315.689174] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 315.696429] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 315.703688] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 315.711141] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000006 03:33:23 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) r0 = open(&(0x7f0000000000)='./file0\x00', 0x400000, 0x140) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 03:33:23 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000380)=ANY=[@ANYBLOB="ffffffffffffffffffffffff08004500005800000000002f9078ac00000000000000880b0000000000000800000086dd00000021972b7e4000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80000) accept4(r0, &(0x7f0000000040)=@pppoe, &(0x7f00000000c0)=0x80, 0x80800) 03:33:23 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000100)="000000000000000000000000000000000000000000000000e0e415320000000002009c0126000100000064000000000127008e030c0065000000640000000003b50d0ebf3100c900000064000000007d54c0a92020002d010000df40000055", 0x5f, 0x1a0}]) [ 315.974699] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 316.000994] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:33:23 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfd, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:23 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 03:33:23 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000240)=0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000001c0)={[{0x8, 0x4, 0x100000000, 0x3, 0x7f, 0x0, 0xe0, 0xcc, 0x554, 0x1400000000000000, 0x7ff, 0x6}, {0x1, 0x101, 0x2, 0x2, 0xbf2a, 0x7fffffff, 0x6, 0x9, 0x20, 0x3ff, 0x8, 0x1, 0x8}, {0x4, 0x2, 0x6, 0x3, 0xffffffffffffffc0, 0x2, 0x2, 0xfffffffffffffff8, 0x8a, 0x8000, 0x80000001, 0xad, 0x3}], 0x8}) r2 = shmget(0x2, 0x13000, 0x1000, &(0x7f0000fed000/0x13000)=nil) shmat(r2, &(0x7f0000ffc000/0x4000)=nil, 0x4005000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) [ 316.288512] FAULT_INJECTION: forcing a failure. [ 316.288512] name failslab, interval 1, probability 0, space 0, times 0 [ 316.299893] CPU: 1 PID: 23994 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 316.308407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.317768] Call Trace: [ 316.320373] dump_stack+0x1c9/0x2b4 [ 316.324021] ? dump_stack_print_info.cold.2+0x52/0x52 [ 316.329215] ? __kernel_text_address+0xd/0x40 [ 316.333715] should_fail.cold.4+0xa/0x11 [ 316.337878] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 316.343011] ? save_stack+0xa9/0xd0 [ 316.346723] ? save_stack+0x43/0xd0 [ 316.350384] ? kasan_kmalloc+0xc4/0xe0 [ 316.354286] ? kmem_cache_alloc_trace+0x152/0x780 [ 316.359231] ? proc_init_fs_context+0x49/0x130 [ 316.364132] ? vfs_new_fs_context+0x2ba/0x700 [ 316.368652] ? do_mount+0x5cf/0x1fb0 [ 316.372377] ? ksys_mount+0x12d/0x140 [ 316.376188] ? do_syscall_64+0x1b9/0x820 [ 316.380255] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.385637] ? __x64_sys_mount+0xbe/0x150 [ 316.389798] ? do_syscall_64+0x1b9/0x820 [ 316.393879] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.399263] ? trace_hardirqs_off+0xd/0x10 [ 316.403520] ? quarantine_put+0x10d/0x1b0 [ 316.407704] ? lock_acquire+0x1e4/0x540 [ 316.411691] ? fs_reclaim_acquire+0x20/0x20 [ 316.416046] ? lock_downgrade+0x8f0/0x8f0 [ 316.420227] ? check_same_owner+0x340/0x340 [ 316.424596] ? rcu_note_context_switch+0x730/0x730 [ 316.429578] __should_failslab+0x124/0x180 [ 316.433830] should_failslab+0x9/0x14 [ 316.437653] __kmalloc_track_caller+0x2c4/0x760 [ 316.442334] ? vfs_set_fs_source+0x67/0x180 [ 316.446670] kmemdup_nul+0x31/0xa0 [ 316.450226] vfs_set_fs_source+0x67/0x180 [ 316.454395] do_mount+0x61b/0x1fb0 [ 316.457953] ? check_same_owner+0x340/0x340 [ 316.462318] ? lock_release+0xa30/0xa30 [ 316.466315] ? copy_mount_string+0x40/0x40 [ 316.470579] ? kasan_kmalloc+0xc4/0xe0 [ 316.474482] ? kmem_cache_alloc_trace+0x318/0x780 [ 316.479332] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 316.484869] ? _copy_from_user+0xdf/0x150 [ 316.489039] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 316.494594] ? copy_mount_options+0x285/0x380 [ 316.499274] ksys_mount+0x12d/0x140 [ 316.502916] __x64_sys_mount+0xbe/0x150 [ 316.506899] do_syscall_64+0x1b9/0x820 [ 316.510781] ? finish_task_switch+0x1d3/0x870 [ 316.515291] ? syscall_return_slowpath+0x5e0/0x5e0 [ 316.520220] ? syscall_return_slowpath+0x31d/0x5e0 [ 316.525246] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 316.530389] ? prepare_exit_to_usermode+0x291/0x3b0 [ 316.535413] ? perf_trace_sys_enter+0xb10/0xb10 [ 316.540086] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 316.544946] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 316.550132] RIP: 0033:0x455ab9 [ 316.553312] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 316.572603] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 316.580319] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 316.587579] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 316.594847] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 316.602106] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 316.609383] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000007 [ 316.630196] Dev loop4: unable to read RDB block 1 03:33:24 executing program 1 (fault-call:10 fault-nth:8): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 03:33:24 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='/dev/input/mice\x00'}, 0x10) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f00000000c0)={0x7fffffff, 0x10000}) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x400000000890f, &(0x7f0000000180)="d7e1178f76000200a2000000000000000000") r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) dup2(r1, r2) [ 316.635262] loop4: unable to read partition table [ 316.641493] loop4: partition table beyond EOD, truncated [ 316.647154] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 03:33:24 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) [ 316.727367] Dev loop4: unable to read RDB block 1 [ 316.732424] loop4: unable to read partition table [ 316.737620] loop4: partition table beyond EOD, truncated [ 316.743410] loop_reread_partitions: partition scan of loop4 () failed (rc=-5) 03:33:24 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:24 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_script(r1, &(0x7f0000000440)={'#! ', './file0', [], 0xa, "f5261e68096d5c0229a3b790564806b2d199ab53bb15d0f456464f127c998493b19e80"}, 0x2e) poll(&(0x7f0000000180)=[{r1}], 0x1, 0x5) 03:33:24 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x600380, 0x0) bind$llc(r0, &(0x7f0000000300)={0x1a, 0x108, 0x40, 0x5, 0x0, 0x2, @random="da12dd367dfe"}, 0x10) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xf4a5, 0x101002) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000240)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x4, {0xa, 0x4e24, 0x7, @dev={0xfe, 0x80, [], 0x1d}, 0xffffffffffffff01}, r2}}, 0x38) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000280)={'eql\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 03:33:24 executing program 3: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = socket$inet(0x2, 0x3, 0x2) r1 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x6, 0x2000) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f0000000280)={{0x3, 0x100000001}, 'port1\x00', 0x0, 0x1028, 0x0, 0x7, 0x6, 0xffffffff, 0x7b9e708f, 0x0, 0x2, 0xfe}) setsockopt$inet_int(r0, 0x0, 0xd0, &(0x7f0000000000), 0x4) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000080)={'filter\x00', 0x0, 0x0, 0x0, [], 0x4, &(0x7f0000000040)=[{}], 0x0, [{}, {}, {}, {}]}, 0xb8) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x181000, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0a85352, &(0x7f0000000180)={{0xd592, 0x2}, 'port0\x00', 0x48, 0x100400, 0x3ff, 0xffffffffffffffbf, 0xffff, 0x4, 0xe638, 0x0, 0x7, 0x6}) [ 317.101262] FAULT_INJECTION: forcing a failure. [ 317.101262] name failslab, interval 1, probability 0, space 0, times 0 [ 317.112648] CPU: 1 PID: 24048 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 317.121157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.130541] Call Trace: [ 317.133197] dump_stack+0x1c9/0x2b4 [ 317.136884] ? dump_stack_print_info.cold.2+0x52/0x52 [ 317.142103] ? __kernel_text_address+0xd/0x40 [ 317.146626] should_fail.cold.4+0xa/0x11 [ 317.150729] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 317.155867] ? save_stack+0xa9/0xd0 [ 317.159522] ? save_stack+0x43/0xd0 [ 317.163154] ? kasan_kmalloc+0xc4/0xe0 [ 317.167049] ? kmem_cache_alloc_trace+0x152/0x780 [ 317.172161] ? proc_init_fs_context+0x49/0x130 [ 317.176842] ? vfs_new_fs_context+0x2ba/0x700 [ 317.181338] ? do_mount+0x5cf/0x1fb0 [ 317.185304] ? ksys_mount+0x12d/0x140 [ 317.189101] ? do_syscall_64+0x1b9/0x820 [ 317.193157] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.198524] ? __x64_sys_mount+0xbe/0x150 [ 317.202667] ? do_syscall_64+0x1b9/0x820 [ 317.206718] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.212072] ? trace_hardirqs_off+0xd/0x10 [ 317.216308] ? quarantine_put+0x10d/0x1b0 [ 317.220446] ? lock_acquire+0x1e4/0x540 [ 317.224414] ? fs_reclaim_acquire+0x20/0x20 [ 317.228722] ? lock_downgrade+0x8f0/0x8f0 [ 317.232873] ? check_same_owner+0x340/0x340 [ 317.237185] ? rcu_note_context_switch+0x730/0x730 [ 317.242125] __should_failslab+0x124/0x180 [ 317.246529] should_failslab+0x9/0x14 [ 317.250320] __kmalloc_track_caller+0x2c4/0x760 [ 317.254987] ? vfs_set_fs_source+0x67/0x180 [ 317.259314] kmemdup_nul+0x31/0xa0 [ 317.262854] vfs_set_fs_source+0x67/0x180 [ 317.267004] do_mount+0x61b/0x1fb0 [ 317.270544] ? copy_mount_string+0x40/0x40 [ 317.274770] ? retint_kernel+0x10/0x10 [ 317.278646] ? copy_mount_options+0x213/0x380 [ 317.283144] ? write_comp_data+0x22/0x70 [ 317.287212] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 317.292747] ? copy_mount_options+0x285/0x380 [ 317.297235] ksys_mount+0x12d/0x140 [ 317.300860] __x64_sys_mount+0xbe/0x150 [ 317.304828] do_syscall_64+0x1b9/0x820 [ 317.308715] ? syscall_return_slowpath+0x5e0/0x5e0 [ 317.313635] ? syscall_return_slowpath+0x31d/0x5e0 [ 317.318554] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 317.323568] ? prepare_exit_to_usermode+0x291/0x3b0 [ 317.328581] ? perf_trace_sys_enter+0xb10/0xb10 [ 317.333249] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 317.338086] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 317.343278] RIP: 0033:0x455ab9 [ 317.346473] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 317.365697] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 317.373413] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 317.380671] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 317.387946] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 317.395217] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 317.402489] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000008 03:33:25 executing program 0: sched_setattr(0x0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0xa001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f0000000080)=0x4, 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 03:33:25 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1f00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:25 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-aes-aesni\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000bfef9b9d2a4b20079fffffffffffffe000225070097c11ed4c2c4dc42ffa86eb9", 0x30) ioctl$int_in(r1, 0x5452, &(0x7f0000000040)=0x2) sendmmsg$alg(r1, &(0x7f00000037c0)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000800)="8aebbf52df523584c31a4d3a8f26152585748aa7349d996d36e45f63c6ac05791aed157dbf507827f89ae6ada0c0da75", 0x30}], 0x1, &(0x7f0000001800)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000158000)={&(0x7f00002fffa0)=@nfc_llcp, 0x60, &(0x7f0000b9c000)=[{&(0x7f000080f000)=""/4096, 0x1000}], 0x1, &(0x7f0000da2000)}, 0x0) 03:33:25 executing program 1 (fault-call:10 fault-nth:9): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 03:33:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 03:33:25 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffffffff39b, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:25 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000000)={'broute\x00'}, &(0x7f00000001c0)=0x78) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 03:33:25 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') exit(0x207) getdents(r0, &(0x7f0000000080)=""/77, 0x4d) ioctl$SIOCGIFHWADDR(r0, 0x8927, &(0x7f0000000000)) 03:33:25 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:25 executing program 4: 03:33:25 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x8000) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000040)={0x1, 'nr0\x00'}, 0x18) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000001c0)={{&(0x7f0000ffc000/0x1000)=nil, 0x1000}, 0x2}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 03:33:25 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x20000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) [ 318.073345] FAULT_INJECTION: forcing a failure. [ 318.073345] name failslab, interval 1, probability 0, space 0, times 0 [ 318.084659] CPU: 0 PID: 24120 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 318.093191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.102538] Call Trace: [ 318.105123] dump_stack+0x1c9/0x2b4 [ 318.108739] ? dump_stack_print_info.cold.2+0x52/0x52 [ 318.113925] should_fail.cold.4+0xa/0x11 [ 318.118013] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 318.123109] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 318.128111] ? bpf_prog_kallsyms_find+0xde/0x4c0 [ 318.132858] ? trace_hardirqs_on+0x10/0x10 [ 318.137117] ? lock_acquire+0x1e4/0x540 [ 318.141080] ? is_bpf_text_address+0xae/0x170 [ 318.145565] ? lock_downgrade+0x8f0/0x8f0 [ 318.149701] ? lock_release+0xa30/0xa30 [ 318.153698] ? lock_acquire+0x1e4/0x540 [ 318.157701] ? fs_reclaim_acquire+0x20/0x20 [ 318.162022] ? lock_downgrade+0x8f0/0x8f0 [ 318.166169] ? check_same_owner+0x340/0x340 [ 318.170491] ? rcu_note_context_switch+0x730/0x730 [ 318.175405] ? unwind_get_return_address+0x61/0xa0 [ 318.180329] __should_failslab+0x124/0x180 [ 318.184580] should_failslab+0x9/0x14 [ 318.188379] kmem_cache_alloc_trace+0x2cb/0x780 [ 318.193058] ? save_stack+0xa9/0xd0 [ 318.196675] alloc_super+0xd4/0xb10 [ 318.200291] ? ksys_mount+0x12d/0x140 [ 318.204079] ? destroy_unused_super.part.11+0x110/0x110 [ 318.209425] ? sget_fc+0x261/0x950 [ 318.212969] ? lock_downgrade+0x8f0/0x8f0 [ 318.217104] ? kasan_check_read+0x11/0x20 [ 318.221233] ? do_raw_spin_unlock+0xa7/0x2f0 [ 318.225629] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 318.230898] ? kasan_check_write+0x14/0x20 [ 318.235144] ? do_raw_spin_lock+0xc1/0x200 [ 318.239375] ? ns_test_super+0x50/0x50 [ 318.243250] sget_fc+0x269/0x950 [ 318.246609] ? compare_single+0x10/0x10 [ 318.250569] ? alloc_super+0xb10/0xb10 [ 318.254457] ? kasan_kmalloc+0xc4/0xe0 [ 318.258334] ? __kmalloc_track_caller+0x311/0x760 [ 318.263174] ? proc_root_lookup+0x60/0x60 [ 318.267309] vfs_get_super+0x6e/0x270 [ 318.271095] proc_get_tree+0x88/0xb0 [ 318.274805] vfs_get_tree+0x1cb/0x5c0 [ 318.278600] do_mount+0x6c1/0x1fb0 [ 318.282137] ? kasan_check_write+0x14/0x20 [ 318.286357] ? copy_mount_string+0x40/0x40 [ 318.290577] ? kasan_kmalloc+0xc4/0xe0 [ 318.294463] ? kmem_cache_alloc_trace+0x318/0x780 [ 318.299310] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 318.304833] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.310364] ? copy_mount_options+0x285/0x380 [ 318.314849] ksys_mount+0x12d/0x140 [ 318.318482] __x64_sys_mount+0xbe/0x150 [ 318.322452] do_syscall_64+0x1b9/0x820 [ 318.326326] ? finish_task_switch+0x1d3/0x870 [ 318.330810] ? syscall_return_slowpath+0x5e0/0x5e0 [ 318.335736] ? syscall_return_slowpath+0x31d/0x5e0 [ 318.340654] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 318.345659] ? prepare_exit_to_usermode+0x291/0x3b0 [ 318.350666] ? perf_trace_sys_enter+0xb10/0xb10 [ 318.355327] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 318.360163] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 318.365339] RIP: 0033:0x455ab9 [ 318.368507] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 318.387674] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 318.395397] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 318.402669] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 318.409936] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 318.417202] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 03:33:26 executing program 1 (fault-call:10 fault-nth:10): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 318.424457] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000009 03:33:26 executing program 4: 03:33:26 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xedc000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 318.767955] FAULT_INJECTION: forcing a failure. [ 318.767955] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 318.779804] CPU: 1 PID: 24159 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 318.788321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.797695] Call Trace: [ 318.800348] dump_stack+0x1c9/0x2b4 [ 318.803988] ? dump_stack_print_info.cold.2+0x52/0x52 [ 318.809194] ? alloc_set_pte+0x1133/0x1790 [ 318.813434] ? trace_hardirqs_on+0x10/0x10 [ 318.817683] should_fail.cold.4+0xa/0x11 [ 318.821761] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 318.826891] ? trace_hardirqs_on+0x10/0x10 [ 318.831155] ? lookup_fast+0x429/0x12a0 [ 318.835166] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 318.840720] ? trace_hardirqs_on+0x10/0x10 [ 318.844961] ? legitimize_mnt+0x240/0x240 [ 318.849226] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 318.854256] ? bpf_prog_kallsyms_find+0xde/0x4c0 [ 318.859031] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.864569] ? should_fail+0x246/0xd86 03:33:26 executing program 0: sched_setattr(0x0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0xa001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f0000000080)=0x4, 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 03:33:26 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x9bf3ffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:26 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) r0 = memfd_create(&(0x7f0000000000)='cgroup]trusted-\x00', 0x2) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f00000001c0)={0x0, 0xfffffffffffff764, 0x1, 0x8, 0xaf3, 0x3, 0x1f, 0x8, {0x0, @in={{0x2, 0x4e24}}, 0x9, 0x8, 0x3a, 0x400, 0x2}}, &(0x7f0000000040)=0xb0) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000280)={r1}, 0x8) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 03:33:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 03:33:26 executing program 4: [ 318.868457] ? lock_downgrade+0x8f0/0x8f0 [ 318.872610] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 318.877716] __alloc_pages_nodemask+0x36e/0xdb0 [ 318.882398] ? __alloc_pages_slowpath+0x2d00/0x2d00 [ 318.887432] ? is_bpf_text_address+0xae/0x170 [ 318.891965] ? lock_downgrade+0x8f0/0x8f0 [ 318.896150] ? lock_release+0xa30/0xa30 [ 318.900143] ? lock_acquire+0x1e4/0x540 [ 318.904131] ? fs_reclaim_acquire+0x20/0x20 [ 318.908463] ? lock_downgrade+0x8f0/0x8f0 [ 318.912615] ? lock_release+0xa30/0xa30 [ 318.916599] ? check_same_owner+0x340/0x340 [ 318.920937] cache_grow_begin+0x91/0x710 [ 318.924998] kmem_cache_alloc_trace+0x6a5/0x780 [ 318.929659] alloc_super+0xd4/0xb10 [ 318.933274] ? ksys_mount+0x12d/0x140 [ 318.937082] ? destroy_unused_super.part.11+0x110/0x110 [ 318.942438] ? sget_fc+0x261/0x950 [ 318.945998] ? lock_downgrade+0x8f0/0x8f0 [ 318.950166] ? kasan_check_read+0x11/0x20 [ 318.954334] ? do_raw_spin_unlock+0xa7/0x2f0 [ 318.958756] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 318.963373] ? kasan_check_write+0x14/0x20 03:33:26 executing program 3: [ 318.967626] ? do_raw_spin_lock+0xc1/0x200 [ 318.971887] ? ns_test_super+0x50/0x50 [ 318.975790] sget_fc+0x269/0x950 [ 318.979176] ? compare_single+0x10/0x10 [ 318.983173] ? alloc_super+0xb10/0xb10 [ 318.987073] ? kasan_kmalloc+0xc4/0xe0 [ 318.990977] ? __kmalloc_track_caller+0x311/0x760 [ 318.995840] ? proc_root_lookup+0x60/0x60 [ 319.000007] vfs_get_super+0x6e/0x270 [ 319.003821] proc_get_tree+0x88/0xb0 [ 319.007553] vfs_get_tree+0x1cb/0x5c0 [ 319.011356] do_mount+0x6c1/0x1fb0 [ 319.014907] ? kasan_check_write+0x14/0x20 [ 319.019349] ? copy_mount_string+0x40/0x40 [ 319.023856] ? kasan_kmalloc+0xc4/0xe0 [ 319.027840] ? kmem_cache_alloc_trace+0x318/0x780 [ 319.032723] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 319.038279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 319.043845] ? copy_mount_options+0x285/0x380 [ 319.048358] ksys_mount+0x12d/0x140 [ 319.051986] __x64_sys_mount+0xbe/0x150 [ 319.055976] do_syscall_64+0x1b9/0x820 [ 319.059863] ? syscall_slow_exit_work+0x500/0x500 [ 319.064729] ? syscall_return_slowpath+0x5e0/0x5e0 [ 319.069652] ? syscall_return_slowpath+0x31d/0x5e0 [ 319.074572] ? prepare_exit_to_usermode+0x291/0x3b0 [ 319.079577] ? perf_trace_sys_enter+0xb10/0xb10 [ 319.084235] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 319.089077] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 319.094633] RIP: 0033:0x455ab9 [ 319.097827] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:33:26 executing program 1 (fault-call:10 fault-nth:11): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 319.117917] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 319.125640] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 319.132921] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 319.140195] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 319.147462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 319.154727] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000000a 03:33:26 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:26 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x6}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={r1, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x20}}}, 0x1, 0xfffffffffffffffa}, 0x90) 03:33:26 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x72090000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 03:33:26 executing program 4: 03:33:27 executing program 3: [ 319.678998] FAULT_INJECTION: forcing a failure. [ 319.678998] name failslab, interval 1, probability 0, space 0, times 0 [ 319.690651] CPU: 0 PID: 24208 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 319.699163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.708521] Call Trace: [ 319.711117] dump_stack+0x1c9/0x2b4 [ 319.714736] ? dump_stack_print_info.cold.2+0x52/0x52 [ 319.719943] should_fail.cold.4+0xa/0x11 [ 319.724017] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 319.729124] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 319.734145] ? do_raw_spin_unlock+0xa7/0x2f0 [ 319.738545] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 319.743132] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 319.748143] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 319.753149] ? find_next_bit+0x104/0x130 [ 319.757298] ? cpumask_next+0x24/0x30 [ 319.761126] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 319.766672] ? pcpu_alloc+0x190/0x13a0 [ 319.770551] ? kmem_cache_alloc_trace+0x152/0x780 [ 319.775409] ? lock_acquire+0x1e4/0x540 [ 319.779375] ? fs_reclaim_acquire+0x20/0x20 [ 319.783754] ? lock_downgrade+0x8f0/0x8f0 [ 319.787914] ? pcpu_balance_workfn+0x1700/0x1700 [ 319.792672] ? check_same_owner+0x340/0x340 [ 319.796997] ? rcu_note_context_switch+0x730/0x730 [ 319.801923] ? lock_acquire+0x1e4/0x540 [ 319.805882] __should_failslab+0x124/0x180 [ 319.810105] should_failslab+0x9/0x14 [ 319.813900] __kmalloc+0x2c8/0x760 [ 319.817426] ? kasan_check_write+0x14/0x20 [ 319.821647] ? __init_rwsem+0x1cc/0x2a0 [ 319.825643] ? do_raw_write_unlock.cold.8+0x49/0x49 [ 319.830659] ? prealloc_shrinker+0x124/0x480 [ 319.835059] ? __lockdep_init_map+0x105/0x590 [ 319.839548] prealloc_shrinker+0x124/0x480 [ 319.843775] ? __init_waitqueue_head+0x9e/0x150 [ 319.848520] ? inactive_list_is_low+0x850/0x850 [ 319.853188] ? __lockdep_init_map+0x105/0x590 [ 319.857689] alloc_super+0x8dd/0xb10 [ 319.861392] ? destroy_unused_super.part.11+0x110/0x110 [ 319.866748] ? lock_downgrade+0x8f0/0x8f0 [ 319.870903] ? kasan_check_read+0x11/0x20 [ 319.875049] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 319.879626] ? kasan_check_write+0x14/0x20 [ 319.883858] ? do_raw_spin_lock+0xc1/0x200 [ 319.888112] ? ns_test_super+0x50/0x50 [ 319.892002] sget_fc+0x269/0x950 [ 319.895356] ? compare_single+0x10/0x10 [ 319.899314] ? alloc_super+0xb10/0xb10 [ 319.903185] ? kasan_kmalloc+0xc4/0xe0 [ 319.907057] ? __kmalloc_track_caller+0x311/0x760 [ 319.911892] ? proc_root_lookup+0x60/0x60 [ 319.916025] vfs_get_super+0x6e/0x270 [ 319.919835] proc_get_tree+0x88/0xb0 [ 319.923555] vfs_get_tree+0x1cb/0x5c0 [ 319.927348] do_mount+0x6c1/0x1fb0 [ 319.930885] ? kasan_check_write+0x14/0x20 [ 319.935129] ? copy_mount_string+0x40/0x40 [ 319.939398] ? kasan_kmalloc+0xc4/0xe0 [ 319.943297] ? kmem_cache_alloc_trace+0x318/0x780 [ 319.948327] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 319.953866] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 319.959387] ? copy_mount_options+0x285/0x380 [ 319.963874] ksys_mount+0x12d/0x140 [ 319.967496] __x64_sys_mount+0xbe/0x150 [ 319.971469] do_syscall_64+0x1b9/0x820 [ 319.975348] ? finish_task_switch+0x1d3/0x870 [ 319.979841] ? syscall_return_slowpath+0x5e0/0x5e0 [ 319.984766] ? syscall_return_slowpath+0x31d/0x5e0 [ 319.989704] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 319.994731] ? prepare_exit_to_usermode+0x291/0x3b0 [ 319.999749] ? perf_trace_sys_enter+0xb10/0xb10 [ 320.004420] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 320.009264] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.014437] RIP: 0033:0x455ab9 [ 320.017620] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 320.036766] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 320.044545] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 320.051814] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 320.059079] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 320.066343] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 320.073628] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000000b 03:33:27 executing program 1 (fault-call:10 fault-nth:12): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 03:33:27 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x800, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@broadcast, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2={0xff, 0x2, [], 0x1}, @in=@rand_addr=0x3f, 0x4e21, 0xa6f, 0x4e20, 0x80000000, 0xa, 0x20, 0xa0, 0xbd, 0x0, r1}, {0x9, 0x7fff, 0x101, 0x0, 0x6, 0x1, 0x49f, 0x8}, {0x7fff, 0x3, 0x9, 0x4}, 0x8, 0x6e6bb6, 0x2, 0x1, 0x1, 0x3}, {{@in=@broadcast=0xffffffff, 0x4d4, 0xff}, 0xa, @in6=@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x3507, 0x7, 0x0, 0x5, 0x8c, 0x0, 0x6}}, 0xe8) 03:33:27 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4800000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:27 executing program 0: sched_setattr(0x0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0xa001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f0000000080)=0x4, 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 03:33:27 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x300, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:27 executing program 4: 03:33:27 executing program 3: 03:33:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 03:33:28 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0xffffffffffffffff) [ 320.670246] FAULT_INJECTION: forcing a failure. [ 320.670246] name failslab, interval 1, probability 0, space 0, times 0 [ 320.682626] CPU: 0 PID: 24258 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 320.691139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.700506] Call Trace: [ 320.703187] dump_stack+0x1c9/0x2b4 [ 320.706812] ? dump_stack_print_info.cold.2+0x52/0x52 [ 320.712042] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 320.717609] should_fail.cold.4+0xa/0x11 [ 320.721710] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 320.726829] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.732404] ? replace_slot+0xc9/0x4c0 [ 320.736303] ? __save_stack_trace+0x8d/0xf0 [ 320.740657] ? plist_requeue+0x650/0x650 [ 320.744743] ? save_stack+0xa9/0xd0 [ 320.748381] ? lock_acquire+0x1e4/0x540 [ 320.752350] ? lock_acquire+0x1e4/0x540 [ 320.756314] ? fs_reclaim_acquire+0x20/0x20 [ 320.760626] ? lock_downgrade+0x8f0/0x8f0 [ 320.764781] ? check_same_owner+0x340/0x340 [ 320.769127] ? check_same_owner+0x340/0x340 [ 320.773480] ? rcu_note_context_switch+0x730/0x730 [ 320.778427] __should_failslab+0x124/0x180 [ 320.782671] should_failslab+0x9/0x14 [ 320.786464] __kmalloc+0x2c8/0x760 [ 320.789994] ? rcu_note_context_switch+0x730/0x730 [ 320.794980] ? __list_lru_init+0x151/0x840 [ 320.799391] __list_lru_init+0x151/0x840 [ 320.803466] ? list_lru_destroy+0x500/0x500 [ 320.807815] ? prealloc_shrinker+0x124/0x480 [ 320.812241] ? prealloc_shrinker+0x213/0x480 [ 320.816671] ? __init_waitqueue_head+0x9e/0x150 [ 320.821347] ? inactive_list_is_low+0x850/0x850 [ 320.826025] ? __lockdep_init_map+0x105/0x590 [ 320.830524] alloc_super+0x976/0xb10 [ 320.834248] ? destroy_unused_super.part.11+0x110/0x110 [ 320.839610] ? lock_downgrade+0x8f0/0x8f0 [ 320.843770] ? kasan_check_read+0x11/0x20 [ 320.847916] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 320.852500] ? kasan_check_write+0x14/0x20 [ 320.856730] ? do_raw_spin_lock+0xc1/0x200 [ 320.860977] ? ns_test_super+0x50/0x50 [ 320.864879] sget_fc+0x269/0x950 [ 320.868259] ? compare_single+0x10/0x10 [ 320.872234] ? alloc_super+0xb10/0xb10 [ 320.876118] ? kasan_kmalloc+0xc4/0xe0 [ 320.880015] ? __kmalloc_track_caller+0x311/0x760 [ 320.884856] ? proc_root_lookup+0x60/0x60 [ 320.889017] vfs_get_super+0x6e/0x270 [ 320.892826] proc_get_tree+0x88/0xb0 [ 320.896534] vfs_get_tree+0x1cb/0x5c0 [ 320.900334] do_mount+0x6c1/0x1fb0 [ 320.903865] ? kasan_check_write+0x14/0x20 [ 320.908094] ? copy_mount_string+0x40/0x40 [ 320.912323] ? retint_kernel+0x10/0x10 [ 320.916219] ? copy_mount_options+0x1a1/0x380 [ 320.920711] ? copy_mount_options+0x1a4/0x380 [ 320.925200] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.930733] ? copy_mount_options+0x285/0x380 [ 320.935228] ksys_mount+0x12d/0x140 [ 320.938857] __x64_sys_mount+0xbe/0x150 [ 320.942861] do_syscall_64+0x1b9/0x820 [ 320.946738] ? syscall_slow_exit_work+0x500/0x500 [ 320.951570] ? syscall_return_slowpath+0x5e0/0x5e0 [ 320.956486] ? syscall_return_slowpath+0x31d/0x5e0 [ 320.961403] ? prepare_exit_to_usermode+0x291/0x3b0 [ 320.966418] ? perf_trace_sys_enter+0xb10/0xb10 [ 320.971078] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 320.975920] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.981132] RIP: 0033:0x455ab9 [ 320.984305] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 321.003561] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 321.011266] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 03:33:28 executing program 1 (fault-call:10 fault-nth:13): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 03:33:28 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000080)={'filter\x00', 0x0, 0x4, 0x1000, [], 0x3, &(0x7f0000000040)=[{}, {}, {}], &(0x7f0000000580)=""/4096}, &(0x7f0000000100)=0x78) r2 = shmget$private(0x0, 0x1000, 0x80, &(0x7f0000ffc000/0x1000)=nil) set_thread_area(&(0x7f0000000200)={0xfffffffffffffbff, 0x0, 0x400, 0x81, 0x3, 0x7ff, 0x0, 0xffff, 0x4, 0x3}) shmat(r2, &(0x7f0000ffc000/0x2000)=nil, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000180)=[@in6={0xa, 0x4e21, 0x2fde, @dev={0xfe, 0x80, [], 0xe}, 0x8}, @in={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, @in6={0xa, 0x4e21, 0x8, @dev={0xfe, 0x80, [], 0x1e}, 0x9}], 0x48) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000000)={0xe, 0xfffffffffffffe0b, 0xfa00, @ib_path={&(0x7f00000004c0)=[{}, {0x2b}], 0xffffffffffffffff, 0x1, 0x1, 0x90}}, 0x20) [ 321.018523] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 321.025789] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 321.033044] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 321.040297] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000000c 03:33:28 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf5ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:28 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:28 executing program 3: r0 = memfd_create(&(0x7f0000000280)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000300)="0691", 0x2) sendfile(r0, r0, &(0x7f0000001000), 0x10002) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000da9000)={0x2, 0x3, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x80ffffff, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x38}, 0x1}, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x40, 0x0) 03:33:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 03:33:28 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000040)={@reserved=0x1}) shmat(0x0, &(0x7f0000ffa000/0x2000)=nil, 0x400000003ffd) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) fcntl$getown(r0, 0x9) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000240)=0xd80000000000) connect$nfc_llcp(r1, &(0x7f00000001c0)={0x27, 0x0, 0x1, 0x2, 0x5, 0x7, "11b9dd50fdea2045d8ab01fc017ecaffb42e195798f959346942e061215886b3b60f7bd88c833df6598949822c5df6ad01a33edc60472161f84d61235e04b4", 0x10}, 0x60) 03:33:29 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xfffffffffffffe62) socket(0x7, 0x1, 0x0) setsockopt$inet_int(r1, 0x0, 0x20, &(0x7f0000000200), 0x4) [ 321.666760] FAULT_INJECTION: forcing a failure. [ 321.666760] name failslab, interval 1, probability 0, space 0, times 0 [ 321.678207] CPU: 0 PID: 24306 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 321.686699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.696051] Call Trace: [ 321.698642] dump_stack+0x1c9/0x2b4 [ 321.702253] ? dump_stack_print_info.cold.2+0x52/0x52 [ 321.707428] should_fail.cold.4+0xa/0x11 [ 321.711489] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 321.716584] ? save_stack+0xa9/0xd0 [ 321.720199] ? save_stack+0x43/0xd0 [ 321.723815] ? kasan_kmalloc+0xc4/0xe0 [ 321.727707] ? __kmalloc+0x14e/0x760 [ 321.731411] ? __list_lru_init+0x151/0x840 [ 321.735643] ? alloc_super+0x976/0xb10 [ 321.739551] ? sget_fc+0x269/0x950 [ 321.743104] ? vfs_get_super+0x6e/0x270 [ 321.747077] ? proc_get_tree+0x88/0xb0 [ 321.750961] ? vfs_get_tree+0x1cb/0x5c0 [ 321.754917] ? do_mount+0x6c1/0x1fb0 [ 321.758610] ? ksys_mount+0x12d/0x140 [ 321.762419] ? __x64_sys_mount+0xbe/0x150 [ 321.766658] ? do_syscall_64+0x1b9/0x820 [ 321.770717] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 321.776077] ? lock_acquire+0x1e4/0x540 [ 321.780133] ? fs_reclaim_acquire+0x20/0x20 [ 321.784450] ? lock_downgrade+0x8f0/0x8f0 [ 321.788592] ? check_same_owner+0x340/0x340 [ 321.792918] ? rcu_note_context_switch+0x730/0x730 [ 321.797832] __should_failslab+0x124/0x180 [ 321.802067] should_failslab+0x9/0x14 [ 321.805852] kmem_cache_alloc_node_trace+0x26f/0x770 [ 321.810942] ? kasan_kmalloc+0xc4/0xe0 [ 321.814818] __kmalloc_node+0x33/0x70 [ 321.818605] kvmalloc_node+0x65/0xf0 [ 321.822306] __list_lru_init+0x5d9/0x840 [ 321.826362] ? list_lru_destroy+0x500/0x500 [ 321.830682] ? prealloc_shrinker+0x213/0x480 [ 321.835075] ? __init_waitqueue_head+0x9e/0x150 [ 321.839746] ? inactive_list_is_low+0x850/0x850 [ 321.844411] ? __lockdep_init_map+0x105/0x590 [ 321.848900] alloc_super+0x976/0xb10 [ 321.852606] ? destroy_unused_super.part.11+0x110/0x110 [ 321.857957] ? lock_downgrade+0x8f0/0x8f0 [ 321.862090] ? kasan_check_read+0x11/0x20 [ 321.866225] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 321.870798] ? kasan_check_write+0x14/0x20 [ 321.875017] ? do_raw_spin_lock+0xc1/0x200 [ 321.879246] ? ns_test_super+0x50/0x50 [ 321.883119] sget_fc+0x269/0x950 [ 321.886481] ? compare_single+0x10/0x10 [ 321.890455] ? alloc_super+0xb10/0xb10 [ 321.894337] ? kasan_kmalloc+0xc4/0xe0 [ 321.898212] ? __kmalloc_track_caller+0x311/0x760 [ 321.903039] ? proc_root_lookup+0x60/0x60 [ 321.907179] vfs_get_super+0x6e/0x270 [ 321.910968] proc_get_tree+0x88/0xb0 [ 321.914664] vfs_get_tree+0x1cb/0x5c0 [ 321.918448] do_mount+0x6c1/0x1fb0 [ 321.921971] ? copy_mount_string+0x40/0x40 [ 321.926199] ? retint_kernel+0x10/0x10 [ 321.930082] ? copy_mount_options+0x1e3/0x380 [ 321.934566] ? write_comp_data+0x14/0x70 [ 321.938629] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 321.944154] ? copy_mount_options+0x285/0x380 [ 321.948652] ksys_mount+0x12d/0x140 [ 321.952275] __x64_sys_mount+0xbe/0x150 [ 321.956236] do_syscall_64+0x1b9/0x820 [ 321.960118] ? syscall_return_slowpath+0x5e0/0x5e0 [ 321.965042] ? syscall_return_slowpath+0x31d/0x5e0 [ 321.969971] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 321.974976] ? prepare_exit_to_usermode+0x291/0x3b0 [ 321.979981] ? perf_trace_sys_enter+0xb10/0xb10 [ 321.984643] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 321.989486] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 321.994667] RIP: 0033:0x455ab9 [ 321.997843] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:33:29 executing program 1 (fault-call:10 fault-nth:14): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 322.016970] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 322.024672] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 322.031926] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 322.039197] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 322.046459] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 322.053720] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000000d 03:33:29 executing program 0: sched_setattr(0x0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0xa001, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 03:33:29 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x20000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:29 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:29 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000040)=0x1000) 03:33:29 executing program 4: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r1, &(0x7f0000000040)={0x7, 0x4d}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c}) write$P9_RREADDIR(r1, &(0x7f0000000480)={0x2a, 0x29, 0x1, {0x0, [{{}, 0x0, 0x0, 0x7, './file0'}]}}, 0x2a) write$P9_RGETATTR(r1, &(0x7f0000000200)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000140)={0x16, 0x6f, 0x1, {0x1, [{}]}}, 0x16) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000840)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@posixacl='posixacl', 0x2c}]}}) r2 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x1ff, 0x400) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000940)={"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"}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}}, &(0x7f0000000180)=0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000002c0)={r3, 0x0, 0x0, 0x2, 0x7fff, 0x10fa}, &(0x7f0000000440)=0x14) 03:33:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x20000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) [ 322.678210] FAULT_INJECTION: forcing a failure. [ 322.678210] name failslab, interval 1, probability 0, space 0, times 0 [ 322.689640] CPU: 0 PID: 24352 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 322.698160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.707571] Call Trace: [ 322.710171] dump_stack+0x1c9/0x2b4 [ 322.713821] ? dump_stack_print_info.cold.2+0x52/0x52 [ 322.719378] ? __kernel_text_address+0xd/0x40 [ 322.723897] ? unwind_get_return_address+0x61/0xa0 [ 322.728852] should_fail.cold.4+0xa/0x11 [ 322.732920] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 322.738057] ? save_stack+0xa9/0xd0 [ 322.741709] ? save_stack+0x43/0xd0 [ 322.745346] ? kasan_kmalloc+0xc4/0xe0 [ 322.749241] ? kmem_cache_alloc_trace+0x152/0x780 [ 322.754073] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 322.759248] ? __list_lru_init+0x4d6/0x840 [ 322.763503] ? alloc_super+0x976/0xb10 [ 322.767411] ? vfs_get_super+0x6e/0x270 [ 322.771392] ? proc_get_tree+0x88/0xb0 [ 322.775283] ? vfs_get_tree+0x1cb/0x5c0 [ 322.779257] ? do_mount+0x6c1/0x1fb0 [ 322.782979] ? ksys_mount+0x12d/0x140 [ 322.786783] ? __x64_sys_mount+0xbe/0x150 [ 322.790937] ? do_syscall_64+0x1b9/0x820 [ 322.794992] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 322.800350] ? save_stack+0xa9/0xd0 [ 322.803969] ? lock_acquire+0x1e4/0x540 [ 322.807931] ? fs_reclaim_acquire+0x20/0x20 [ 322.812244] ? lock_downgrade+0x8f0/0x8f0 [ 322.816384] ? __x64_sys_mount+0xbe/0x150 [ 322.820531] ? check_same_owner+0x340/0x340 [ 322.824844] ? rcu_note_context_switch+0x730/0x730 [ 322.829764] __should_failslab+0x124/0x180 [ 322.833999] should_failslab+0x9/0x14 [ 322.837803] kmem_cache_alloc_trace+0x2cb/0x780 [ 322.842463] ? kasan_kmalloc+0xc4/0xe0 [ 322.846340] __memcg_init_list_lru_node+0x185/0x2d0 [ 322.851353] ? kvfree_rcu+0x20/0x20 [ 322.854965] ? __kmalloc_node+0x47/0x70 [ 322.858926] __list_lru_init+0x4d6/0x840 [ 322.862973] ? list_lru_destroy+0x500/0x500 [ 322.867285] ? prealloc_shrinker+0x213/0x480 [ 322.871690] ? __init_waitqueue_head+0x9e/0x150 [ 322.876351] ? inactive_list_is_low+0x850/0x850 [ 322.881008] ? __lockdep_init_map+0x105/0x590 [ 322.885497] alloc_super+0x976/0xb10 [ 322.889201] ? destroy_unused_super.part.11+0x110/0x110 [ 322.894567] ? lock_downgrade+0x8f0/0x8f0 [ 322.898704] ? kasan_check_read+0x11/0x20 [ 322.902997] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 322.907567] ? kasan_check_write+0x14/0x20 [ 322.911796] ? do_raw_spin_lock+0xc1/0x200 [ 322.916017] ? ns_test_super+0x50/0x50 [ 322.919887] sget_fc+0x269/0x950 [ 322.923239] ? compare_single+0x10/0x10 [ 322.927198] ? alloc_super+0xb10/0xb10 [ 322.931082] ? kasan_kmalloc+0xc4/0xe0 [ 322.934966] ? __kmalloc_track_caller+0x311/0x760 [ 322.939819] ? proc_root_lookup+0x60/0x60 [ 322.943967] vfs_get_super+0x6e/0x270 [ 322.947752] proc_get_tree+0x88/0xb0 [ 322.951457] vfs_get_tree+0x1cb/0x5c0 [ 322.955244] do_mount+0x6c1/0x1fb0 [ 322.958767] ? check_same_owner+0x340/0x340 [ 322.963073] ? lock_release+0xa30/0xa30 [ 322.967146] ? copy_mount_string+0x40/0x40 [ 322.971377] ? retint_kernel+0x10/0x10 [ 322.975269] ? copy_mount_options+0x213/0x380 [ 322.979760] ? copy_mount_options+0x1a1/0x380 [ 322.984245] ? __sanitizer_cov_trace_pc+0x1e/0x50 [ 322.989090] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 322.994631] ? copy_mount_options+0x285/0x380 [ 322.999124] ksys_mount+0x12d/0x140 [ 323.002745] __x64_sys_mount+0xbe/0x150 [ 323.006709] do_syscall_64+0x1b9/0x820 [ 323.010600] ? syscall_slow_exit_work+0x500/0x500 [ 323.015449] ? syscall_return_slowpath+0x5e0/0x5e0 [ 323.022292] ? syscall_return_slowpath+0x31d/0x5e0 [ 323.027208] ? prepare_exit_to_usermode+0x291/0x3b0 [ 323.032207] ? perf_trace_sys_enter+0xb10/0xb10 [ 323.036862] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 323.041704] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.046882] RIP: 0033:0x455ab9 [ 323.050053] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 323.069246] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 03:33:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fanotify_init(0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f0000000080)=""/114) clone(0x0, &(0x7f0000000080), &(0x7f00000001c0), &(0x7f0000000040), &(0x7f0000000400)) 03:33:30 executing program 1 (fault-call:10 fault-nth:15): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 323.076960] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 323.084221] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 323.091484] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 323.098748] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 323.106003] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000000e 03:33:30 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:30 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:30 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000240)={{0xa, 0x4e23, 0x6, @remote={0xfe, 0x80, [], 0xbb}, 0x51}, {0xa, 0x4e24, 0x2, @local={0xfe, 0x80, [], 0xaa}, 0x6}, 0x20000, [0x4, 0x7ff, 0x8, 0xaa, 0x4, 0x5, 0x5, 0x1]}, 0x5c) clone(0x0, &(0x7f00000002c0)="423b38ff1928a8a6e8459bde8f217db61de95b0beee819e89c94bd8dcac548669f2937d2b23394b8e578d065ba6570aeba89899b792d1c5b04abadde42ea6778893cc3ef8b5c93595a767ef7e19fe7f0af10b876775e59d872813c705f7b1727baabffe18951944aeecd3a821ba697915e5d81e7940306432d12e4d03b7e2f7061b2a0c657d9f3f057faf5ac10c64438f92662b068761d943119978ae04e3464eb316d304c027acc3c42b58032fb2ebf059cd022e16ea144cc9a8d2337055d976c000000000000000000000000", &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000003c0)) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x980, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0x402c5342, &(0x7f00000001c0)={0x9, 0x1, 0x8000, {}, 0x7, 0x6}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4, 0x0, 0x0) 03:33:30 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x2, 0x200000002, 0x0) getsockopt$inet_int(r1, 0x0, 0x15, &(0x7f0000000000), &(0x7f0000000080)=0x4) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x1, 0x200300) openat$cgroup(r2, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) 03:33:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 03:33:31 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(r2, r2) r3 = inotify_init1(0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0xff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r4, 0xc1105517, &(0x7f0000000340)={{0x4, 0x0, 0x2, 0x80, 'syz1\x00', 0x7}, 0x1, 0x10, 0x6, r1, 0x4, 0xff, 'syz0\x00', &(0x7f00000000c0)=['/dev/rtc0\x00', 'ppp1em1@^^wlan1\x00', 'GPL\x00', '/dev/rtc0\x00'], 0x28, [], [0xef3, 0x8, 0x7fffffff, 0x5a17]}) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r5, 0xc0045540, &(0x7f0000000040)=0x6c9) fcntl$setown(r3, 0x8, 0xffffffffffffffff) fcntl$getownex(r3, 0x10, &(0x7f0000000300)={0x0, 0x0}) tkill(r6, 0x0) [ 323.695984] FAULT_INJECTION: forcing a failure. [ 323.695984] name failslab, interval 1, probability 0, space 0, times 0 [ 323.707688] CPU: 1 PID: 24396 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 323.716189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.725895] Call Trace: [ 323.728483] dump_stack+0x1c9/0x2b4 [ 323.732105] ? dump_stack_print_info.cold.2+0x52/0x52 [ 323.737309] ? __kernel_text_address+0xd/0x40 [ 323.741808] ? unwind_get_return_address+0x61/0xa0 [ 323.746743] should_fail.cold.4+0xa/0x11 [ 323.750796] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 323.755907] ? save_stack+0xa9/0xd0 [ 323.759540] ? save_stack+0x43/0xd0 [ 323.763153] ? kasan_kmalloc+0xc4/0xe0 [ 323.767041] ? kmem_cache_alloc_trace+0x152/0x780 [ 323.771889] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 323.777072] ? __list_lru_init+0x4d6/0x840 [ 323.781304] ? alloc_super+0x976/0xb10 [ 323.785209] ? vfs_get_super+0x6e/0x270 [ 323.789193] ? proc_get_tree+0x88/0xb0 [ 323.793083] ? vfs_get_tree+0x1cb/0x5c0 [ 323.797049] ? do_mount+0x6c1/0x1fb0 [ 323.800763] ? ksys_mount+0x12d/0x140 [ 323.804576] ? __x64_sys_mount+0xbe/0x150 [ 323.808721] ? do_syscall_64+0x1b9/0x820 [ 323.812774] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.818228] ? save_stack+0xa9/0xd0 [ 323.822812] ? lock_acquire+0x1e4/0x540 [ 323.826784] ? fs_reclaim_acquire+0x20/0x20 [ 323.831097] ? lock_downgrade+0x8f0/0x8f0 [ 323.835233] ? __x64_sys_mount+0xbe/0x150 [ 323.839386] ? check_same_owner+0x340/0x340 [ 323.843701] ? rcu_note_context_switch+0x730/0x730 [ 323.848628] __should_failslab+0x124/0x180 [ 323.852865] should_failslab+0x9/0x14 [ 323.856666] kmem_cache_alloc_trace+0x2cb/0x780 [ 323.861356] ? kasan_kmalloc+0xc4/0xe0 [ 323.865263] __memcg_init_list_lru_node+0x185/0x2d0 [ 323.870313] ? kvfree_rcu+0x20/0x20 [ 323.873946] ? __kmalloc_node+0x47/0x70 [ 323.878022] __list_lru_init+0x4d6/0x840 [ 323.882073] ? list_lru_destroy+0x500/0x500 [ 323.886409] ? prealloc_shrinker+0x213/0x480 [ 323.890807] ? __init_waitqueue_head+0x9e/0x150 [ 323.895479] ? inactive_list_is_low+0x850/0x850 [ 323.900155] ? __lockdep_init_map+0x105/0x590 [ 323.904670] alloc_super+0x976/0xb10 [ 323.908378] ? destroy_unused_super.part.11+0x110/0x110 [ 323.913753] ? lock_downgrade+0x8f0/0x8f0 [ 323.917911] ? kasan_check_read+0x11/0x20 [ 323.922071] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 323.926669] ? kasan_check_write+0x14/0x20 [ 323.930918] ? do_raw_spin_lock+0xc1/0x200 [ 323.935166] ? ns_test_super+0x50/0x50 [ 323.939044] sget_fc+0x269/0x950 [ 323.942412] ? compare_single+0x10/0x10 [ 323.946815] ? alloc_super+0xb10/0xb10 [ 323.952003] ? kasan_kmalloc+0xc4/0xe0 [ 323.956687] ? __kmalloc_track_caller+0x311/0x760 [ 323.961518] ? proc_root_lookup+0x60/0x60 [ 323.965653] vfs_get_super+0x6e/0x270 [ 323.969449] proc_get_tree+0x88/0xb0 [ 323.973166] vfs_get_tree+0x1cb/0x5c0 [ 323.976979] do_mount+0x6c1/0x1fb0 [ 323.981292] ? check_same_owner+0x340/0x340 [ 323.985610] ? lock_release+0xa30/0xa30 [ 323.989576] ? copy_mount_string+0x40/0x40 [ 323.993803] ? kasan_kmalloc+0xc4/0xe0 [ 323.997678] ? kmem_cache_alloc_trace+0x318/0x780 [ 324.002683] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 324.008226] ? _copy_from_user+0xdf/0x150 [ 324.012383] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 324.017922] ? copy_mount_options+0x285/0x380 [ 324.022414] ksys_mount+0x12d/0x140 [ 324.026047] __x64_sys_mount+0xbe/0x150 [ 324.030019] do_syscall_64+0x1b9/0x820 [ 324.033906] ? syscall_return_slowpath+0x5e0/0x5e0 [ 324.038830] ? syscall_return_slowpath+0x31d/0x5e0 [ 324.043756] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 324.048779] ? prepare_exit_to_usermode+0x291/0x3b0 [ 324.053795] ? perf_trace_sys_enter+0xb10/0xb10 [ 324.058457] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 324.063300] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 324.068480] RIP: 0033:0x455ab9 [ 324.071681] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 324.090972] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 324.098689] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 324.105945] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 324.113199] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 324.120461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 324.127716] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000000f 03:33:31 executing program 1 (fault-call:10 fault-nth:16): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 03:33:31 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000600)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000001c0)={"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"}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200581, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000040)={0xc0000000}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000080)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x9}]}}) 03:33:31 executing program 0: sched_setattr(0x0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 03:33:31 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xa0010000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:31 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7209, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:31 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) getsockname(0xffffffffffffff9c, &(0x7f0000000200)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @remote}}}}, &(0x7f0000000300)=0x80) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000340)={@local={0xfe, 0x80, [], 0xaa}, 0x100, 0x1, 0x3, 0x8, 0x2, 0x6, 0x7}, 0x20) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0xc, 0x400, 0x0) r1 = socket(0x3, 0x1, 0x1) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000280)={&(0x7f0000000400)=ANY=[@ANYBLOB="686e341e4f19fcf0a92da2ce4f32000000", @ANYRES16=r2, @ANYBLOB="000b27bd7000fedbdf250e00000040000300080003000200000008000500ac1414aa0800030000000000080004003707000014000600fe8000000000000000000000000000bb08000500e00000020c00030008000800ae000000080006003f0000004279318a5a6690bd32e22555695e23e7c7e276ac57302695163b23e764bc6633ba228439e196b5798a135aaafbcf25e8369198268f3c170e17ebdd89f572f1b6191127ba287c5f78411bee427b1ef6cdaa3f86d92fd7df96e54867bb6d5bd8c216aab8fedaca512e"], 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x4000) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)) r3 = open(&(0x7f0000000380)='./file0\x00', 0x4000, 0x11) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x1) 03:33:31 executing program 3: r0 = gettid() sched_getattr(r0, &(0x7f0000000000), 0x30, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file1\x00', 0x0, 0x0, &(0x7f0000000340), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="646f733178666c6f7070792c7569643d2c64656275672c6572726f72733d72656d6f756e742d726f2c64656275672c73006f77657865632c646973636172642c636865636b3d7374726963746db1b4653d7b90d4f57b97063e8dce4cfe85f86f39cc89a4af58253369808f377b8fd07c2636c308c4132c0785e62fca84c66438acac2e441eb787fe989fdf2cb2cc5f6d4382376c2a74d843f61f58ad696d271bbed3135f6ee50555ab5c3fe49ef27924c5314fe6e710dd146ec8f0ed3760e93cfbe90a4832b9475f71b6"]) syz_mount_image$vfat(&(0x7f0000000340)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000300)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, &(0x7f0000000240)=ANY=[]) mknod$loop(&(0x7f00000001c0)="2e2f66696c65302f2e696c2e2efe", 0x600c, 0xffffffffffffffff) rename(&(0x7f0000000280)='./file0\x00', &(0x7f0000000240)='./file1\x00') 03:33:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x23, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 03:33:32 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x180, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000200)={0x10}) ioctl$KDENABIO(r1, 0x4b36) ioctl$RTC_AIE_OFF(r1, 0x7002) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000240)=0x1ff) 03:33:32 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x1, 0x80000) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xe, 0x24150, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_int(r1, 0x1, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 324.724491] FAULT_INJECTION: forcing a failure. [ 324.724491] name failslab, interval 1, probability 0, space 0, times 0 [ 324.735851] CPU: 0 PID: 24454 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 324.744351] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.753886] Call Trace: [ 324.756472] dump_stack+0x1c9/0x2b4 [ 324.760086] ? dump_stack_print_info.cold.2+0x52/0x52 [ 324.765307] ? __kernel_text_address+0xd/0x40 [ 324.769802] ? unwind_get_return_address+0x61/0xa0 [ 324.774729] should_fail.cold.4+0xa/0x11 [ 324.778795] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 324.783897] ? save_stack+0xa9/0xd0 [ 324.787537] ? save_stack+0x43/0xd0 [ 324.791161] ? kasan_kmalloc+0xc4/0xe0 [ 324.795043] ? kmem_cache_alloc_trace+0x152/0x780 [ 324.799881] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 324.805063] ? __list_lru_init+0x4d6/0x840 [ 324.809303] ? alloc_super+0x976/0xb10 [ 324.813184] ? vfs_get_super+0x6e/0x270 [ 324.817157] ? proc_get_tree+0x88/0xb0 [ 324.821237] ? vfs_get_tree+0x1cb/0x5c0 [ 324.825221] ? do_mount+0x6c1/0x1fb0 [ 324.828949] ? ksys_mount+0x12d/0x140 [ 324.832784] ? __x64_sys_mount+0xbe/0x150 [ 324.836937] ? do_syscall_64+0x1b9/0x820 [ 324.841010] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 324.846394] ? save_stack+0xa9/0xd0 [ 324.850029] ? lock_acquire+0x1e4/0x540 [ 324.853998] ? fs_reclaim_acquire+0x20/0x20 [ 324.858320] ? lock_downgrade+0x8f0/0x8f0 [ 324.862470] ? __x64_sys_mount+0xbe/0x150 [ 324.866646] ? check_same_owner+0x340/0x340 [ 324.870962] ? rcu_note_context_switch+0x730/0x730 [ 324.875912] __should_failslab+0x124/0x180 [ 324.880153] should_failslab+0x9/0x14 [ 324.883967] kmem_cache_alloc_trace+0x2cb/0x780 [ 324.888622] ? kasan_kmalloc+0xc4/0xe0 [ 324.892509] __memcg_init_list_lru_node+0x185/0x2d0 [ 324.897518] ? kvfree_rcu+0x20/0x20 [ 324.901132] ? __kmalloc_node+0x47/0x70 [ 324.905096] __list_lru_init+0x4d6/0x840 [ 324.909150] ? list_lru_destroy+0x500/0x500 [ 324.913471] ? prealloc_shrinker+0x213/0x480 [ 324.917878] ? __init_waitqueue_head+0x9e/0x150 [ 324.922539] ? inactive_list_is_low+0x850/0x850 [ 324.927212] ? __lockdep_init_map+0x105/0x590 [ 324.931720] alloc_super+0x976/0xb10 [ 324.935439] ? destroy_unused_super.part.11+0x110/0x110 [ 324.940808] ? lock_downgrade+0x8f0/0x8f0 [ 324.944950] ? kasan_check_read+0x11/0x20 [ 324.949177] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 324.953761] ? kasan_check_write+0x14/0x20 [ 324.957993] ? do_raw_spin_lock+0xc1/0x200 [ 324.962219] ? ns_test_super+0x50/0x50 [ 324.966095] sget_fc+0x269/0x950 [ 324.969454] ? compare_single+0x10/0x10 [ 324.973435] ? alloc_super+0xb10/0xb10 [ 324.977344] ? kasan_kmalloc+0xc4/0xe0 [ 324.981261] ? __kmalloc_track_caller+0x311/0x760 [ 324.986104] ? proc_root_lookup+0x60/0x60 [ 324.990268] vfs_get_super+0x6e/0x270 [ 324.994065] proc_get_tree+0x88/0xb0 [ 324.997772] vfs_get_tree+0x1cb/0x5c0 [ 325.001572] do_mount+0x6c1/0x1fb0 [ 325.005112] ? kasan_check_write+0x14/0x20 [ 325.009351] ? copy_mount_string+0x40/0x40 [ 325.013574] ? kasan_kmalloc+0xc4/0xe0 [ 325.017458] ? kmem_cache_alloc_trace+0x318/0x780 [ 325.022291] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 325.027819] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 325.033345] ? copy_mount_options+0x285/0x380 [ 325.037835] ksys_mount+0x12d/0x140 [ 325.041463] __x64_sys_mount+0xbe/0x150 [ 325.045441] do_syscall_64+0x1b9/0x820 [ 325.049329] ? finish_task_switch+0x1d3/0x870 [ 325.053820] ? syscall_return_slowpath+0x5e0/0x5e0 [ 325.058743] ? syscall_return_slowpath+0x31d/0x5e0 [ 325.063669] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 325.068674] ? prepare_exit_to_usermode+0x291/0x3b0 [ 325.073689] ? perf_trace_sys_enter+0xb10/0xb10 [ 325.078356] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 325.083212] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 325.088394] RIP: 0033:0x455ab9 [ 325.091570] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 325.110892] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 325.118590] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 03:33:32 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:32 executing program 1 (fault-call:10 fault-nth:17): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 325.125877] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 325.133501] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 325.140758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 325.148028] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000010 03:33:32 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 325.234154] FAT-fs (loop3): Unrecognized mount option "uid=" or missing value 03:33:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x80, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e24, 0xd3, @remote={0xfe, 0x80, [], 0xbb}, 0x80000000}}, 0xffff, 0x6, 0x0, 0x0, 0x40}, &(0x7f0000000180)=0x98) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f00000001c0)={r3, 0x2}, 0x8) r4 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000280)={0x0, &(0x7f0000000240), 0x4, r4, 0x3}) mq_open(&(0x7f0000000000)="272e28656d3123d2400b766d6e6574317070703000", 0x802, 0x12, &(0x7f0000000040)={0x5e880526, 0x5, 0x0, 0x101, 0x0, 0x0, 0x401, 0x3}) 03:33:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 03:33:33 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) r0 = shmget$private(0x0, 0x3000, 0x100, &(0x7f0000ffd000/0x3000)=nil) shmat(r0, &(0x7f0000fff000/0x1000)=nil, 0x7000) 03:33:33 executing program 0: sched_setattr(0x0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 03:33:33 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, 0xc) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xb, 0x1f, 0x7, 0x5, 0x1}, 0x2c) semget$private(0x0, 0x0, 0xe) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f00000000c0), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f0000000500)=""/208}, 0x16) 03:33:33 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfcfdffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 325.656834] FAULT_INJECTION: forcing a failure. [ 325.656834] name failslab, interval 1, probability 0, space 0, times 0 [ 325.669670] CPU: 0 PID: 24513 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 325.678163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.687612] Call Trace: [ 325.690235] dump_stack+0x1c9/0x2b4 [ 325.693881] ? dump_stack_print_info.cold.2+0x52/0x52 [ 325.699088] ? __kernel_text_address+0xd/0x40 [ 325.703575] ? unwind_get_return_address+0x61/0xa0 [ 325.708507] should_fail.cold.4+0xa/0x11 [ 325.712556] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 325.717644] ? save_stack+0xa9/0xd0 [ 325.721265] ? save_stack+0x43/0xd0 [ 325.724898] ? kasan_kmalloc+0xc4/0xe0 [ 325.728771] ? kmem_cache_alloc_trace+0x152/0x780 [ 325.733608] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 325.738788] ? __list_lru_init+0x4d6/0x840 [ 325.743006] ? alloc_super+0x976/0xb10 [ 325.746899] ? vfs_get_super+0x6e/0x270 [ 325.750861] ? proc_get_tree+0x88/0xb0 [ 325.754734] ? vfs_get_tree+0x1cb/0x5c0 [ 325.758698] ? do_mount+0x6c1/0x1fb0 [ 325.762398] ? ksys_mount+0x12d/0x140 [ 325.766282] ? __x64_sys_mount+0xbe/0x150 [ 325.770418] ? do_syscall_64+0x1b9/0x820 [ 325.774472] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 325.779826] ? save_stack+0xa9/0xd0 [ 325.783462] ? lock_acquire+0x1e4/0x540 [ 325.787421] ? fs_reclaim_acquire+0x20/0x20 [ 325.791744] ? lock_downgrade+0x8f0/0x8f0 [ 325.795881] ? __x64_sys_mount+0xbe/0x150 [ 325.800014] ? check_same_owner+0x340/0x340 [ 325.804336] ? rcu_note_context_switch+0x730/0x730 [ 325.809254] __should_failslab+0x124/0x180 [ 325.813490] should_failslab+0x9/0x14 [ 325.817276] kmem_cache_alloc_trace+0x2cb/0x780 [ 325.821930] ? kasan_kmalloc+0xc4/0xe0 [ 325.825807] __memcg_init_list_lru_node+0x185/0x2d0 [ 325.830810] ? kvfree_rcu+0x20/0x20 [ 325.834435] ? __kmalloc_node+0x47/0x70 [ 325.838397] __list_lru_init+0x4d6/0x840 [ 325.842444] ? list_lru_destroy+0x500/0x500 [ 325.846753] ? prealloc_shrinker+0x213/0x480 [ 325.851162] ? __init_waitqueue_head+0x9e/0x150 [ 325.855826] ? inactive_list_is_low+0x850/0x850 [ 325.860483] ? __lockdep_init_map+0x105/0x590 [ 325.864963] alloc_super+0x976/0xb10 [ 325.868664] ? destroy_unused_super.part.11+0x110/0x110 [ 325.874017] ? lock_downgrade+0x8f0/0x8f0 [ 325.878155] ? kasan_check_read+0x11/0x20 [ 325.882292] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 325.886882] ? kasan_check_write+0x14/0x20 [ 325.891106] ? do_raw_spin_lock+0xc1/0x200 [ 325.895332] ? ns_test_super+0x50/0x50 [ 325.899206] sget_fc+0x269/0x950 [ 325.902560] ? compare_single+0x10/0x10 [ 325.906528] ? alloc_super+0xb10/0xb10 [ 325.910411] ? kasan_kmalloc+0xc4/0xe0 [ 325.914294] ? __kmalloc_track_caller+0x311/0x760 [ 325.919126] ? proc_root_lookup+0x60/0x60 [ 325.923265] vfs_get_super+0x6e/0x270 [ 325.927082] proc_get_tree+0x88/0xb0 [ 325.930782] vfs_get_tree+0x1cb/0x5c0 [ 325.934577] do_mount+0x6c1/0x1fb0 [ 325.938191] ? kasan_check_write+0x14/0x20 [ 325.942414] ? copy_mount_string+0x40/0x40 [ 325.946631] ? kasan_kmalloc+0xc4/0xe0 [ 325.950504] ? kmem_cache_alloc_trace+0x318/0x780 [ 325.955346] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 325.960870] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 325.966396] ? copy_mount_options+0x285/0x380 [ 325.970879] ksys_mount+0x12d/0x140 [ 325.974495] __x64_sys_mount+0xbe/0x150 [ 325.978546] do_syscall_64+0x1b9/0x820 [ 325.982418] ? finish_task_switch+0x1d3/0x870 [ 325.986900] ? syscall_return_slowpath+0x5e0/0x5e0 [ 325.991822] ? syscall_return_slowpath+0x31d/0x5e0 [ 325.996741] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 326.001743] ? prepare_exit_to_usermode+0x291/0x3b0 [ 326.006743] ? perf_trace_sys_enter+0xb10/0xb10 [ 326.011399] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 326.016233] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.021409] RIP: 0033:0x455ab9 [ 326.024575] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.043751] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 326.051442] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 03:33:33 executing program 1 (fault-call:10 fault-nth:18): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 326.058692] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 326.065951] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 326.073215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 326.080469] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000011 03:33:33 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:33 executing program 0: sched_setattr(0x0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 03:33:33 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00', 0x0) write(r0, &(0x7f0000000080)="a8", 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0xfffffffffffffff8}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r1, 0x4) sendfile(r0, r0, &(0x7f0000317000), 0xff8) mq_unlink(&(0x7f0000000000)="655edf17d9501b302325045cd344e977568a5a2177f057") 03:33:33 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000200), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000300), 0x0) sendmsg$nl_netfilter(r2, &(0x7f0000000440)={&(0x7f0000000340)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="140080000400000000cf305a9bdd3ed19a80bbe2e94d84a13215db5b40bdaa929923453e651774a0c8b6088e2865ca1c41a48c148763c8b4961b87053629c5a8e0d773bae381ac78d207fe499c44418f34434c7901049694a8177280eb76167b8ff92e100cb100b43deff493eaabd165a006100000000000000000bc2ce8c75c088c3d4100000000000000000000000000000000"], 0xffffffffffffff69}, 0x1}, 0x0) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000040)=0x6) 03:33:33 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x4000, 0x0) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000200)=""/136) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80800, 0x0) setsockopt$inet_udp_int(r1, 0x11, 0x66, &(0x7f0000000040)=0x91, 0x4) 03:33:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 03:33:34 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 326.541597] FAULT_INJECTION: forcing a failure. [ 326.541597] name failslab, interval 1, probability 0, space 0, times 0 [ 326.553147] CPU: 0 PID: 24563 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 326.561658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.571021] Call Trace: [ 326.573678] dump_stack+0x1c9/0x2b4 [ 326.577303] ? dump_stack_print_info.cold.2+0x52/0x52 [ 326.582493] ? perf_trace_lock+0xde/0x920 [ 326.586636] should_fail.cold.4+0xa/0x11 [ 326.590689] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 326.595818] ? save_stack+0xa9/0xd0 [ 326.599443] ? save_stack+0x43/0xd0 [ 326.603066] ? kasan_kmalloc+0xc4/0xe0 [ 326.606947] ? kmem_cache_alloc_trace+0x152/0x780 [ 326.611792] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 326.616992] ? __list_lru_init+0x4d6/0x840 [ 326.621226] ? alloc_super+0x976/0xb10 [ 326.625119] ? vfs_get_super+0x6e/0x270 [ 326.629138] ? proc_get_tree+0x88/0xb0 [ 326.633022] ? do_mount+0x6c1/0x1fb0 [ 326.636743] ? ksys_mount+0x12d/0x140 [ 326.640545] ? __x64_sys_mount+0xbe/0x150 [ 326.644688] ? do_syscall_64+0x1b9/0x820 [ 326.648742] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.654107] ? lock_acquire+0x1e4/0x540 [ 326.658245] ? fs_reclaim_acquire+0x20/0x20 [ 326.662569] ? lock_downgrade+0x8f0/0x8f0 [ 326.666721] ? __x64_sys_mount+0xbe/0x150 [ 326.670858] ? check_same_owner+0x340/0x340 [ 326.676113] ? rcu_note_context_switch+0x730/0x730 [ 326.681039] __should_failslab+0x124/0x180 [ 326.685288] should_failslab+0x9/0x14 [ 326.689084] kmem_cache_alloc_trace+0x2cb/0x780 [ 326.693745] ? kasan_kmalloc+0xc4/0xe0 [ 326.697633] __memcg_init_list_lru_node+0x185/0x2d0 [ 326.702657] ? kvfree_rcu+0x20/0x20 [ 326.706288] ? __kmalloc_node+0x47/0x70 [ 326.710253] __list_lru_init+0x4d6/0x840 [ 326.714311] ? list_lru_destroy+0x500/0x500 [ 326.718634] ? prealloc_shrinker+0x213/0x480 [ 326.723035] ? __init_waitqueue_head+0x9e/0x150 [ 326.727692] ? inactive_list_is_low+0x850/0x850 [ 326.732360] ? __lockdep_init_map+0x105/0x590 [ 326.736851] alloc_super+0x976/0xb10 [ 326.740568] ? destroy_unused_super.part.11+0x110/0x110 [ 326.745927] ? lock_downgrade+0x8f0/0x8f0 [ 326.750077] ? kasan_check_read+0x11/0x20 [ 326.754238] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 326.758816] ? kasan_check_write+0x14/0x20 [ 326.763045] ? do_raw_spin_lock+0xc1/0x200 [ 326.767297] ? ns_test_super+0x50/0x50 [ 326.771198] sget_fc+0x269/0x950 [ 326.774554] ? compare_single+0x10/0x10 [ 326.778956] ? alloc_super+0xb10/0xb10 [ 326.782841] ? kasan_kmalloc+0xc4/0xe0 [ 326.786722] ? __kmalloc_track_caller+0x311/0x760 [ 326.791572] ? proc_root_lookup+0x60/0x60 [ 326.795711] vfs_get_super+0x6e/0x270 [ 326.799517] proc_get_tree+0x88/0xb0 [ 326.803228] vfs_get_tree+0x1cb/0x5c0 [ 326.807033] do_mount+0x6c1/0x1fb0 [ 326.810574] ? kasan_check_read+0x11/0x20 [ 326.814722] ? do_raw_spin_unlock+0xa7/0x2f0 [ 326.819137] ? copy_mount_string+0x40/0x40 [ 326.823373] ? kasan_kmalloc+0xc4/0xe0 [ 326.827268] ? kmem_cache_alloc_trace+0x318/0x780 [ 326.832128] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 326.837664] ? copy_mount_options+0x285/0x380 [ 326.842172] ksys_mount+0x12d/0x140 [ 326.845809] __x64_sys_mount+0xbe/0x150 [ 326.849778] do_syscall_64+0x1b9/0x820 [ 326.853660] ? finish_task_switch+0x1d3/0x870 [ 326.858149] ? syscall_return_slowpath+0x5e0/0x5e0 [ 326.863067] ? syscall_return_slowpath+0x31d/0x5e0 [ 326.868173] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 326.873189] ? prepare_exit_to_usermode+0x291/0x3b0 [ 326.878212] ? perf_trace_sys_enter+0xb10/0xb10 [ 326.882890] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 326.888270] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 326.893455] RIP: 0033:0x455ab9 [ 326.896626] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.915797] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 326.923496] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 326.930759] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 03:33:34 executing program 1 (fault-call:10 fault-nth:19): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 326.938030] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 326.945290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 326.952563] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000012 03:33:34 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:34 executing program 0: sched_setattr(0x0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 03:33:34 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x3, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000080)=0x7, 0x4) listen(r0, 0x1ff) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r1, &(0x7f0000000140)="d9", 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x3, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1c) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x8, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x4}, 0x1c) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = accept4(r0, &(0x7f00000000c0)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5effc)=0x80, 0x0) recvmsg$kcm(r3, &(0x7f0000002c00)={&(0x7f0000000600)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000000000), 0x0, &(0x7f0000002b80)=""/114, 0x72}, 0x0) 03:33:34 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7fffffff, 0x400000) r1 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffc000/0x3000)=nil) shmat(r1, &(0x7f0000ffe000/0x2000)=nil, 0x4000) get_mempolicy(&(0x7f0000000000), &(0x7f0000000280), 0x1ff, &(0x7f0000fff000/0x1000)=nil, 0x83) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0x50, "f542880fdf93823c8d936aee31f0378c53ea56916855bf99e67ed15025111fc36880203784089790b0fc78afc70761136335fb3cafdf9ad1039c143d88987fab3968fc123c442c487cf34adbe10cb3d4"}, &(0x7f0000000040)=0x58) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={r2, 0x8, 0x10}, 0xc) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) fgetxattr(r3, &(0x7f0000000080)=@known='security.capability\x00', &(0x7f0000000180)=""/156, 0x9c) 03:33:34 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x2}) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 03:33:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 03:33:34 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf39b, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:34 executing program 0: sched_setattr(0x0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) [ 327.417266] FAULT_INJECTION: forcing a failure. [ 327.417266] name failslab, interval 1, probability 0, space 0, times 0 [ 327.428769] CPU: 0 PID: 24622 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 327.437273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.447094] Call Trace: [ 327.449706] dump_stack+0x1c9/0x2b4 [ 327.453350] ? dump_stack_print_info.cold.2+0x52/0x52 [ 327.458537] ? __kernel_text_address+0xd/0x40 [ 327.463036] ? unwind_get_return_address+0x61/0xa0 [ 327.467963] should_fail.cold.4+0xa/0x11 [ 327.472014] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 327.477135] ? save_stack+0xa9/0xd0 [ 327.480762] ? save_stack+0x43/0xd0 [ 327.484383] ? kasan_kmalloc+0xc4/0xe0 [ 327.488258] ? kmem_cache_alloc_trace+0x152/0x780 [ 327.493091] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 327.498283] ? __list_lru_init+0x4d6/0x840 [ 327.502514] ? alloc_super+0x976/0xb10 [ 327.506414] ? vfs_get_super+0x6e/0x270 [ 327.510407] ? proc_get_tree+0x88/0xb0 03:33:34 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40096100, 0x0) membarrier(0x10, 0x0) 03:33:35 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 327.515796] ? vfs_get_tree+0x1cb/0x5c0 [ 327.519802] ? do_mount+0x6c1/0x1fb0 [ 327.523656] ? ksys_mount+0x12d/0x140 [ 327.527472] ? __x64_sys_mount+0xbe/0x150 [ 327.531657] ? do_syscall_64+0x1b9/0x820 [ 327.535754] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.541139] ? save_stack+0xa9/0xd0 [ 327.544775] ? lock_acquire+0x1e4/0x540 [ 327.548759] ? fs_reclaim_acquire+0x20/0x20 [ 327.553107] ? lock_downgrade+0x8f0/0x8f0 [ 327.557271] ? lock_downgrade+0x8f0/0x8f0 [ 327.561457] ? check_same_owner+0x340/0x340 03:33:35 executing program 4: r0 = memfd_create(&(0x7f0000000040)="9f81dfec19eac1fbaff677342b86023e0822cc0dfd70b07d371bc54c5a2c849e0032222728", 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x4) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000080)={0xe, 0x5, 0x7ff, 0x0, 0x0, [], [], [], 0x1, 0x3f}) sync_file_range(r0, 0xdea0, 0xfffffffffffffffc, 0x2) [ 327.565801] ? do_raw_spin_unlock+0xa7/0x2f0 [ 327.570228] ? rcu_note_context_switch+0x730/0x730 [ 327.575185] __should_failslab+0x124/0x180 [ 327.579695] should_failslab+0x9/0x14 [ 327.583487] kmem_cache_alloc_trace+0x2cb/0x780 [ 327.588157] ? kasan_kmalloc+0xc4/0xe0 [ 327.592038] __memcg_init_list_lru_node+0x185/0x2d0 [ 327.597041] ? kvfree_rcu+0x20/0x20 [ 327.600671] ? __kmalloc_node+0x47/0x70 [ 327.604644] __list_lru_init+0x4d6/0x840 [ 327.608689] ? list_lru_destroy+0x500/0x500 [ 327.613002] ? prealloc_shrinker+0x213/0x480 [ 327.617411] ? __init_waitqueue_head+0x9e/0x150 [ 327.622072] ? inactive_list_is_low+0x850/0x850 [ 327.626727] ? __lockdep_init_map+0x105/0x590 [ 327.631221] alloc_super+0x976/0xb10 [ 327.634932] ? destroy_unused_super.part.11+0x110/0x110 [ 327.640290] ? lock_downgrade+0x8f0/0x8f0 [ 327.644462] ? kasan_check_read+0x11/0x20 [ 327.648599] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 327.653190] ? kasan_check_write+0x14/0x20 [ 327.657952] ? do_raw_spin_lock+0xc1/0x200 [ 327.662173] ? ns_test_super+0x50/0x50 [ 327.666054] sget_fc+0x269/0x950 [ 327.669419] ? compare_single+0x10/0x10 [ 327.673392] ? alloc_super+0xb10/0xb10 [ 327.677272] ? kasan_kmalloc+0xc4/0xe0 [ 327.681178] ? __kmalloc_track_caller+0x311/0x760 [ 327.686017] ? proc_root_lookup+0x60/0x60 [ 327.690163] vfs_get_super+0x6e/0x270 [ 327.693962] proc_get_tree+0x88/0xb0 [ 327.697724] vfs_get_tree+0x1cb/0x5c0 [ 327.701533] do_mount+0x6c1/0x1fb0 [ 327.705071] ? check_same_owner+0x340/0x340 [ 327.709387] ? lock_release+0xa30/0xa30 [ 327.713373] ? copy_mount_string+0x40/0x40 [ 327.717598] ? kasan_kmalloc+0xc4/0xe0 [ 327.721567] ? kmem_cache_alloc_trace+0x318/0x780 [ 327.726408] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 327.731955] ? _copy_from_user+0xdf/0x150 [ 327.736110] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 327.741636] ? copy_mount_options+0x285/0x380 [ 327.746115] ksys_mount+0x12d/0x140 [ 327.749724] __x64_sys_mount+0xbe/0x150 [ 327.753687] do_syscall_64+0x1b9/0x820 [ 327.757577] ? finish_task_switch+0x1d3/0x870 [ 327.762060] ? syscall_return_slowpath+0x5e0/0x5e0 [ 327.766990] ? syscall_return_slowpath+0x31d/0x5e0 [ 327.771933] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 327.776965] ? prepare_exit_to_usermode+0x291/0x3b0 [ 327.782000] ? perf_trace_sys_enter+0xb10/0xb10 [ 327.786655] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 327.791496] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 327.796675] RIP: 0033:0x455ab9 [ 327.799843] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:33:35 executing program 1 (fault-call:10 fault-nth:20): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 327.818998] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 327.826710] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 327.833968] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 327.841234] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 327.848496] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 327.855765] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000013 03:33:35 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000001c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x20000, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000040)) 03:33:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 03:33:35 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffe, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:35 executing program 0: sched_setattr(0x0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) [ 328.261152] QAT: failed to copy from user cfg_data. 03:33:35 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000280)={0x18, 0x0, 0x7, 0xffffffffffffffff, 0x0, 0x0, {}, [@typed={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x1, 0x430000) write$P9_RWALK(r1, &(0x7f0000000140)={0x8b, 0x6f, 0x2, {0xa, [{0x1, 0x3}, {0x2, 0x1, 0x7}, {0x10, 0x1, 0x1}, {0x4, 0x0, 0x5}, {0x0, 0x1, 0x6}, {0x45, 0x2, 0x5}, {0x2, 0x2, 0x4}, {0x0, 0x1, 0x8}, {0x0, 0x2, 0x5}, {0xc0, 0x0, 0xd497}]}}, 0x8b) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x2, 0x200) [ 328.282606] QAT: failed to copy from user cfg_data. 03:33:35 executing program 3: syz_emit_ethernet(0x140, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x21, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @dev={0xac, 0x14, 0x14}}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}}}}, &(0x7f0000000000)) stat(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x5, &(0x7f0000001400)=[{&(0x7f0000000100)="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", 0x1000, 0x1f}, {&(0x7f0000001100)="d4245e8cdf5aaffdb542251c35ebc52c742bb0a01ad0fba5ba89ac25a16029b09589803c18b3c8068b0d1abd4736f876c89a933b9bd21459864e68321ad1eea1f55703bc96888f0c3807a14e2a583de8e27b75757458956ca6a43dce4186e9388a74b099c794f9b850ac5830ab087efc1694cb7a3e16e5d1a495e855b72c066bca44f34ce31108ff50f89780f1cec1a8733a03cc5b3fef9577d0c27bc3f4ce53248be8dc93bd179d7f8f3c02fb63b8b0d26a1f0c4dbd0e2181c75338da66903df8636c65e2d670506b0e32af0d1672a20c0e7ff566381f8151585ea5795aec5ef234079495942afb3de41f24d38f0fec0ed75e029bb5d892cdc9bf0de58c21", 0xff, 0x3}, {&(0x7f0000001200)="444e677553b513f9f9daefc43abda31d9b54c8c614322bb3f0c6d4b0e2b5e67380d85dd6f87bf14b71dc2c9a1b208b18cfaf634b123e34818f13d6848488a3c26237b9bbcf12131d7189d8489dfc3abf3d411b4d2a4f2d5b37910458ab6bbaa2fa5b70ce8b3a2730", 0x68, 0x7de}, {&(0x7f0000001280)="0d0eacb6e0a2448f839227e554a7c927e6eb895a135a39b95122d2e92eea21a8a20cf659a9ca7f3286f85661d1f4e3614f3d52779f613dc73580b7402cb462efa2c56bc48f75d0aee9776b6a27efd730c0054fbc53536e14b57f0d2291f7fb8d822e2afb53cbc14a024bf2d1979da39ad9626bae166a48", 0x77, 0x800}, {&(0x7f0000001300)="e4dfb7adb466fdded21545a1dc31e716acf127be1d40836d0c62b48391fadc419634c92e428c34c0850dd51c392d7264ee8a0ceddc66d4c746d3e4b279c927097fe8532c2ab4aff944c153a34266b96cd0bac9ad03b0b0ceae55075ddb937180dbe466598f00d2869c715dfca729db946e3bf75d724684192163052f094b858b9d9f16f97bb1db8759f2e74f3eb5cd39987d981cc77428d83d054c2dbb20f07ade806c39f18c2e2b275a467ad6a5c572b1b4db1498a7d323bc1b6874ccd6454d78cef5e29046e0e726ffbff467daf4495ca8f371c4f43a7d4eaa000c37e56605bc01649b37120a7f747f80c4016e7408038dd326c27b449a", 0xf8, 0x401}], 0x0, &(0x7f0000001540)={[{@nodiscard='nodiscard', 0x2c}, {@usrquota='usrquota', 0x2c}, {@grpquota='grpquota', 0x2c}, {@umask={'umask', 0x3d, 0x3}, 0x2c}, {@gid={'gid', 0x3d, r0}, 0x2c}, {@quota='quota', 0x2c}, {@errors_remount='errors=remount-ro', 0x2c}]}) 03:33:35 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:35 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x8000, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x14, 0x0) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000200)={r1, @empty, @dev={0xac, 0x14, 0x14, 0xf}}, 0xc) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) [ 328.421511] FAULT_INJECTION: forcing a failure. [ 328.421511] name failslab, interval 1, probability 0, space 0, times 0 [ 328.432972] CPU: 0 PID: 24680 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 328.441490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.450855] Call Trace: [ 328.453447] dump_stack+0x1c9/0x2b4 [ 328.457088] ? dump_stack_print_info.cold.2+0x52/0x52 [ 328.462284] ? perf_trace_lock+0xde/0x920 [ 328.466438] should_fail.cold.4+0xa/0x11 [ 328.470508] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 328.475626] ? save_stack+0xa9/0xd0 [ 328.479308] ? save_stack+0x43/0xd0 [ 328.483035] ? kasan_kmalloc+0xc4/0xe0 [ 328.487042] ? kmem_cache_alloc_trace+0x152/0x780 [ 328.491909] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 328.497127] ? __list_lru_init+0x4d6/0x840 [ 328.501459] ? alloc_super+0x976/0xb10 [ 328.505352] ? vfs_get_super+0x6e/0x270 [ 328.509374] ? proc_get_tree+0x88/0xb0 [ 328.513276] ? do_mount+0x6c1/0x1fb0 [ 328.516981] ? ksys_mount+0x12d/0x140 [ 328.520799] ? __x64_sys_mount+0xbe/0x150 [ 328.524961] ? do_syscall_64+0x1b9/0x820 [ 328.529022] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 328.534496] ? lock_acquire+0x1e4/0x540 [ 328.538664] ? fs_reclaim_acquire+0x20/0x20 [ 328.542996] ? lock_downgrade+0x8f0/0x8f0 [ 328.547169] ? __x64_sys_mount+0xbe/0x150 [ 328.551338] ? check_same_owner+0x340/0x340 [ 328.555674] ? rcu_note_context_switch+0x730/0x730 [ 328.560614] __should_failslab+0x124/0x180 [ 328.564857] should_failslab+0x9/0x14 [ 328.568678] kmem_cache_alloc_trace+0x2cb/0x780 [ 328.573345] ? kasan_kmalloc+0xc4/0xe0 [ 328.577447] __memcg_init_list_lru_node+0x185/0x2d0 [ 328.582499] ? kvfree_rcu+0x20/0x20 [ 328.586120] ? __kmalloc_node+0x47/0x70 [ 328.590109] __list_lru_init+0x4d6/0x840 [ 328.594186] ? list_lru_destroy+0x500/0x500 [ 328.598510] ? prealloc_shrinker+0x213/0x480 [ 328.602931] ? __init_waitqueue_head+0x9e/0x150 [ 328.607606] ? inactive_list_is_low+0x850/0x850 [ 328.612317] ? __lockdep_init_map+0x105/0x590 [ 328.616909] alloc_super+0x976/0xb10 [ 328.620683] ? destroy_unused_super.part.11+0x110/0x110 [ 328.626072] ? lock_downgrade+0x8f0/0x8f0 [ 328.630267] ? kasan_check_read+0x11/0x20 [ 328.634467] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 328.639097] ? kasan_check_write+0x14/0x20 [ 328.643337] ? do_raw_spin_lock+0xc1/0x200 [ 328.647587] ? ns_test_super+0x50/0x50 [ 328.651470] sget_fc+0x269/0x950 [ 328.654827] ? compare_single+0x10/0x10 [ 328.658798] ? alloc_super+0xb10/0xb10 [ 328.662697] ? kasan_kmalloc+0xc4/0xe0 [ 328.666599] ? __kmalloc_track_caller+0x311/0x760 [ 328.671446] ? proc_root_lookup+0x60/0x60 [ 328.676475] vfs_get_super+0x6e/0x270 [ 328.680276] proc_get_tree+0x88/0xb0 [ 328.683982] vfs_get_tree+0x1cb/0x5c0 [ 328.687775] do_mount+0x6c1/0x1fb0 [ 328.691307] ? kasan_check_read+0x11/0x20 [ 328.695447] ? do_raw_spin_unlock+0xa7/0x2f0 [ 328.699856] ? copy_mount_string+0x40/0x40 [ 328.704092] ? kasan_kmalloc+0xc4/0xe0 [ 328.707980] ? kmem_cache_alloc_trace+0x318/0x780 [ 328.712860] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 328.718395] ? copy_mount_options+0x285/0x380 [ 328.722897] ksys_mount+0x12d/0x140 [ 328.726555] __x64_sys_mount+0xbe/0x150 [ 328.730577] do_syscall_64+0x1b9/0x820 [ 328.734508] ? syscall_return_slowpath+0x5e0/0x5e0 [ 328.739471] ? syscall_return_slowpath+0x31d/0x5e0 [ 328.744415] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 328.749432] ? prepare_exit_to_usermode+0x291/0x3b0 [ 328.754458] ? perf_trace_sys_enter+0xb10/0xb10 [ 328.759150] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 328.764023] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 328.769232] RIP: 0033:0x455ab9 [ 328.772434] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 328.792176] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 328.799911] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 328.807181] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 328.814469] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 328.821747] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 328.829019] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000014 03:33:36 executing program 1 (fault-call:10 fault-nth:21): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 03:33:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x97ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 03:33:36 executing program 0: sched_setattr(0x0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 03:33:36 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x14, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:36 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000100)={0x2, 0x0, 0x11, &(0x7f0000000080)="974df50da66e8ee7136e1bd9a272f2bf12"}) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000000)={0x9, 0x1, 0xd2, &(0x7f0000000140)="d7b38514cf3607e6308406a7fc1cbfac0dc76fe99ff36e4c5c51a0e0a3d2798e8a3a9dcff86d939f4f190b8b9eee653ef862690507f668b1cb610509c5c81d6e19620cada28232ff7d793bd269171d07bf5b6b60df937b23a8d03c1ff56d0a383c0e1ca3d6a67c5031d3e7a90cb9f6bdf5fbe9caf2640758c9438f85d1ca8822945097aa00e41bb4e7f270d63af7dc39a028de71aa1cb79e7d47bdfe5fc345776f365d2ff1337c329763b570a9bbfc6a93fb035a34e2a6e80686d61a965bf9d4b2e2ca00b183b32d6419e972e4fc2bd3a317"}) 03:33:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f00000000c0)=ANY=[@ANYBLOB="05000000000000000d00004004fffff605000000000100000000004000000000010000f2e0fe650025000000ffffffff00cd72ee12551ae9fd4a5b17f0f7ddb3b1e69fd860f2994a322819"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000080)={0x1, 0x0, [{0x38e}]}) 03:33:36 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:36 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x3) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000300)=""/232) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) exit(0x627d) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f00000001c0)={0x6, 0x200, 0x1, 0x0, 0x0, [], [], [], 0xffff, 0x800000010000}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x210340, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000040)={0x80, 0x3f, 0x80000001, 0x9, 0x9, 0x10001, 0x563, 0x80, 0xc5b, 0x8001}) 03:33:36 executing program 0: sched_setattr(0x0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 03:33:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c00, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) [ 329.408794] FAULT_INJECTION: forcing a failure. [ 329.408794] name failslab, interval 1, probability 0, space 0, times 0 [ 329.420191] CPU: 0 PID: 24748 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 329.429130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.438508] Call Trace: [ 329.441120] dump_stack+0x1c9/0x2b4 [ 329.444753] ? dump_stack_print_info.cold.2+0x52/0x52 [ 329.449954] ? __kernel_text_address+0xd/0x40 [ 329.454444] ? unwind_get_return_address+0x61/0xa0 [ 329.459361] should_fail.cold.4+0xa/0x11 [ 329.463413] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 329.468507] ? save_stack+0xa9/0xd0 [ 329.472120] ? save_stack+0x43/0xd0 [ 329.475733] ? kasan_kmalloc+0xc4/0xe0 [ 329.479608] ? kmem_cache_alloc_trace+0x152/0x780 [ 329.484437] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 329.489705] ? __list_lru_init+0x4d6/0x840 [ 329.493942] ? alloc_super+0x976/0xb10 [ 329.497819] ? vfs_get_super+0x6e/0x270 [ 329.501792] ? proc_get_tree+0x88/0xb0 [ 329.505698] ? vfs_get_tree+0x1cb/0x5c0 [ 329.509686] ? do_mount+0x6c1/0x1fb0 [ 329.513397] ? ksys_mount+0x12d/0x140 [ 329.517210] ? __x64_sys_mount+0xbe/0x150 [ 329.521353] ? do_syscall_64+0x1b9/0x820 [ 329.525402] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 329.530773] ? save_stack+0xa9/0xd0 [ 329.534404] ? lock_acquire+0x1e4/0x540 [ 329.538375] ? fs_reclaim_acquire+0x20/0x20 [ 329.542686] ? lock_downgrade+0x8f0/0x8f0 [ 329.546824] ? __x64_sys_mount+0xbe/0x150 [ 329.550975] ? check_same_owner+0x340/0x340 [ 329.555294] ? rcu_note_context_switch+0x730/0x730 [ 329.560219] __should_failslab+0x124/0x180 [ 329.564454] should_failslab+0x9/0x14 [ 329.568249] kmem_cache_alloc_trace+0x2cb/0x780 [ 329.572909] ? kasan_kmalloc+0xc4/0xe0 [ 329.576805] __memcg_init_list_lru_node+0x185/0x2d0 [ 329.581817] ? kvfree_rcu+0x20/0x20 [ 329.585433] ? __kmalloc_node+0x47/0x70 [ 329.589410] __list_lru_init+0x4d6/0x840 [ 329.593457] ? list_lru_destroy+0x500/0x500 [ 329.597765] ? prealloc_shrinker+0x213/0x480 [ 329.602173] ? __init_waitqueue_head+0x9e/0x150 [ 329.607175] ? inactive_list_is_low+0x850/0x850 [ 329.611838] ? __lockdep_init_map+0x105/0x590 [ 329.616320] alloc_super+0x976/0xb10 [ 329.620021] ? destroy_unused_super.part.11+0x110/0x110 [ 329.625377] ? lock_downgrade+0x8f0/0x8f0 [ 329.629530] ? kasan_check_read+0x11/0x20 [ 329.633675] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 329.638254] ? kasan_check_write+0x14/0x20 [ 329.642479] ? do_raw_spin_lock+0xc1/0x200 [ 329.646706] ? ns_test_super+0x50/0x50 [ 329.650587] sget_fc+0x269/0x950 [ 329.653937] ? compare_single+0x10/0x10 [ 329.657896] ? alloc_super+0xb10/0xb10 [ 329.661780] ? kasan_kmalloc+0xc4/0xe0 [ 329.665752] ? __kmalloc_track_caller+0x311/0x760 [ 329.670580] ? proc_root_lookup+0x60/0x60 [ 329.674727] vfs_get_super+0x6e/0x270 [ 329.678514] proc_get_tree+0x88/0xb0 [ 329.682215] vfs_get_tree+0x1cb/0x5c0 [ 329.686009] do_mount+0x6c1/0x1fb0 [ 329.689539] ? kasan_check_write+0x14/0x20 [ 329.693768] ? copy_mount_string+0x40/0x40 [ 329.698007] ? retint_kernel+0x10/0x10 [ 329.701887] ? copy_mount_options+0x213/0x380 [ 329.706389] ? __sanitizer_cov_trace_const_cmp4+0x11/0x20 [ 329.712088] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 329.718218] ? copy_mount_options+0x285/0x380 [ 329.722698] ksys_mount+0x12d/0x140 [ 329.726313] __x64_sys_mount+0xbe/0x150 [ 329.730275] do_syscall_64+0x1b9/0x820 [ 329.734147] ? finish_task_switch+0x1d3/0x870 [ 329.738627] ? syscall_return_slowpath+0x5e0/0x5e0 [ 329.743541] ? syscall_return_slowpath+0x31d/0x5e0 [ 329.748460] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 329.753463] ? prepare_exit_to_usermode+0x291/0x3b0 [ 329.758472] ? perf_trace_sys_enter+0xb10/0xb10 [ 329.763128] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 329.767961] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 329.773134] RIP: 0033:0x455ab9 [ 329.776303] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.795484] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 329.803177] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 03:33:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8992, &(0x7f0000000000)={'bond0\x00', @ifru_names='ip6gretap0\x00'}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000080)={0xfffffffffffffffe, 0x7, 0x6, 'queue0\x00', 0x8}) restart_syscall() ioctl$SG_EMULATED_HOST(r1, 0x2203, &(0x7f0000000140)) 03:33:37 executing program 1 (fault-call:10 fault-nth:22): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 329.810442] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 329.817694] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 329.824953] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 329.832212] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000015 03:33:37 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1a0ffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:37 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:37 executing program 0: sched_setattr(0x0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 03:33:37 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:37 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{}]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f00000003c0)=0x4) 03:33:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x6800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) [ 330.298332] FAULT_INJECTION: forcing a failure. [ 330.298332] name failslab, interval 1, probability 0, space 0, times 0 [ 330.309639] CPU: 0 PID: 24799 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 330.318123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.327487] Call Trace: [ 330.330362] dump_stack+0x1c9/0x2b4 [ 330.333994] ? dump_stack_print_info.cold.2+0x52/0x52 [ 330.339184] ? kasan_check_write+0x14/0x20 [ 330.343463] should_fail.cold.4+0xa/0x11 [ 330.347540] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 330.352638] ? ksys_mount+0x12d/0x140 [ 330.356436] ? __x64_sys_mount+0xbe/0x150 [ 330.360578] ? do_syscall_64+0x1b9/0x820 [ 330.364630] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 330.370018] ? __list_lru_init+0x409/0x840 [ 330.374443] ? lock_downgrade+0x8f0/0x8f0 [ 330.378585] ? lock_acquire+0x1e4/0x540 [ 330.382552] ? fs_reclaim_acquire+0x20/0x20 [ 330.386883] ? lock_downgrade+0x8f0/0x8f0 [ 330.391048] ? __x64_sys_mount+0xbe/0x150 [ 330.395239] ? lock_acquire+0x1e4/0x540 [ 330.399218] ? lock_acquire+0x1e4/0x540 [ 330.403194] ? fs_reclaim_acquire+0x20/0x20 [ 330.407543] ? lock_downgrade+0x8f0/0x8f0 [ 330.411693] ? check_same_owner+0x340/0x340 [ 330.416005] ? check_same_owner+0x340/0x340 [ 330.420330] ? rcu_note_context_switch+0x730/0x730 [ 330.425271] __should_failslab+0x124/0x180 [ 330.429546] should_failslab+0x9/0x14 [ 330.433346] __kmalloc+0x2c8/0x760 [ 330.436893] ? kvfree_rcu+0x20/0x20 [ 330.440520] ? __list_lru_init+0x151/0x840 [ 330.444794] __list_lru_init+0x151/0x840 [ 330.448850] ? list_lru_destroy+0x500/0x500 [ 330.453168] ? prealloc_shrinker+0x213/0x480 [ 330.457574] ? __init_waitqueue_head+0x9e/0x150 [ 330.462253] ? inactive_list_is_low+0x850/0x850 [ 330.466935] ? __lockdep_init_map+0x105/0x590 [ 330.471423] alloc_super+0x9a6/0xb10 [ 330.475147] ? destroy_unused_super.part.11+0x110/0x110 [ 330.480529] ? lock_downgrade+0x8f0/0x8f0 [ 330.484700] ? kasan_check_read+0x11/0x20 [ 330.488860] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 330.493446] ? kasan_check_write+0x14/0x20 [ 330.497678] ? do_raw_spin_lock+0xc1/0x200 [ 330.501903] ? ns_test_super+0x50/0x50 [ 330.505979] sget_fc+0x269/0x950 [ 330.511698] ? compare_single+0x10/0x10 [ 330.515666] ? alloc_super+0xb10/0xb10 [ 330.519544] ? kasan_kmalloc+0xc4/0xe0 [ 330.523438] ? __kmalloc_track_caller+0x311/0x760 [ 330.528288] ? proc_root_lookup+0x60/0x60 [ 330.532453] vfs_get_super+0x6e/0x270 [ 330.536262] proc_get_tree+0x88/0xb0 [ 330.539972] vfs_get_tree+0x1cb/0x5c0 [ 330.543785] do_mount+0x6c1/0x1fb0 [ 330.547327] ? check_same_owner+0x340/0x340 [ 330.551656] ? lock_release+0xa30/0xa30 [ 330.555640] ? copy_mount_string+0x40/0x40 [ 330.559863] ? kasan_kmalloc+0xc4/0xe0 [ 330.563750] ? kmem_cache_alloc_trace+0x318/0x780 [ 330.568593] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 330.574124] ? _copy_from_user+0xdf/0x150 [ 330.578277] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 330.583804] ? copy_mount_options+0x285/0x380 [ 330.588292] ksys_mount+0x12d/0x140 [ 330.591923] __x64_sys_mount+0xbe/0x150 [ 330.595896] do_syscall_64+0x1b9/0x820 [ 330.599795] ? finish_task_switch+0x1d3/0x870 [ 330.604288] ? syscall_return_slowpath+0x5e0/0x5e0 [ 330.609214] ? syscall_return_slowpath+0x31d/0x5e0 [ 330.614144] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 330.619151] ? prepare_exit_to_usermode+0x291/0x3b0 [ 330.624171] ? perf_trace_sys_enter+0xb10/0xb10 [ 330.628844] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 330.633679] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 330.638853] RIP: 0033:0x455ab9 [ 330.642042] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 330.661245] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 330.668970] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 330.677129] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 330.684390] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 330.691654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 03:33:38 executing program 1 (fault-call:10 fault-nth:23): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 03:33:38 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1f) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20000120, 0x1, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000140], 0x2, &(0x7f0000000100), &(0x7f0000000140)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000003000000000000000000736974300000000000000000000000007663616e3000000000000000000000006970366772657461703000000000000067726574617030000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000f800000078010000c00100006c696d697400000000000000000000000000000000000000000000000000000020000000000000000000000001010000000000000000000000000000000000000000000000000000737461746973746963000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000000000000000006d61726b0000000000000000000000000000000000000000000000000000000010000000000000000000000000000000ffffffff000000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a30000000000000000000000000000000000000000000000000000000005241544545535400000000000000170000000000000000000000000000000000200000000000000073797a3100000000000000000000000000000000000000000000000000000000"]}, 0x2f8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000080)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f00000006c0)=0xe8) setresuid(r1, r2, r3) [ 330.698918] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000016 03:33:38 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:38 executing program 0: sched_setattr(0x0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 03:33:38 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf4ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 331.034741] FAULT_INJECTION: forcing a failure. [ 331.034741] name failslab, interval 1, probability 0, space 0, times 0 [ 331.046312] CPU: 1 PID: 24839 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 331.054819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.064225] Call Trace: [ 331.066828] dump_stack+0x1c9/0x2b4 [ 331.070478] ? dump_stack_print_info.cold.2+0x52/0x52 [ 331.075683] ? __kernel_text_address+0xd/0x40 [ 331.080214] ? unwind_get_return_address+0x61/0xa0 [ 331.085169] should_fail.cold.4+0xa/0x11 [ 331.089282] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 331.094406] ? save_stack+0xa9/0xd0 [ 331.098050] ? save_stack+0x43/0xd0 [ 331.101688] ? kasan_kmalloc+0xc4/0xe0 [ 331.105611] ? kmem_cache_alloc_trace+0x152/0x780 [ 331.110465] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 331.115671] ? __list_lru_init+0x4d6/0x840 [ 331.119924] ? alloc_super+0x976/0xb10 [ 331.123837] ? vfs_get_super+0x6e/0x270 [ 331.127945] ? proc_get_tree+0x88/0xb0 [ 331.131838] ? vfs_get_tree+0x1cb/0x5c0 [ 331.135814] ? do_mount+0x6c1/0x1fb0 [ 331.139552] ? ksys_mount+0x12d/0x140 [ 331.143345] ? __x64_sys_mount+0xbe/0x150 [ 331.147498] ? do_syscall_64+0x1b9/0x820 [ 331.151566] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 331.156932] ? save_stack+0xa9/0xd0 [ 331.160566] ? lock_acquire+0x1e4/0x540 [ 331.164525] ? fs_reclaim_acquire+0x20/0x20 [ 331.168830] ? lock_downgrade+0x8f0/0x8f0 [ 331.172965] ? __x64_sys_mount+0xbe/0x150 [ 331.177114] ? check_same_owner+0x340/0x340 [ 331.181421] ? rcu_note_context_switch+0x730/0x730 [ 331.186339] __should_failslab+0x124/0x180 [ 331.190580] should_failslab+0x9/0x14 [ 331.194377] kmem_cache_alloc_trace+0x2cb/0x780 [ 331.199042] ? kasan_kmalloc+0xc4/0xe0 [ 331.202926] __memcg_init_list_lru_node+0x185/0x2d0 [ 331.207929] ? kvfree_rcu+0x20/0x20 [ 331.211553] ? __kmalloc_node+0x47/0x70 [ 331.215608] __list_lru_init+0x4d6/0x840 [ 331.219661] ? list_lru_destroy+0x500/0x500 [ 331.223974] ? prealloc_shrinker+0x213/0x480 [ 331.228369] ? __init_waitqueue_head+0x9e/0x150 [ 331.233028] ? inactive_list_is_low+0x850/0x850 [ 331.237697] ? __lockdep_init_map+0x105/0x590 [ 331.242185] alloc_super+0x976/0xb10 [ 331.245888] ? destroy_unused_super.part.11+0x110/0x110 [ 331.251258] ? lock_downgrade+0x8f0/0x8f0 [ 331.255406] ? kasan_check_read+0x11/0x20 [ 331.259544] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 331.264111] ? kasan_check_write+0x14/0x20 [ 331.268329] ? do_raw_spin_lock+0xc1/0x200 [ 331.272557] ? ns_test_super+0x50/0x50 [ 331.276428] sget_fc+0x269/0x950 [ 331.279783] ? compare_single+0x10/0x10 [ 331.283740] ? alloc_super+0xb10/0xb10 [ 331.287609] ? kasan_kmalloc+0xc4/0xe0 [ 331.291487] ? __kmalloc_track_caller+0x311/0x760 [ 331.296326] ? proc_root_lookup+0x60/0x60 [ 331.300470] vfs_get_super+0x6e/0x270 [ 331.304269] proc_get_tree+0x88/0xb0 [ 331.307975] vfs_get_tree+0x1cb/0x5c0 [ 331.311786] do_mount+0x6c1/0x1fb0 [ 331.315310] ? kasan_check_write+0x14/0x20 [ 331.319537] ? copy_mount_string+0x40/0x40 [ 331.323757] ? kasan_kmalloc+0xc4/0xe0 [ 331.327667] ? kmem_cache_alloc_trace+0x318/0x780 [ 331.332508] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 331.338042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 331.343568] ? copy_mount_options+0x285/0x380 [ 331.348050] ksys_mount+0x12d/0x140 [ 331.351672] __x64_sys_mount+0xbe/0x150 [ 331.355644] do_syscall_64+0x1b9/0x820 [ 331.359516] ? syscall_return_slowpath+0x5e0/0x5e0 [ 331.364427] ? syscall_return_slowpath+0x31d/0x5e0 [ 331.369341] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 331.374441] ? prepare_exit_to_usermode+0x291/0x3b0 [ 331.379452] ? perf_trace_sys_enter+0xb10/0xb10 [ 331.384106] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 331.388947] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 331.394132] RIP: 0033:0x455ab9 [ 331.397301] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 331.416478] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 331.424177] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 331.431437] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 331.438956] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 331.446221] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 331.453481] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000017 03:33:38 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x73, 0x101000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000200)={0x15, 0x110, 0xfa00, {r1, 0x40, 0x0, 0x0, 0x0, @ib={0x1b, 0x1ff, 0x1, {"fd378b6982e46be8bf262d49b8793317"}, 0x0, 0x1000}, @in6={0xa, 0x4e22, 0x4, @dev={0xfe, 0x80, [], 0x16}, 0xffffffff80000001}}}, 0x118) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 03:33:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") sysfs$1(0x1, &(0x7f0000000000)='userlo\x00') r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000deb000)={0x2, 0x4e23, @rand_addr}, 0x10) sendto$inet(r2, &(0x7f00000002c0), 0xef1175d28d037c98, 0x20000000, &(0x7f0000000080)={0x2, 0x800000004004e23, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) shutdown(r2, 0x1) 03:33:38 executing program 3: prctl$setname(0xf, &(0x7f0000000140)="2aae0061dfaf000000000000bfaf924bc4d1965169f3ec901dab10842cd08dfb76207a49d657ea80542dd083c8d18f67a19397d102cb0d8ac748d5ed24d55f87104a0eed53d7afc0ae652b1d2f4265c42e9f7d587da9e7f26a36e0119a2b2bb3e44c7e1beb7b39d22e85e5db897bb5caa6ccc815") seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xc0, 0x103040) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) acct(&(0x7f0000000200)='./file0\x00') 03:33:38 executing program 0: sched_setattr(0x0, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(0xffffffffffffffff, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 03:33:38 executing program 1 (fault-call:10 fault-nth:24): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 03:33:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x600, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 03:33:39 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:39 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4800, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 331.658982] audit: type=1326 audit(2000000019.133:5): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24861 comm=2AAE exe="/root/syz-executor3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455ab9 code=0x50000 [ 331.678381] audit: type=1326 audit(2000000019.134:6): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24861 comm=2AAE exe="/root/syz-executor3" sig=0 arch=c000003e syscall=2 compat=0 ip=0x40fd11 code=0x50000 [ 331.697079] audit: type=1326 audit(2000000019.134:7): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24861 comm=2AAE exe="/root/syz-executor3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455ab9 code=0x50000 [ 331.715872] audit: type=1326 audit(2000000019.134:8): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24861 comm=2AAE exe="/root/syz-executor3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455ab9 code=0x50000 [ 331.734749] audit: type=1326 audit(2000000019.134:9): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24861 comm=2AAE exe="/root/syz-executor3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455ab9 code=0x50000 [ 331.753486] audit: type=1326 audit(2000000019.134:10): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24861 comm=2AAE exe="/root/syz-executor3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455ab9 code=0x50000 [ 331.772278] audit: type=1326 audit(2000000019.134:11): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24861 comm=2AAE exe="/root/syz-executor3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455ab9 code=0x50000 [ 331.792126] audit: type=1326 audit(2000000019.134:12): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24861 comm=2AAE exe="/root/syz-executor3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455ab9 code=0x50000 [ 331.810968] audit: type=1326 audit(2000000019.134:13): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24861 comm=2AAE exe="/root/syz-executor3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455ab9 code=0x50000 [ 331.829777] audit: type=1326 audit(2000000019.134:14): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24861 comm=2AAE exe="/root/syz-executor3" sig=0 arch=c000003e syscall=202 compat=0 ip=0x455ab9 code=0x50000 03:33:39 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x1, 0x1) fcntl$addseals(r0, 0x409, 0x4) r1 = shmget(0x1, 0x2000, 0x78000200, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000040)) 03:33:39 executing program 0: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 03:33:39 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x200000060000000, &(0x7f00000001c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) [ 332.245586] FAULT_INJECTION: forcing a failure. [ 332.245586] name failslab, interval 1, probability 0, space 0, times 0 [ 332.256971] CPU: 1 PID: 24895 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 332.265474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.275036] Call Trace: [ 332.277688] dump_stack+0x1c9/0x2b4 [ 332.281333] ? dump_stack_print_info.cold.2+0x52/0x52 [ 332.286539] ? perf_trace_lock+0xde/0x920 [ 332.290711] should_fail.cold.4+0xa/0x11 [ 332.294808] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 332.300090] ? is_bpf_text_address+0xd7/0x170 [ 332.304625] ? kernel_text_address+0x79/0xf0 [ 332.309058] ? __kernel_text_address+0xd/0x40 [ 332.313580] ? unwind_get_return_address+0x61/0xa0 [ 332.318544] ? __save_stack_trace+0x8d/0xf0 [ 332.322909] ? lock_acquire+0x1e4/0x540 [ 332.326941] ? fs_reclaim_acquire+0x20/0x20 [ 332.331382] ? lock_downgrade+0x8f0/0x8f0 [ 332.335552] ? __x64_sys_mount+0xbe/0x150 [ 332.339714] ? check_same_owner+0x340/0x340 [ 332.344063] ? rcu_note_context_switch+0x730/0x730 [ 332.349003] __should_failslab+0x124/0x180 [ 332.353341] should_failslab+0x9/0x14 [ 332.357185] kmem_cache_alloc_trace+0x2cb/0x780 [ 332.361877] ? kasan_kmalloc+0xc4/0xe0 [ 332.365851] __memcg_init_list_lru_node+0x185/0x2d0 [ 332.370930] ? kvfree_rcu+0x20/0x20 [ 332.374590] ? __kmalloc_node+0x47/0x70 [ 332.378611] __list_lru_init+0x4d6/0x840 [ 332.382722] ? list_lru_destroy+0x500/0x500 [ 332.387053] ? prealloc_shrinker+0x213/0x480 [ 332.391462] ? __init_waitqueue_head+0x9e/0x150 [ 332.396153] ? inactive_list_is_low+0x850/0x850 [ 332.400852] ? __lockdep_init_map+0x105/0x590 [ 332.405369] alloc_super+0x9a6/0xb10 [ 332.409101] ? destroy_unused_super.part.11+0x110/0x110 [ 332.414473] ? lock_downgrade+0x8f0/0x8f0 [ 332.418648] ? retint_kernel+0x10/0x10 [ 332.422562] ? kasan_check_read+0x11/0x20 [ 332.426723] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 332.431319] ? kasan_check_write+0x14/0x20 [ 332.435586] ? do_raw_spin_lock+0xc1/0x200 [ 332.439848] ? ns_test_super+0x50/0x50 [ 332.443738] sget_fc+0x269/0x950 [ 332.447113] ? compare_single+0x10/0x10 [ 332.451104] ? alloc_super+0xb10/0xb10 [ 332.455014] ? kasan_kmalloc+0xc4/0xe0 [ 332.458933] ? __kmalloc_track_caller+0x311/0x760 [ 332.463809] ? proc_root_lookup+0x60/0x60 [ 332.467996] vfs_get_super+0x6e/0x270 [ 332.471833] proc_get_tree+0x88/0xb0 [ 332.475593] vfs_get_tree+0x1cb/0x5c0 [ 332.479416] do_mount+0x6c1/0x1fb0 [ 332.482977] ? check_same_owner+0x340/0x340 [ 332.487312] ? lock_release+0xa30/0xa30 [ 332.491316] ? copy_mount_string+0x40/0x40 [ 332.495558] ? kasan_kmalloc+0xc4/0xe0 [ 332.499470] ? kmem_cache_alloc_trace+0x318/0x780 [ 332.504359] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 332.510009] ? _copy_from_user+0xdf/0x150 [ 332.514176] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 332.519777] ? copy_mount_options+0x285/0x380 [ 332.524318] ksys_mount+0x12d/0x140 [ 332.527978] __x64_sys_mount+0xbe/0x150 [ 332.532002] do_syscall_64+0x1b9/0x820 [ 332.535927] ? finish_task_switch+0x1d3/0x870 [ 332.540461] ? syscall_return_slowpath+0x5e0/0x5e0 [ 332.545426] ? syscall_return_slowpath+0x31d/0x5e0 [ 332.550390] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 332.555448] ? prepare_exit_to_usermode+0x291/0x3b0 [ 332.560754] ? perf_trace_sys_enter+0xb10/0xb10 [ 332.565545] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 332.570458] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 332.575667] RIP: 0033:0x455ab9 03:33:39 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socket$netlink(0x10, 0x3, 0x10) 03:33:40 executing program 5: pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getsockname$unix(r0, &(0x7f0000000240)=@abs, &(0x7f00000002c0)=0x6e) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x101101, 0x0) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000300)={0x0, 0xc892}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x20, &(0x7f0000000380)=[@in={0x2, 0x4e20, @loopback=0x7f000001}, @in={0x2, 0x4e20, @rand_addr=0x1}]}, &(0x7f0000000400)=0x10) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000440)={r3, 0x6, 0x48000000000000, 0x5, 0xd6e, 0x10000, 0x2, 0x3, {r4, @in={{0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x2, 0x0, 0x6, 0x5, 0x9}}, &(0x7f0000000500)=0xb0) gettid() ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000001c0)=0x0) wait4(r5, &(0x7f0000000080), 0x2000000e, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) [ 332.578865] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 332.598206] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 332.606073] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 332.613367] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 332.620661] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 332.627946] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 332.635249] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000018 03:33:40 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0x7b, 0xbff, [0xc1, 0x0, 0x40000001]}) 03:33:40 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x3200) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x3a, 0xcc, &(0x7f0000000000)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x5c) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f0000000100)=0x6) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f00000000c0)={0x1000, 0x4, 0xcf}) 03:33:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 03:33:40 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:40 executing program 1 (fault-call:10 fault-nth:25): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 03:33:40 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x80, 0x0) ioctl$KVM_SIGNAL_MSI(r0, 0x4020aea5, &(0x7f0000000200)={0x3000, 0x0, 0x7fff, 0x2, 0x8}) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1ff, 0x4a0001) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x2) [ 332.953744] kvm [24937]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc1 data 0x0 03:33:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 03:33:40 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(r0, 0x406, r1) r3 = dup2(r1, r0) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f00000000c0)={0x2, r3}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000000)={{}, 'port0\x00', 0x10, 0x0, 0x0, 0x4, 0xfffffffffffffffe}) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000140)=ANY=[@ANYBLOB="01041c000200000001008a5b000000000001000000000000a2f171d2d181"]) 03:33:40 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:40 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000002380)=[{&(0x7f0000000140)="d784a62dec7d3873d06c8ec959bf7858d91c", 0x12}], 0x1, &(0x7f0000002400)}, 0x0) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x2, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000040000000000020000027f"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0xb1, &(0x7f0000000200)=""/177}, 0x48) mount(&(0x7f00008deff8)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000100)="03") mount(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0x80000) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000340)) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) 03:33:40 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x23, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 333.099248] FAULT_INJECTION: forcing a failure. [ 333.099248] name failslab, interval 1, probability 0, space 0, times 0 [ 333.111341] CPU: 1 PID: 24967 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 333.119948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.129356] Call Trace: [ 333.129394] dump_stack+0x1c9/0x2b4 [ 333.135607] ? dump_stack_print_info.cold.2+0x52/0x52 [ 333.140826] ? __kernel_text_address+0xd/0x40 [ 333.145339] ? unwind_get_return_address+0x61/0xa0 [ 333.150549] should_fail.cold.4+0xa/0x11 [ 333.154639] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 333.159775] ? save_stack+0xa9/0xd0 [ 333.163521] ? save_stack+0x43/0xd0 [ 333.167175] ? kasan_kmalloc+0xc4/0xe0 [ 333.171111] ? kmem_cache_alloc_trace+0x152/0x780 [ 333.175988] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 333.181228] ? __list_lru_init+0x4d6/0x840 [ 333.185496] ? alloc_super+0x9a6/0xb10 [ 333.189505] ? vfs_get_super+0x6e/0x270 [ 333.193503] ? proc_get_tree+0x88/0xb0 03:33:40 executing program 0: r0 = socket(0x0, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 03:33:40 executing program 5: shmget$private(0x0, 0x2000, 0x78001000, &(0x7f0000ffd000/0x2000)=nil) r0 = shmget$private(0x0, 0x1000, 0x200, &(0x7f0000ffc000/0x1000)=nil) shmat(r0, &(0x7f0000ffc000/0x1000)=nil, 0x4004) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) [ 333.197412] ? vfs_get_tree+0x1cb/0x5c0 [ 333.201409] ? do_mount+0x6c1/0x1fb0 [ 333.205131] ? ksys_mount+0x12d/0x140 [ 333.208953] ? __x64_sys_mount+0xbe/0x150 [ 333.213149] ? do_syscall_64+0x1b9/0x820 [ 333.217232] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 333.222645] ? save_stack+0xa9/0xd0 [ 333.226319] ? lock_acquire+0x1e4/0x540 [ 333.230315] ? fs_reclaim_acquire+0x20/0x20 [ 333.234687] ? lock_downgrade+0x8f0/0x8f0 [ 333.238855] ? __x64_sys_mount+0xbe/0x150 [ 333.243048] ? check_same_owner+0x340/0x340 [ 333.247389] ? rcu_note_context_switch+0x730/0x730 [ 333.252489] __should_failslab+0x124/0x180 [ 333.256743] should_failslab+0x9/0x14 [ 333.260720] kmem_cache_alloc_trace+0x2cb/0x780 [ 333.265665] ? kasan_kmalloc+0xc4/0xe0 [ 333.269614] __memcg_init_list_lru_node+0x185/0x2d0 [ 333.274637] ? kvfree_rcu+0x20/0x20 [ 333.278266] ? __kmalloc_node+0x47/0x70 [ 333.282255] __list_lru_init+0x4d6/0x840 [ 333.286346] ? list_lru_destroy+0x500/0x500 [ 333.290694] ? prealloc_shrinker+0x213/0x480 [ 333.295121] ? __init_waitqueue_head+0x9e/0x150 [ 333.299992] ? inactive_list_is_low+0x850/0x850 [ 333.304686] ? __lockdep_init_map+0x105/0x590 [ 333.309214] alloc_super+0x9a6/0xb10 [ 333.313311] ? destroy_unused_super.part.11+0x110/0x110 [ 333.318700] ? lock_downgrade+0x8f0/0x8f0 [ 333.322881] ? kasan_check_read+0x11/0x20 [ 333.327064] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 333.331698] ? kasan_check_write+0x14/0x20 [ 333.335950] ? do_raw_spin_lock+0xc1/0x200 [ 333.340207] ? ns_test_super+0x50/0x50 [ 333.344113] sget_fc+0x269/0x950 [ 333.347496] ? compare_single+0x10/0x10 [ 333.351494] ? alloc_super+0xb10/0xb10 [ 333.355832] ? kasan_kmalloc+0xc4/0xe0 [ 333.359782] ? __kmalloc_track_caller+0x311/0x760 [ 333.364653] ? proc_root_lookup+0x60/0x60 [ 333.368836] vfs_get_super+0x6e/0x270 [ 333.372663] proc_get_tree+0x88/0xb0 [ 333.376404] vfs_get_tree+0x1cb/0x5c0 [ 333.380243] do_mount+0x6c1/0x1fb0 [ 333.383808] ? check_same_owner+0x340/0x340 [ 333.388144] ? lock_release+0xa30/0xa30 [ 333.392140] ? copy_mount_string+0x40/0x40 [ 333.396395] ? kasan_kmalloc+0xc4/0xe0 [ 333.400312] ? kmem_cache_alloc_trace+0x318/0x780 [ 333.405189] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 333.410821] ? _copy_from_user+0xdf/0x150 [ 333.415152] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 333.420695] ? copy_mount_options+0x285/0x380 [ 333.425373] ksys_mount+0x12d/0x140 [ 333.429000] __x64_sys_mount+0xbe/0x150 [ 333.432973] do_syscall_64+0x1b9/0x820 [ 333.436952] ? finish_task_switch+0x1d3/0x870 [ 333.441463] ? syscall_return_slowpath+0x5e0/0x5e0 [ 333.446399] ? syscall_return_slowpath+0x31d/0x5e0 [ 333.451338] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 333.456346] ? prepare_exit_to_usermode+0x291/0x3b0 [ 333.461354] ? perf_trace_sys_enter+0xb10/0xb10 [ 333.466025] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 333.470871] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 333.476129] RIP: 0033:0x455ab9 [ 333.479307] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 333.498702] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 333.507642] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 333.514908] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 333.522493] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 333.529762] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 333.537027] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000019 03:33:41 executing program 1 (fault-call:10 fault-nth:26): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 03:33:41 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x2) sysfs$2(0x2, 0x4, &(0x7f0000000080)=""/98) r1 = mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1, 0x30, 0xffffffffffffff9c, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000040)={r1}) r2 = accept$unix(0xffffffffffffff9c, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x2, 0x0) recvfrom$inet(r3, &(0x7f00000002c0)=""/160, 0xa0, 0x2000, &(0x7f0000000380)={0x2, 0x4e21}, 0x10) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vcs\x00', 0x40000, 0x0) getsockname$unix(r2, &(0x7f00000001c0), &(0x7f0000000240)=0x6e) 03:33:41 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdfd, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:41 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000000000), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000140)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000200)=0x10001) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) fstat(r0, &(0x7f0000000000)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) 03:33:41 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 03:33:41 executing program 0: r0 = socket(0x10, 0x0, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 03:33:41 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x805, 0x0) poll(&(0x7f00000001c0)=[{}, {}, {r1}], 0x20000000000003b7, 0x0) [ 333.891545] binder: BINDER_SET_CONTEXT_MGR already set [ 333.897485] binder: 25015:25018 ioctl 40046207 0 returned -16 [ 333.978008] FAULT_INJECTION: forcing a failure. [ 333.978008] name failslab, interval 1, probability 0, space 0, times 0 [ 333.989373] CPU: 1 PID: 25024 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 333.997894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.007264] Call Trace: [ 334.009889] dump_stack+0x1c9/0x2b4 [ 334.013592] ? dump_stack_print_info.cold.2+0x52/0x52 [ 334.019074] ? perf_trace_lock+0xde/0x920 [ 334.023284] should_fail.cold.4+0xa/0x11 [ 334.027400] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 334.032537] ? save_stack+0xa9/0xd0 [ 334.036173] ? save_stack+0x43/0xd0 [ 334.039798] ? kasan_kmalloc+0xc4/0xe0 [ 334.043683] ? kmem_cache_alloc_trace+0x152/0x780 [ 334.048553] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 334.053765] ? __list_lru_init+0x4d6/0x840 [ 334.058013] ? alloc_super+0x9a6/0xb10 [ 334.061899] ? vfs_get_super+0x6e/0x270 [ 334.065888] ? proc_get_tree+0x88/0xb0 [ 334.069958] ? do_mount+0x6c1/0x1fb0 [ 334.073768] ? ksys_mount+0x12d/0x140 [ 334.077558] ? __x64_sys_mount+0xbe/0x150 [ 334.081971] ? do_syscall_64+0x1b9/0x820 [ 334.086038] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 334.091433] ? lock_acquire+0x1e4/0x540 [ 334.095420] ? fs_reclaim_acquire+0x20/0x20 [ 334.099738] ? lock_downgrade+0x8f0/0x8f0 [ 334.103882] ? __x64_sys_mount+0xbe/0x150 [ 334.108032] ? check_same_owner+0x340/0x340 [ 334.112359] ? rcu_note_context_switch+0x730/0x730 [ 334.117375] __should_failslab+0x124/0x180 [ 334.121602] should_failslab+0x9/0x14 [ 334.125393] kmem_cache_alloc_trace+0x2cb/0x780 [ 334.130066] ? kasan_kmalloc+0xc4/0xe0 [ 334.133954] __memcg_init_list_lru_node+0x185/0x2d0 [ 334.138968] ? kvfree_rcu+0x20/0x20 [ 334.142587] ? __kmalloc_node+0x47/0x70 [ 334.146552] __list_lru_init+0x4d6/0x840 [ 334.150614] ? list_lru_destroy+0x500/0x500 [ 334.154936] ? prealloc_shrinker+0x213/0x480 [ 334.159331] ? __init_waitqueue_head+0x9e/0x150 [ 334.164009] ? inactive_list_is_low+0x850/0x850 [ 334.168694] ? __lockdep_init_map+0x105/0x590 [ 334.173295] alloc_super+0x9a6/0xb10 [ 334.177031] ? destroy_unused_super.part.11+0x110/0x110 [ 334.182397] ? lock_downgrade+0x8f0/0x8f0 [ 334.186720] ? kasan_check_read+0x11/0x20 [ 334.190862] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 334.195435] ? kasan_check_write+0x14/0x20 [ 334.199661] ? do_raw_spin_lock+0xc1/0x200 [ 334.203891] ? ns_test_super+0x50/0x50 [ 334.207861] sget_fc+0x269/0x950 [ 334.211234] ? compare_single+0x10/0x10 [ 334.215203] ? alloc_super+0xb10/0xb10 [ 334.219080] ? kasan_kmalloc+0xc4/0xe0 [ 334.222977] ? __kmalloc_track_caller+0x311/0x760 [ 334.227834] ? proc_root_lookup+0x60/0x60 [ 334.231985] vfs_get_super+0x6e/0x270 [ 334.235772] proc_get_tree+0x88/0xb0 [ 334.239486] vfs_get_tree+0x1cb/0x5c0 [ 334.243289] do_mount+0x6c1/0x1fb0 [ 334.246828] ? check_same_owner+0x340/0x340 [ 334.251141] ? lock_release+0xa30/0xa30 [ 334.255117] ? copy_mount_string+0x40/0x40 [ 334.259351] ? kasan_kmalloc+0xc4/0xe0 [ 334.263257] ? kmem_cache_alloc_trace+0x318/0x780 [ 334.268097] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 334.273637] ? _copy_from_user+0xdf/0x150 [ 334.277793] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 334.283326] ? copy_mount_options+0x285/0x380 [ 334.287815] ksys_mount+0x12d/0x140 [ 334.291453] __x64_sys_mount+0xbe/0x150 [ 334.295682] do_syscall_64+0x1b9/0x820 [ 334.299559] ? finish_task_switch+0x1d3/0x870 [ 334.304049] ? syscall_return_slowpath+0x5e0/0x5e0 [ 334.308992] ? syscall_return_slowpath+0x31d/0x5e0 [ 334.313913] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 334.318920] ? prepare_exit_to_usermode+0x291/0x3b0 [ 334.323926] ? perf_trace_sys_enter+0xb10/0xb10 [ 334.328597] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 334.333447] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 334.338624] RIP: 0033:0x455ab9 [ 334.341801] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 334.361534] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 334.369320] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 334.376763] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 334.384035] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 334.391301] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 334.398579] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000001a 03:33:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffff7f, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 03:33:41 executing program 0: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 03:33:41 executing program 5: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) clone(0xfffffffffffffffc, &(0x7f00000001c0), &(0x7f0000000180), &(0x7f0000c35ffc), &(0x7f0000000000)) rt_sigprocmask(0x0, &(0x7f0000039ff8)={0xfffffffffffffffa}, 0x0, 0x8) r0 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x8, 0x4, @tid=r0}, &(0x7f0000000180)) timer_settime(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x1}, {0x0, 0xe4c}}, &(0x7f0000040000)) timer_gettime(0x0, &(0x7f0000000080)) wait4(0x0, &(0x7f0000000080), 0x40000000, &(0x7f00000000c0)) remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0xfffffffffffffffd, 0x800000000000000, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/rt_cache\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0x9d, 0x8, &(0x7f00000001c0)="0a1f930360f34c51eaf44b5fb5f63df8bf65d2ec9003c0a436febdf04547b5782d11f76ce0af315bd7f37c6e1686dbac3058621311940677b733d0c2ea5910c52ffc401edc6a2b8e8c76acb348cbd436559823a4445ca8baa90556efb367438233b15673dc98204ba46fc15ce21b3090e82a4264f366037016efe00dd83b3e23be7b11d6d7fdb8dca1c1f8da27069fc86e665e087eb855b245a9c472f1", &(0x7f0000000280)=""/8, 0xfffffffffffffffb}, 0x28) setsockopt$inet6_dccp_int(r1, 0x21, 0x0, &(0x7f0000000040)=0x4, 0x4) 03:33:41 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1500, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:42 executing program 1 (fault-call:10 fault-nth:27): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 03:33:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:42 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x74000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:42 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000013c0)=""/4096, 0x19d}], 0x1, &(0x7f0000000100)=""/123, 0xfffffffffffffdf2}, 0x0) 03:33:42 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x10b241, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0}) recvfrom$inet6(r0, &(0x7f0000000240)=""/4096, 0x1000, 0x2000, &(0x7f0000000140)={0xa, 0x4e22, 0x3ff, @loopback={0x0, 0x1}, 0x7}, 0x1c) ioctl$TUNSETOWNER(r0, 0x400454cc, r1) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000001c0)={0x2, 0x0, [0x400000b5, 0x840000000000977]}) 03:33:42 executing program 0: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 03:33:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) [ 334.917177] FAULT_INJECTION: forcing a failure. [ 334.917177] name failslab, interval 1, probability 0, space 0, times 0 [ 334.928546] CPU: 1 PID: 25092 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 334.937043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.946409] Call Trace: [ 334.949029] dump_stack+0x1c9/0x2b4 [ 334.952646] ? dump_stack_print_info.cold.2+0x52/0x52 [ 334.957850] ? perf_trace_lock+0xde/0x920 [ 334.961993] should_fail.cold.4+0xa/0x11 [ 334.966044] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 334.971162] ? save_stack+0xa9/0xd0 [ 334.974781] ? save_stack+0x43/0xd0 [ 334.978394] ? kasan_kmalloc+0xc4/0xe0 [ 334.982291] ? kmem_cache_alloc_trace+0x152/0x780 [ 334.987123] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 334.992310] ? __list_lru_init+0x4d6/0x840 [ 334.996543] ? alloc_super+0x9a6/0xb10 [ 335.000424] ? vfs_get_super+0x6e/0x270 [ 335.004391] ? proc_get_tree+0x88/0xb0 [ 335.008271] ? do_mount+0x6c1/0x1fb0 [ 335.011987] ? ksys_mount+0x12d/0x140 [ 335.015774] ? __x64_sys_mount+0xbe/0x150 [ 335.019918] ? do_syscall_64+0x1b9/0x820 [ 335.023984] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 335.029368] ? lock_acquire+0x1e4/0x540 [ 335.033333] ? fs_reclaim_acquire+0x20/0x20 [ 335.037665] ? lock_downgrade+0x8f0/0x8f0 [ 335.041806] ? __x64_sys_mount+0xbe/0x150 [ 335.045954] ? check_same_owner+0x340/0x340 [ 335.050276] ? rcu_note_context_switch+0x730/0x730 [ 335.055204] __should_failslab+0x124/0x180 [ 335.059437] should_failslab+0x9/0x14 [ 335.063251] kmem_cache_alloc_trace+0x2cb/0x780 [ 335.067924] ? kasan_kmalloc+0xc4/0xe0 [ 335.071840] __memcg_init_list_lru_node+0x185/0x2d0 [ 335.076865] ? kvfree_rcu+0x20/0x20 [ 335.080497] ? __kmalloc_node+0x47/0x70 [ 335.084470] __list_lru_init+0x4d6/0x840 [ 335.088523] ? list_lru_destroy+0x500/0x500 [ 335.092858] ? prealloc_shrinker+0x213/0x480 [ 335.097260] ? __init_waitqueue_head+0x9e/0x150 [ 335.101917] ? inactive_list_is_low+0x850/0x850 [ 335.106588] ? __lockdep_init_map+0x105/0x590 [ 335.111092] alloc_super+0x9a6/0xb10 [ 335.116099] ? destroy_unused_super.part.11+0x110/0x110 [ 335.121451] ? lock_downgrade+0x8f0/0x8f0 [ 335.125600] ? kasan_check_read+0x11/0x20 [ 335.129735] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 335.134315] ? kasan_check_write+0x14/0x20 [ 335.138543] ? do_raw_spin_lock+0xc1/0x200 [ 335.142768] ? ns_test_super+0x50/0x50 [ 335.146642] sget_fc+0x269/0x950 [ 335.149994] ? compare_single+0x10/0x10 [ 335.153955] ? alloc_super+0xb10/0xb10 [ 335.157830] ? kasan_kmalloc+0xc4/0xe0 [ 335.161707] ? __kmalloc_track_caller+0x311/0x760 [ 335.166555] ? proc_root_lookup+0x60/0x60 [ 335.170694] vfs_get_super+0x6e/0x270 [ 335.174518] proc_get_tree+0x88/0xb0 [ 335.178227] vfs_get_tree+0x1cb/0x5c0 [ 335.182107] do_mount+0x6c1/0x1fb0 [ 335.185647] ? kasan_check_write+0x14/0x20 [ 335.189878] ? copy_mount_string+0x40/0x40 [ 335.194100] ? kasan_kmalloc+0xc4/0xe0 [ 335.197994] ? kmem_cache_alloc_trace+0x318/0x780 [ 335.202855] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 335.208390] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 335.213919] ? copy_mount_options+0x285/0x380 [ 335.218407] ksys_mount+0x12d/0x140 [ 335.222035] __x64_sys_mount+0xbe/0x150 [ 335.225998] do_syscall_64+0x1b9/0x820 [ 335.229876] ? finish_task_switch+0x1d3/0x870 [ 335.234368] ? syscall_return_slowpath+0x5e0/0x5e0 [ 335.239294] ? syscall_return_slowpath+0x31d/0x5e0 [ 335.244217] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 335.249247] ? prepare_exit_to_usermode+0x291/0x3b0 [ 335.254265] ? perf_trace_sys_enter+0xb10/0xb10 [ 335.258939] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 335.263815] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 335.268990] RIP: 0033:0x455ab9 [ 335.272184] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 335.291497] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 335.299292] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 335.306561] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 03:33:42 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0xfffffffffffffffe, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x2}) ppoll(&(0x7f0000000200)=[{r1}], 0x1, &(0x7f0000000240)={0x0, 0x989680}, &(0x7f0000000280), 0x8) write$binfmt_aout(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x2fa) 03:33:42 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xc65, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:42 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x74, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 335.313825] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 335.321086] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 335.328358] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000001b 03:33:42 executing program 1 (fault-call:10 fault-nth:28): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 03:33:42 executing program 3: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendto$llc(r0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) 03:33:42 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000180)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e22, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback=0x7f000001}, 0x10) r1 = creat(&(0x7f00000004c0)='./file0\x00', 0x1) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sequencer\x00', 0x400000, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f00000006c0)={0x4, r2}) sysinfo(&(0x7f00000001c0)=""/158) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f00000000c0)=0x7fff, 0x4) write$binfmt_elf32(r0, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}], "", [[]]}, 0x158) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0x4, &(0x7f0000000400)=[{&(0x7f0000000280)="d47ff950d8c6d64ef24bab0727d62272f88b5e7228f9ebef3411c612a06505377467fca625215c8ebc2d43ec8e7c14d8df7c8baaaaf9fadefd4469c0c08ddcdea0f47f32bc98cc73921ea0ace997bd5cbc2912ba2745a63ea0f0487791a4062064a3ce9b7f669f86ea4ca5005aa7f72b7d38b63e5195484cc481dbf6e25be123535e18611488ed5990fccfc9bf4423353b9372e1de2806e5a8c901850ac21dfe6aea0da65fae5ec518c2bc48547c2d088fb25aa153f6d609b1cbff2d8303056aad517e4d140fd55776649df4f927bfdb30b7b4dc5814980ee98aeb353892d809dd26eb1c97b0c0f4b2654837f706f68b", 0xf0, 0x20}, {&(0x7f0000000100)="8915806c1ab91603e7bfe36d848ee9cfcbc9f75a027c993f73be1a2deee2e56951523ff85912cb6dd1ad829c6be75ebedcc41487b7d664c228b9aeb21f523254fa9cdc754865709146f6036656da525df20fd8703778c0aca18a4d90f8", 0x5d, 0x100000000}, {&(0x7f0000000380)="760d690f04f5e6f07cdec9e2e54df0313baa5d10170b111db318f5f9c6e4c54bfe16b8875f53e6cf3ac08ab1b8e8df67f84ac1312c9a5784d204", 0x3a, 0x1fe00000}, {&(0x7f00000003c0)="629911a94c8f65ee278257374f6ce1", 0xf, 0xfffffffffffffffc}], 0x2000401, &(0x7f0000000480)={[{@user_xattr='user_xattr', 0x2c}, {@acl='acl', 0x2c}]}) 03:33:42 executing program 0: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 03:33:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 03:33:43 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:43 executing program 4: mkdir(&(0x7f0000000000)='./file1\x00', 0x0) mount(&(0x7f00000012c0)='./file0\x00', &(0x7f0000001300)='./file0\x00', &(0x7f0000000100)='tmpfs\x00', 0xc8d, &(0x7f0000000080)) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) r2 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x3, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000180)={[0x1f, 0x5710, 0x3, 0x0, 0xd13, 0x9, 0x6, 0x100000000, 0x32, 0x2, 0x5b1d, 0x1, 0x1, 0x2, 0x1, 0x1ae0], 0xf000, 0x204080}) fstatfs(r1, &(0x7f00000002c0)=""/4096) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f0000000080)={0x2, 0x1}) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f00000000c0)={{0x2, 0xfffffffffffff801}, 0x2c}, 0x10) 03:33:43 executing program 3: pipe2(&(0x7f0000000000), 0x84000) r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 03:33:43 executing program 0: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10}, 0xc) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 03:33:43 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xf4ffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:43 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) sched_getaffinity(r2, 0x8, &(0x7f0000000040)) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) keyctl$set_reqkey_keyring(0xe, 0x7) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000240)=ANY=[@ANYBLOB="05000000000000000d0000402500000005000000000100000000004000000000010000000000000025000aadffffffff00040000000000200a00000006b3"]) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000000feff870100000000a02b2ef3ce"]) [ 335.901528] FAULT_INJECTION: forcing a failure. [ 335.901528] name failslab, interval 1, probability 0, space 0, times 0 [ 335.912963] CPU: 1 PID: 25148 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 335.921550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.930930] Call Trace: [ 335.933519] dump_stack+0x1c9/0x2b4 [ 335.937155] ? dump_stack_print_info.cold.2+0x52/0x52 [ 335.942361] ? __kernel_text_address+0xd/0x40 [ 335.946894] ? unwind_get_return_address+0x61/0xa0 [ 335.952100] should_fail.cold.4+0xa/0x11 [ 335.956172] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 335.961306] ? save_stack+0xa9/0xd0 [ 335.964958] ? save_stack+0x43/0xd0 [ 335.968600] ? kasan_kmalloc+0xc4/0xe0 [ 335.972528] ? kmem_cache_alloc_trace+0x152/0x780 [ 335.977449] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 335.982817] ? __list_lru_init+0x4d6/0x840 [ 335.987063] ? alloc_super+0x9a6/0xb10 [ 335.990982] ? vfs_get_super+0x6e/0x270 [ 335.995035] ? proc_get_tree+0x88/0xb0 [ 335.998952] ? vfs_get_tree+0x1cb/0x5c0 [ 336.002922] ? do_mount+0x6c1/0x1fb0 [ 336.006656] ? ksys_mount+0x12d/0x140 [ 336.010464] ? __x64_sys_mount+0xbe/0x150 [ 336.014627] ? do_syscall_64+0x1b9/0x820 [ 336.018694] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 336.024108] ? save_stack+0xa9/0xd0 [ 336.027765] ? lock_acquire+0x1e4/0x540 [ 336.031745] ? fs_reclaim_acquire+0x20/0x20 [ 336.036074] ? lock_downgrade+0x8f0/0x8f0 [ 336.040233] ? __x64_sys_mount+0xbe/0x150 [ 336.044374] ? check_same_owner+0x340/0x340 [ 336.048694] ? rcu_note_context_switch+0x730/0x730 [ 336.053629] __should_failslab+0x124/0x180 [ 336.057871] should_failslab+0x9/0x14 [ 336.061661] kmem_cache_alloc_trace+0x2cb/0x780 [ 336.066324] ? kasan_kmalloc+0xc4/0xe0 [ 336.070233] __memcg_init_list_lru_node+0x185/0x2d0 [ 336.075256] ? kvfree_rcu+0x20/0x20 [ 336.078893] ? __kmalloc_node+0x47/0x70 [ 336.082884] __list_lru_init+0x4d6/0x840 [ 336.086966] ? list_lru_destroy+0x500/0x500 [ 336.091309] ? prealloc_shrinker+0x213/0x480 [ 336.095753] ? __init_waitqueue_head+0x9e/0x150 [ 336.100436] ? inactive_list_is_low+0x850/0x850 [ 336.105135] ? __lockdep_init_map+0x105/0x590 [ 336.109677] alloc_super+0x9a6/0xb10 [ 336.113420] ? destroy_unused_super.part.11+0x110/0x110 [ 336.118817] ? lock_downgrade+0x8f0/0x8f0 [ 336.123081] ? kasan_check_read+0x11/0x20 [ 336.127253] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 336.131860] ? kasan_check_write+0x14/0x20 [ 336.136207] ? do_raw_spin_lock+0xc1/0x200 [ 336.140469] ? ns_test_super+0x50/0x50 [ 336.144423] sget_fc+0x269/0x950 [ 336.147809] ? compare_single+0x10/0x10 [ 336.151810] ? alloc_super+0xb10/0xb10 [ 336.155730] ? kasan_kmalloc+0xc4/0xe0 [ 336.159767] ? __kmalloc_track_caller+0x311/0x760 [ 336.164615] ? proc_root_lookup+0x60/0x60 [ 336.168768] vfs_get_super+0x6e/0x270 [ 336.172588] proc_get_tree+0x88/0xb0 [ 336.176323] vfs_get_tree+0x1cb/0x5c0 [ 336.180168] do_mount+0x6c1/0x1fb0 [ 336.183733] ? kasan_check_read+0x11/0x20 [ 336.188084] ? do_raw_spin_unlock+0xa7/0x2f0 [ 336.192516] ? copy_mount_string+0x40/0x40 [ 336.196763] ? kasan_kmalloc+0xc4/0xe0 03:33:43 executing program 0: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10}, 0xc) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) [ 336.200694] ? kmem_cache_alloc_trace+0x318/0x780 [ 336.205580] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 336.211176] ? copy_mount_options+0x285/0x380 [ 336.215693] ksys_mount+0x12d/0x140 [ 336.219344] __x64_sys_mount+0xbe/0x150 [ 336.223351] do_syscall_64+0x1b9/0x820 [ 336.227260] ? syscall_slow_exit_work+0x500/0x500 [ 336.232121] ? syscall_return_slowpath+0x5e0/0x5e0 [ 336.237073] ? syscall_return_slowpath+0x31d/0x5e0 [ 336.242028] ? prepare_exit_to_usermode+0x291/0x3b0 [ 336.247072] ? perf_trace_sys_enter+0xb10/0xb10 [ 336.251903] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 336.256787] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 336.261987] RIP: 0033:0x455ab9 [ 336.265170] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 336.284469] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 336.292174] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 03:33:43 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x5, 0x101000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r2, &(0x7f0000000180)="38ae1f4159ec1ef0f6f70906d41670c536d7c20411896e17655ed61809b35513e0c18d676e38344716c5fb321292ffa9c4dc3dff9394da8d817cd35b33fbedda7becfbbb38b53f64d9798a70d28fdf8d96a8f21b439e59d832a6dd5b6f5f519419e60edc629b10c92dba14ee72f04b646f74dee22b146a987b00df4516ddf147b968395b444b60dead0390d2ff6e37ebecd246abb79555ca8e0a3fb6bb12475dbd1a83a0d46c206a761155cf57843045a457a022abc5bc16113db19be11714322c8a591ec5eceaa30b2549962e81f67d7473c2fc873874bc130ed48d89e1d8af6477059dce", &(0x7f00000000c0)=""/38}, 0x18) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="2300000007ffff160065747a3065269dd03fe3642435dcb1491633d61e9a"], 0x1e) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000', 0x2c}]}}) [ 336.299442] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 336.306871] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 336.314127] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 336.321390] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000001c 03:33:43 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f00000002c0)={0x10, 0xfffffffffffffff5, 0x3}, 0x10) ioctl(r0, 0x8912, &(0x7f00000000c0)="025cc83d6d345f8f762070") ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f0000000240)=@req={0x28, &(0x7f0000000200)={'veth1_to_team\x00', @ifru_data=&(0x7f0000000080)="b138c7c296330e553746aed61c470870fb6facf77db2bba8f0e8ef71433fdbaa"}}) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x201069}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="b4000000000000003d00020000000000070000000000000000000000020000009500000000000000320a77c17fce3aa90d4292181ebf1c1854dd6f4f3716e84f2392ea52bad439212873afa6c2de646878171063fd0a91a0b4ac0160fd1a70bd96cc7bd8837e8f26aa78fc6aab53c71d49bee9b15f27b46f96618b27c7398cf4e0f12fc7e8410138902747317dc467d435f2dc331436531bd445fe65c28000"], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0x3e9, &(0x7f000000cf3d)=""/195}, 0x48) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/xfrm_stat\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0xf503}, 0xc, &(0x7f0000002740)={&(0x7f0000000280)={0x18, 0x27, 0x20003, 0x0, 0x0, {0xf}, [@generic="93"]}, 0x18}, 0x1}, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r2, 0x40045731, &(0x7f0000000040)=0x1b) 03:33:43 executing program 1 (fault-call:10 fault-nth:29): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 03:33:43 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:43 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x68000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 336.457664] kvm pmu: pin control bit is ignored [ 336.468814] kvm_pmu: event creation failed -2 03:33:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x6, 0x3, &(0x7f0000346fc8)=@framed={{0x18}, [], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) r1 = socket$kcm(0x29, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000000)=r0, 0x4) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x7fff, 0x94901) 03:33:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 03:33:44 executing program 0: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10}, 0xc) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 03:33:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000180)={r2}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000140)={r2, 0x0, 0x2, r2}) [ 336.743998] 9pnet: p9_errstr2errno: server reported unknown error etz0e&Ð?ãd$5ܱI3Öš [ 336.781241] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. 03:33:44 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000367fe4)=""/91, 0x578f5b6d5535cd0f) [ 336.798899] netlink: 4 bytes leftover after parsing attributes in process `syz-executor4'. [ 336.865838] FAULT_INJECTION: forcing a failure. [ 336.865838] name failslab, interval 1, probability 0, space 0, times 0 [ 336.877174] CPU: 1 PID: 25213 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 336.885683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.895031] Call Trace: [ 336.897621] dump_stack+0x1c9/0x2b4 [ 336.901239] ? dump_stack_print_info.cold.2+0x52/0x52 [ 336.906421] ? perf_trace_lock+0xde/0x920 [ 336.910564] should_fail.cold.4+0xa/0x11 [ 336.914629] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 336.919731] ? save_stack+0xa9/0xd0 [ 336.923347] ? save_stack+0x43/0xd0 [ 336.926956] ? kasan_kmalloc+0xc4/0xe0 [ 336.930827] ? kmem_cache_alloc_trace+0x152/0x780 [ 336.936003] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 336.941179] ? __list_lru_init+0x4d6/0x840 [ 336.945401] ? alloc_super+0x9a6/0xb10 [ 336.949290] ? vfs_get_super+0x6e/0x270 [ 336.953264] ? proc_get_tree+0x88/0xb0 [ 336.957239] ? do_mount+0x6c1/0x1fb0 [ 336.960943] ? ksys_mount+0x12d/0x140 [ 336.964740] ? __x64_sys_mount+0xbe/0x150 [ 336.968883] ? do_syscall_64+0x1b9/0x820 [ 336.972929] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 336.978285] ? lock_acquire+0x1e4/0x540 [ 336.982245] ? fs_reclaim_acquire+0x20/0x20 [ 336.986594] ? lock_downgrade+0x8f0/0x8f0 [ 336.990727] ? lock_downgrade+0x8f0/0x8f0 [ 336.994864] ? check_same_owner+0x340/0x340 [ 336.999170] ? do_raw_spin_unlock+0xa7/0x2f0 [ 337.003580] ? rcu_note_context_switch+0x730/0x730 [ 337.008505] __should_failslab+0x124/0x180 [ 337.012818] should_failslab+0x9/0x14 [ 337.017225] kmem_cache_alloc_trace+0x2cb/0x780 [ 337.021893] __memcg_init_list_lru_node+0x185/0x2d0 [ 337.026911] ? kvfree_rcu+0x20/0x20 [ 337.030526] ? __kmalloc_node+0x47/0x70 [ 337.034487] __list_lru_init+0x4d6/0x840 [ 337.038547] ? list_lru_destroy+0x500/0x500 [ 337.042857] ? prealloc_shrinker+0x213/0x480 [ 337.047265] ? __init_waitqueue_head+0x9e/0x150 [ 337.051921] ? inactive_list_is_low+0x850/0x850 [ 337.056579] ? __lockdep_init_map+0x105/0x590 [ 337.061072] alloc_super+0x9a6/0xb10 [ 337.064783] ? destroy_unused_super.part.11+0x110/0x110 [ 337.070144] ? lock_downgrade+0x8f0/0x8f0 [ 337.074279] ? kasan_check_read+0x11/0x20 [ 337.078411] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 337.082987] ? kasan_check_write+0x14/0x20 [ 337.087204] ? do_raw_spin_lock+0xc1/0x200 [ 337.091430] ? ns_test_super+0x50/0x50 [ 337.095302] sget_fc+0x269/0x950 [ 337.098671] ? compare_single+0x10/0x10 [ 337.102640] ? alloc_super+0xb10/0xb10 [ 337.106515] ? kasan_kmalloc+0xc4/0xe0 [ 337.110393] ? __kmalloc_track_caller+0x311/0x760 [ 337.115222] ? proc_root_lookup+0x60/0x60 [ 337.119353] vfs_get_super+0x6e/0x270 [ 337.123143] proc_get_tree+0x88/0xb0 [ 337.126847] vfs_get_tree+0x1cb/0x5c0 [ 337.130656] do_mount+0x6c1/0x1fb0 [ 337.134193] ? kasan_check_write+0x14/0x20 [ 337.138510] ? copy_mount_string+0x40/0x40 [ 337.142735] ? kasan_kmalloc+0xc4/0xe0 [ 337.146627] ? kmem_cache_alloc_trace+0x318/0x780 [ 337.151459] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 337.156989] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 337.162519] ? copy_mount_options+0x285/0x380 [ 337.167004] ksys_mount+0x12d/0x140 [ 337.170646] __x64_sys_mount+0xbe/0x150 [ 337.174607] do_syscall_64+0x1b9/0x820 [ 337.178483] ? syscall_slow_exit_work+0x500/0x500 [ 337.183319] ? syscall_return_slowpath+0x5e0/0x5e0 [ 337.188244] ? syscall_return_slowpath+0x31d/0x5e0 [ 337.193170] ? prepare_exit_to_usermode+0x291/0x3b0 [ 337.198175] ? perf_trace_sys_enter+0xb10/0xb10 [ 337.202838] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 337.207848] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 337.213037] RIP: 0033:0x455ab9 [ 337.216220] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 337.235417] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 337.243122] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 337.250395] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 337.257649] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 03:33:44 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x4) ioctl$TIOCOUTQ(r4, 0x5411, &(0x7f0000000080)) open(&(0x7f0000000100)='./file0\x00', 0x80001, 0x48) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000080), 0x0) 03:33:44 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 337.264916] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 337.272266] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000001d 03:33:44 executing program 1 (fault-call:10 fault-nth:30): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 03:33:44 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7fffffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 03:33:44 executing program 0: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(0xffffffffffffffff, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 03:33:45 executing program 4: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0xffffffffffffffff, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1e) r1 = open(&(0x7f0000000080)='./file0\x00', 0x440000, 0x1) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f00000000c0)) connect$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @multicast1=0xe0000001}}, 0x1e) 03:33:45 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x36f) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") sendto(r0, &(0x7f0000001540)="17", 0x1, 0x0, &(0x7f0000001a40)=@can={0x1d}, 0x80) sendto$inet(r0, &(0x7f00006fd000)="c3401c344654f3c7d9b41ba48c8e399aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0201c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e317b79", 0x82, 0x0, &(0x7f00000000c0)={0x2, 0x0, @rand_addr}, 0x10) getpeername(r1, &(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @local}}}, &(0x7f0000000100)=0x80) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r2, 0x800448d2, &(0x7f0000000180)={0x5, &(0x7f00000002c0)=[{}, {}, {}, {}, {}]}) pwritev(r1, &(0x7f00000007c0)=[{&(0x7f00000001c0)="1af6a7789390337cc2fb8fecb31f08721a10f3d3ca90d7435589f2ad99029e99bf1c7af94578651fa7a99ab98b259cfd42c3d915c3dd967c71875d188267d62429f860e2fc1f3904a1546519e3ef8cba1da6b9be478a3e146f19f8e8218518075b93e75db0f7bdf573f2c946742d1942d2b7c4237ab671e4448bcc842e1d28207888a581c21151e0665f592e38f6937deb72545c81708bd4fc", 0x99}, {&(0x7f00000005c0)="c3e67df7ece0b94020fbbf82eecbaada231614d34d0d3c8e87700d0adadd48fabf3848da71c0fd1e1e6783fd32af3cbba0c4d6d7c80b57e7d0b55a79ae4fc8149ed7e0041458c9aa2cc71a36ce5d75dafb06b8d454a50130cfdf2898eea5be0d232c980a7b11c9796e9f3746f8", 0x6d}, {&(0x7f0000000640)}, {&(0x7f0000000680)="eaf5ae9b10a898fa03cd6cf3d3a86bcb3366381850f0cb3deeeec915f8d239bc74ee44eb7ef7ca9a3a9f6583109ea1a4c05f3c0cc3799b9b1ad4660593d7e534318b1a2c380abaee496b586d4bb819614bf5818c63e182f7bdda1f19a2f195cb44558006e2d780", 0x67}, {&(0x7f0000000700)="e8acfc594c6c54b746bcf9cf695fb63ebd54cabc7731aae0", 0x18}, {&(0x7f0000000740)="79b5926fb35e24ac61aa93196d1cabe6dfe25ae7333fad84f66c775b4d08fd5ae83499217a7c400be2cc79ad6bf616830a38fa0fd53328a360a56c523a76f35b21ce7e18a2be3bf01d9d264d11701c5b070dafae87f3602036c46005c53ab9f718468553044b8d072071699a2392343acad21974f3cb66600daab9cce2", 0x7d}], 0x6, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='illinois\x00', 0x9) shutdown(r0, 0x1) 03:33:45 executing program 5: read(0xffffffffffffffff, &(0x7f0000000200)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000380)={{0x80}, "13701b21bd0a60480000000000039b3fd5cec307e8ef3d13eb790ec9c45abaf90d229db6926c475b78f8b2000000000f0000000000000009fba8f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f000019ffe9)={0xc5, @time={0x77359400}}) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000000)={{0x5, 0x4}, 'port1\x00'}) r1 = getpgrp(r0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x8040, 0x0) timerfd_gettime(r2, &(0x7f0000000180)) ptrace(0x4207, r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000580)={0x0, 0x0, 'client1\x00', 0x0, "fe55841a0488e808", "d5135ad32f13e5f840e662b5f4396bae2e6fd7f8110f3bbb94e0a0f0ab61f8cd"}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f00000000c0)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) 03:33:45 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 337.909685] FAULT_INJECTION: forcing a failure. [ 337.909685] name failslab, interval 1, probability 0, space 0, times 0 [ 337.921138] CPU: 1 PID: 25265 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 337.929644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.939012] Call Trace: [ 337.941621] dump_stack+0x1c9/0x2b4 [ 337.945255] ? dump_stack_print_info.cold.2+0x52/0x52 [ 337.950470] ? perf_trace_lock+0xde/0x920 [ 337.954779] should_fail.cold.4+0xa/0x11 [ 337.958911] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 337.964172] ? save_stack+0xa9/0xd0 [ 337.967954] ? save_stack+0x43/0xd0 [ 337.971635] ? kasan_kmalloc+0xc4/0xe0 [ 337.975539] ? kmem_cache_alloc_trace+0x152/0x780 [ 337.980416] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 337.985614] ? __list_lru_init+0x4d6/0x840 [ 337.989952] ? alloc_super+0x9a6/0xb10 [ 337.993861] ? vfs_get_super+0x6e/0x270 [ 337.997846] ? proc_get_tree+0x88/0xb0 [ 338.001767] ? do_mount+0x6c1/0x1fb0 [ 338.005477] ? ksys_mount+0x12d/0x140 [ 338.009270] ? __x64_sys_mount+0xbe/0x150 [ 338.013438] ? do_syscall_64+0x1b9/0x820 [ 338.017504] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 338.022885] ? lock_acquire+0x1e4/0x540 [ 338.026857] ? fs_reclaim_acquire+0x20/0x20 [ 338.031183] ? lock_downgrade+0x8f0/0x8f0 [ 338.035321] ? __x64_sys_mount+0xbe/0x150 [ 338.039460] ? check_same_owner+0x340/0x340 [ 338.043777] ? rcu_note_context_switch+0x730/0x730 [ 338.048712] __should_failslab+0x124/0x180 [ 338.052954] should_failslab+0x9/0x14 [ 338.056742] kmem_cache_alloc_trace+0x2cb/0x780 [ 338.061394] ? kasan_kmalloc+0xc4/0xe0 [ 338.065285] __memcg_init_list_lru_node+0x185/0x2d0 [ 338.070289] ? kvfree_rcu+0x20/0x20 [ 338.073958] ? __kmalloc_node+0x47/0x70 [ 338.077921] __list_lru_init+0x4d6/0x840 [ 338.081976] ? list_lru_destroy+0x500/0x500 [ 338.086294] ? prealloc_shrinker+0x213/0x480 [ 338.090690] ? __init_waitqueue_head+0x9e/0x150 [ 338.095349] ? inactive_list_is_low+0x850/0x850 [ 338.100120] ? __lockdep_init_map+0x105/0x590 [ 338.104628] alloc_super+0x9a6/0xb10 [ 338.108360] ? destroy_unused_super.part.11+0x110/0x110 [ 338.113716] ? lock_downgrade+0x8f0/0x8f0 [ 338.117860] ? kasan_check_read+0x11/0x20 [ 338.121995] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 338.126578] ? kasan_check_write+0x14/0x20 [ 338.130795] ? do_raw_spin_lock+0xc1/0x200 [ 338.135020] ? ns_test_super+0x50/0x50 [ 338.138897] sget_fc+0x269/0x950 [ 338.142253] ? compare_single+0x10/0x10 [ 338.146221] ? alloc_super+0xb10/0xb10 [ 338.150097] ? kasan_kmalloc+0xc4/0xe0 [ 338.153971] ? __kmalloc_track_caller+0x311/0x760 [ 338.158806] ? proc_root_lookup+0x60/0x60 [ 338.162945] vfs_get_super+0x6e/0x270 [ 338.166738] proc_get_tree+0x88/0xb0 [ 338.170440] vfs_get_tree+0x1cb/0x5c0 [ 338.174235] do_mount+0x6c1/0x1fb0 [ 338.177765] ? kasan_check_write+0x14/0x20 [ 338.181993] ? copy_mount_string+0x40/0x40 [ 338.186214] ? kasan_kmalloc+0xc4/0xe0 [ 338.190092] ? kmem_cache_alloc_trace+0x318/0x780 [ 338.194923] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 338.200451] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 338.205989] ? copy_mount_options+0x285/0x380 [ 338.210485] ksys_mount+0x12d/0x140 [ 338.214108] __x64_sys_mount+0xbe/0x150 [ 338.218093] do_syscall_64+0x1b9/0x820 [ 338.221971] ? finish_task_switch+0x1d3/0x870 [ 338.226472] ? syscall_return_slowpath+0x5e0/0x5e0 [ 338.231396] ? syscall_return_slowpath+0x31d/0x5e0 [ 338.236312] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 338.241316] ? prepare_exit_to_usermode+0x291/0x3b0 [ 338.246320] ? perf_trace_sys_enter+0xb10/0xb10 [ 338.250973] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 338.255803] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 338.260977] RIP: 0033:0x455ab9 [ 338.264146] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 338.283333] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 338.291058] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 338.298346] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 03:33:45 executing program 0: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(0xffffffffffffffff, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 03:33:45 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:45 executing program 1 (fault-call:10 fault-nth:31): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 03:33:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdffffff00000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) [ 338.305632] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 338.312892] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 338.320235] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000001e 03:33:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0100001d000800000000060000001c000100080001000000000008000200000000000800040000000000"], 0x30}, 0x1}, 0x0) 03:33:46 executing program 3: r0 = socket$pptp(0x18, 0x1, 0x2) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x0, 0x44b1, 0x6, 0x0, 0xfffffffffffffffb}) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0x0, 0xff]) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x2, 0x4e06, 0x9, 0x81, 0x5, 0x7fff, 0x5, {0x0, @in={{0x2, 0x4e23}}, 0x100, 0x1000, 0xffffffffffffff81, 0x2d0, 0x9}}, &(0x7f0000000180)=0xb0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000001c0)={r5, 0xfffffffffffffbff, 0x30, 0xe3ec, 0x7fffffff}, &(0x7f0000000200)=0x18) eventfd2(0xda5, 0x80000) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000240)={r4, 0x6, 0x1}, 0x8) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) ptrace$setregs(0xf, r7, 0x0, &(0x7f00000002c0)="7ae382cb8b5690d75100e844bb3320d110b6e1d7549d5c7073a3395025bc97fc2e183e7bd22c04a6f3bd5e8a9fccd0d2b5e513d2176d17c9f37b6f0274ad3ff8bc81b735debbd9861beb71bbc4d4a7d833ba6cb88c6794a33b51aa1746dc51121d12cd6d37eef70b64c00118f24797c557b6600778584498f7fbdbcd9c384ec13f2ce3fbb22c04bed72c057407cf71f8f2df36cae60893d709dc9765e5a531a4d25228e78cfdfd0fba") ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000380)={0x2, 0x0, [{}, {}]}) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000400)) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000440)={0x7, 0x81, 0x20, 0x19}, 0x8) fcntl$getflags(r3, 0x40b) r8 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x420001, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000004c0)={r6, 0x6, 0x1, [0x4]}, &(0x7f0000000500)=0xa) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000540)={'ip6_vti0\x00', @ifru_hwaddr}) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000580), &(0x7f00000005c0)=0x4) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000600)={r5}, 0x8) ioctl$KVM_S390_UCAS_MAP(r8, 0x4018ae50, &(0x7f0000000640)={0x0, 0x1, 0x5}) r9 = open(&(0x7f0000000680)='./file0\x00', 0x400, 0x4) setsockopt$sock_timeval(r2, 0x1, 0x14, &(0x7f00000006c0)={0x77359400}, 0x10) connect$l2tp(r9, &(0x7f0000000700)=@pppol2tpin6={0x18, 0x1, {0x0, r9, 0x4, 0x1, 0x3, 0x3, {0xa, 0x4e24, 0xffffffffffffffc0, @remote={0xfe, 0x80, [], 0xbb}, 0x1}}}, 0x32) getsockopt$inet6_IPV6_XFRM_POLICY(r9, 0x29, 0x23, &(0x7f0000000740)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000840)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r9, 0x0, 0x10, &(0x7f0000000880)={{{@in=@multicast1=0xe0000001, @in6, 0x4e20, 0x3, 0x4e23, 0x8000, 0xa, 0x80, 0xa0, 0x3a, 0x0, r10}, {0x1, 0x7, 0x0, 0x425d3882, 0x3, 0x8001, 0x6, 0x9}, {0xff, 0x7, 0x4, 0xfffffffffffff4cc}, 0x1, 0x6e6bbd, 0x2, 0x0, 0x1, 0x1}, {{@in6=@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x4d4, 0x33}, 0x2, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x3507, 0x0, 0x0, 0x737, 0x6, 0xf6, 0x3}}, 0xe8) write$FUSE_WRITE(r8, &(0x7f0000000980)={0x18, 0x0, 0x2, {0x80000000}}, 0x18) read$eventfd(r8, &(0x7f00000009c0), 0x8) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r9, 0x29, 0xd2, &(0x7f0000000a00)={{0xa, 0x4e21, 0x5, @mcast1={0xff, 0x1, [], 0x1}, 0x7}, {0xa, 0x4e22, 0x5, @empty, 0x5}, 0x101, [0xfffffffffffffffb, 0xffffffff, 0xfffffffffffffffb, 0x1f, 0x5, 0x1, 0x400, 0xcf7d]}, 0x5c) 03:33:46 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x305f]}, 0x2c) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') 03:33:46 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1400000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:46 executing program 0: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(0xffffffffffffffff, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) [ 338.913084] FAULT_INJECTION: forcing a failure. [ 338.913084] name failslab, interval 1, probability 0, space 0, times 0 [ 338.924498] CPU: 0 PID: 25313 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 338.933118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.942478] Call Trace: [ 338.945065] dump_stack+0x1c9/0x2b4 [ 338.948693] ? dump_stack_print_info.cold.2+0x52/0x52 [ 338.953912] ? perf_trace_lock+0xde/0x920 [ 338.958089] should_fail.cold.4+0xa/0x11 [ 338.962161] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 338.967435] ? save_stack+0xa9/0xd0 [ 338.971056] ? save_stack+0x43/0xd0 [ 338.974669] ? kasan_kmalloc+0xc4/0xe0 [ 338.978545] ? kmem_cache_alloc_trace+0x152/0x780 [ 338.983487] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 338.988707] ? __list_lru_init+0x4d6/0x840 [ 338.992937] ? alloc_super+0x9a6/0xb10 [ 338.996828] ? vfs_get_super+0x6e/0x270 [ 339.000798] ? proc_get_tree+0x88/0xb0 [ 339.004680] ? do_mount+0x6c1/0x1fb0 [ 339.008381] ? ksys_mount+0x12d/0x140 [ 339.012175] ? __x64_sys_mount+0xbe/0x150 [ 339.016341] ? do_syscall_64+0x1b9/0x820 [ 339.020400] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 339.025783] ? lock_acquire+0x1e4/0x540 [ 339.029756] ? fs_reclaim_acquire+0x20/0x20 [ 339.034074] ? lock_downgrade+0x8f0/0x8f0 [ 339.038218] ? __x64_sys_mount+0xbe/0x150 [ 339.042383] ? check_same_owner+0x340/0x340 [ 339.046696] ? rcu_note_context_switch+0x730/0x730 [ 339.051626] __should_failslab+0x124/0x180 [ 339.055856] should_failslab+0x9/0x14 [ 339.059673] kmem_cache_alloc_trace+0x2cb/0x780 [ 339.064335] ? kasan_kmalloc+0xc4/0xe0 [ 339.068224] __memcg_init_list_lru_node+0x185/0x2d0 [ 339.073236] ? kvfree_rcu+0x20/0x20 [ 339.076885] ? __kmalloc_node+0x47/0x70 [ 339.080896] __list_lru_init+0x4d6/0x840 [ 339.084964] ? list_lru_destroy+0x500/0x500 [ 339.089288] ? prealloc_shrinker+0x213/0x480 [ 339.093684] ? __init_waitqueue_head+0x9e/0x150 [ 339.098344] ? inactive_list_is_low+0x850/0x850 [ 339.103003] ? __lockdep_init_map+0x105/0x590 [ 339.107500] alloc_super+0x9a6/0xb10 [ 339.111214] ? destroy_unused_super.part.11+0x110/0x110 [ 339.116578] ? lock_downgrade+0x8f0/0x8f0 [ 339.120729] ? kasan_check_read+0x11/0x20 [ 339.124878] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 339.129465] ? kasan_check_write+0x14/0x20 [ 339.133806] ? do_raw_spin_lock+0xc1/0x200 [ 339.138049] ? ns_test_super+0x50/0x50 [ 339.141944] sget_fc+0x269/0x950 [ 339.145317] ? compare_single+0x10/0x10 [ 339.149282] ? alloc_super+0xb10/0xb10 [ 339.153164] ? kasan_kmalloc+0xc4/0xe0 [ 339.157046] ? __kmalloc_track_caller+0x311/0x760 [ 339.161881] ? proc_root_lookup+0x60/0x60 [ 339.166031] vfs_get_super+0x6e/0x270 [ 339.169824] proc_get_tree+0x88/0xb0 [ 339.173543] vfs_get_tree+0x1cb/0x5c0 [ 339.177345] do_mount+0x6c1/0x1fb0 [ 339.180905] ? kasan_check_write+0x14/0x20 [ 339.185143] ? copy_mount_string+0x40/0x40 [ 339.189380] ? retint_kernel+0x10/0x10 [ 339.193456] ? __sanitizer_cov_trace_const_cmp8+0xf/0x20 [ 339.198992] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 339.204523] ? copy_mount_options+0x285/0x380 [ 339.209011] ksys_mount+0x12d/0x140 [ 339.212647] __x64_sys_mount+0xbe/0x150 [ 339.216615] do_syscall_64+0x1b9/0x820 [ 339.220492] ? syscall_return_slowpath+0x5e0/0x5e0 [ 339.225512] ? syscall_return_slowpath+0x31d/0x5e0 [ 339.230440] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 339.235463] ? prepare_exit_to_usermode+0x291/0x3b0 [ 339.240497] ? perf_trace_sys_enter+0xb10/0xb10 [ 339.245249] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 339.250200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 339.255389] RIP: 0033:0x455ab9 [ 339.258560] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 339.278036] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 339.285826] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 339.293089] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 339.300356] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 339.307620] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 03:33:46 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x5) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1000000000002, 0x0) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) r3 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0xee98, 0x2000) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f0000000100)=""/57) keyctl$get_persistent(0xf, r2, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x101, 0x40) 03:33:46 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:46 executing program 1 (fault-call:10 fault-nth:32): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 03:33:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) [ 339.314877] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 000000000000001f 03:33:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:46 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket(0x10, 0x803, 0x0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000d00)={&(0x7f0000000340)={0x10}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000e00)={0x14}, 0x14}, 0x1}, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0xdc5) r2 = memfd_create(&(0x7f0000000040)=')\x00', 0x3) write$tun(r2, &(0x7f00000000c0)={@void, @void, @x25={0x0, 0x7fff, 0xff, "d3fe6df101a70c3bc5dd353cc98dab6960baa722a07431e4e05515f98877edc9a21bc4c37b5b0b10769656f95cbcb7191cddafe7429eeba3ae68"}}, 0x3d) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={&(0x7f0000000080)={0x10}, 0x0, &(0x7f00000008c0)={&(0x7f0000000dc0)=@gettaction={0x18, 0x32, 0x5, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x4, 0x1}]}, 0x18}, 0x1}, 0x0) 03:33:47 executing program 0: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 03:33:47 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x14000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:47 executing program 4: socketpair(0x0, 0xf, 0xfff, &(0x7f0000000380)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000003c0), &(0x7f0000000400)=0x4) r1 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0x40045542, &(0x7f0000000440)={0x0, 0x1000000000000000, 0xffffffffffffffff}) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x200, 0x0) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x20, 0x0) r3 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000200)={{0x4, 0x0, 0x7a, 0x211, 'syz0\x00', 0x400}, 0x2, 0x108, 0x5, r3, 0x4, 0x0, 'syz0\x00', &(0x7f00000001c0)=['self.GPL@lo,\x00', 'vboxnet1\x00', '/dev/snd/controlC#\x00', '/dev/dmmidi#\x00'], 0x36, [], [0xc6, 0xffffffff80000000, 0x9, 0x3ff]}) timer_create(0x0, &(0x7f00005b6000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000016) setsockopt$inet_dccp_int(r2, 0x21, 0x4, &(0x7f0000000340)=0x8, 0x4) mount$9p_virtio(&(0x7f0000000080)='/dev/dmmidi#\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x1044000, &(0x7f0000000180)={'trans=virtio,', {[{@version_9p2000='version=9p2000', 0x2c}]}}) close(r2) 03:33:47 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c00, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7ffffff9, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 03:33:47 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d3b17f3491eaf3475aeeca3d1dec3de3aa332543958ba91", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)) fchmod(r0, 0x10) mount$9p_rdma(&(0x7f00000000c0)='127.0.0.1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x8640d0, &(0x7f0000000340)={'trans=rdma,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x401}, 0x2c}, {@sq={'sq', 0x3d, 0x80}, 0x2c}, {@common=@access_any='access=any', 0x2c}, {@common=@version_L='version=9p2000.L', 0x2c}]}}) close(r0) chown(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) 03:33:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/fib_trie\x00') ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f00000002c0)={{0x100000000, 0x5}, 'port1\x00', 0x40, 0x80034, 0x7, 0xfffffffffffffffe, 0x4, 0x6, 0x0, 0x0, 0x4, 0x1}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000000)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="190200000000000000000700000030000100080004000000005ef9dc5ece00080001000200000008000200000a000014000300fe800000000000000000000000000000fedfca19bece1a78a96c43d7ebb6b05f56ef5146971dd014e31f64bdc245221dc057508b3056369e13fb3e70d0843ff6af7cea43acc9cbd5f66f0f4875de7fbe17922b42bbc281ab938425e1aedea982cf2fb9ff0b1655de6d269529571e0d0000000000000000"], 0x44}, 0x1}, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x1, 0x0) bind$alg(r3, &(0x7f0000000200)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha512\x00'}, 0x58) [ 339.826166] FAULT_INJECTION: forcing a failure. [ 339.826166] name failslab, interval 1, probability 0, space 0, times 0 [ 339.837621] CPU: 1 PID: 25372 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 339.846157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.855522] Call Trace: [ 339.858135] dump_stack+0x1c9/0x2b4 [ 339.861780] ? dump_stack_print_info.cold.2+0x52/0x52 [ 339.867001] ? __kernel_text_address+0xd/0x40 [ 339.871517] ? unwind_get_return_address+0x61/0xa0 03:33:47 executing program 0: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) [ 339.876473] should_fail.cold.4+0xa/0x11 [ 339.880578] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 339.885713] ? save_stack+0xa9/0xd0 [ 339.889382] ? save_stack+0x43/0xd0 [ 339.893022] ? kasan_kmalloc+0xc4/0xe0 [ 339.896925] ? kmem_cache_alloc_trace+0x152/0x780 [ 339.901783] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 339.906990] ? __list_lru_init+0x4d6/0x840 [ 339.911242] ? alloc_super+0x9a6/0xb10 [ 339.915165] ? vfs_get_super+0x6e/0x270 [ 339.919144] ? proc_get_tree+0x88/0xb0 [ 339.923038] ? vfs_get_tree+0x1cb/0x5c0 [ 339.927005] ? do_mount+0x6c1/0x1fb0 [ 339.930719] ? ksys_mount+0x12d/0x140 [ 339.934518] ? __x64_sys_mount+0xbe/0x150 [ 339.938678] ? do_syscall_64+0x1b9/0x820 [ 339.942776] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 339.948179] ? save_stack+0xa9/0xd0 [ 339.951837] ? lock_acquire+0x1e4/0x540 [ 339.956962] ? fs_reclaim_acquire+0x20/0x20 [ 339.961308] ? lock_downgrade+0x8f0/0x8f0 [ 339.965510] ? __x64_sys_mount+0xbe/0x150 [ 339.969689] ? check_same_owner+0x340/0x340 [ 339.974036] ? rcu_note_context_switch+0x730/0x730 [ 339.978985] __should_failslab+0x124/0x180 [ 339.983231] should_failslab+0x9/0x14 [ 339.987070] kmem_cache_alloc_trace+0x2cb/0x780 [ 339.991768] ? kasan_kmalloc+0xc4/0xe0 [ 339.995680] __memcg_init_list_lru_node+0x185/0x2d0 [ 340.000710] ? kvfree_rcu+0x20/0x20 [ 340.004344] ? __kmalloc_node+0x47/0x70 [ 340.008339] __list_lru_init+0x4d6/0x840 [ 340.012414] ? list_lru_destroy+0x500/0x500 [ 340.016751] ? prealloc_shrinker+0x213/0x480 [ 340.021193] ? __init_waitqueue_head+0x9e/0x150 [ 340.025915] ? inactive_list_is_low+0x850/0x850 [ 340.030602] ? __lockdep_init_map+0x105/0x590 [ 340.035136] alloc_super+0x9a6/0xb10 [ 340.038873] ? destroy_unused_super.part.11+0x110/0x110 [ 340.044265] ? lock_downgrade+0x8f0/0x8f0 [ 340.048446] ? kasan_check_read+0x11/0x20 [ 340.052641] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 340.057360] ? kasan_check_write+0x14/0x20 [ 340.061796] ? do_raw_spin_lock+0xc1/0x200 [ 340.066059] ? ns_test_super+0x50/0x50 [ 340.069972] sget_fc+0x269/0x950 [ 340.073358] ? compare_single+0x10/0x10 [ 340.077335] ? alloc_super+0xb10/0xb10 [ 340.081234] ? kasan_kmalloc+0xc4/0xe0 [ 340.085143] ? __kmalloc_track_caller+0x311/0x760 [ 340.090075] ? proc_root_lookup+0x60/0x60 [ 340.094225] vfs_get_super+0x6e/0x270 [ 340.098028] proc_get_tree+0x88/0xb0 [ 340.101739] vfs_get_tree+0x1cb/0x5c0 [ 340.105643] do_mount+0x6c1/0x1fb0 [ 340.109184] ? check_same_owner+0x340/0x340 [ 340.113496] ? lock_release+0xa30/0xa30 [ 340.117461] ? copy_mount_string+0x40/0x40 [ 340.121689] ? kasan_kmalloc+0xc4/0xe0 [ 340.125572] ? kmem_cache_alloc_trace+0x318/0x780 [ 340.130406] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 340.135952] ? _copy_from_user+0xdf/0x150 [ 340.140101] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 340.145626] ? copy_mount_options+0x285/0x380 [ 340.150113] ksys_mount+0x12d/0x140 [ 340.153731] __x64_sys_mount+0xbe/0x150 [ 340.157697] do_syscall_64+0x1b9/0x820 [ 340.161665] ? finish_task_switch+0x1d3/0x870 [ 340.166153] ? syscall_return_slowpath+0x5e0/0x5e0 [ 340.171080] ? syscall_return_slowpath+0x31d/0x5e0 [ 340.176014] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 340.181020] ? prepare_exit_to_usermode+0x291/0x3b0 [ 340.186028] ? perf_trace_sys_enter+0xb10/0xb10 [ 340.191129] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 340.195979] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 340.201158] RIP: 0033:0x455ab9 [ 340.204328] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:33:47 executing program 1 (fault-call:10 fault-nth:33): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 340.223626] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 340.231332] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 340.238604] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 340.245861] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 340.253119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 340.260381] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000020 03:33:47 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfdfdffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:47 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000180)={0x0, @empty, @loopback}, &(0x7f00000001c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@loopback}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000400)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000700)=0xe8) r5 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x5, 0x10200) r6 = syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x1000, 0x40000) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f00000006c0)=@req3={0x0, 0x0, 0x4, 0x4, 0x7, 0x6, 0x2}, 0x1c) ioctl$UFFDIO_UNREGISTER(r6, 0x8010aa01, &(0x7f0000000680)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) ioctl$BLKSECDISCARD(r5, 0x127d, &(0x7f0000000240)=0x7) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000640)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80800}, 0xc, &(0x7f0000000600)={&(0x7f0000000540)={0xb8, r1, 0x408, 0x70bd2c, 0x25dfdbfb, {0x2}, [{{0x8, 0x1, r2}, {0x44, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x80}}, {0x8, 0x6, r3}}}]}}, {{0x8, 0x1, r4}, {0x50, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4}, 0x4000) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000707ff0)={0x0, 0x10, &(0x7f0000f3eff0)=[@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}]}, &(0x7f000045c000)=0x10) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x4e23, @broadcast=0xffffffff}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xf}}, 0x8, {0x2, 0x4e23}, 'teql0\x00'}) shutdown(r0, 0x2000000000000002) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000)={r7}, &(0x7f0000000040)=0x8) [ 340.358909] netlink: 'syz-executor5': attribute type 4 has an invalid length. [ 340.366329] netlink: 36 bytes leftover after parsing attributes in process `syz-executor5'. 03:33:47 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffff8801c9022c78, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 03:33:47 executing program 0: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 03:33:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) socket$inet6(0xa, 0x8000f, 0x8) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000004c0), 0xc0, &(0x7f0000000540)}, 0x8000) restart_syscall() write$binfmt_elf32(r0, &(0x7f0000004100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x98cd556f66447074, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x9, 0x2400) ioctl$BLKGETSIZE64(r2, 0x80081272, &(0x7f0000000140)) perf_event_open$cgroup(&(0x7f0000000040)={0x5, 0x70, 0x5, 0xc8c, 0x0, 0x9, 0x0, 0x8001, 0x20000, 0x4, 0x9, 0x7, 0x7fff, 0x1, 0x6, 0x0, 0x8, 0x4000000000000000, 0x0, 0x6, 0xcf9b, 0x81, 0x3d43, 0x73, 0x18e5, 0x0, 0x0, 0x8d29, 0x1ff, 0x3ff, 0x4, 0xd17, 0x401, 0x8, 0x4, 0x101, 0x4355, 0x40, 0x0, 0x3, 0x7, @perf_config_ext={0x9eb2, 0x220bece3}, 0x4, 0x1, 0x7f, 0x6, 0xfffffffffffffffe, 0x10000, 0x8000}, r1, 0xe, r2, 0x0) [ 340.463199] netlink: 'syz-executor5': attribute type 4 has an invalid length. [ 340.470745] netlink: 36 bytes leftover after parsing attributes in process `syz-executor5'. [ 340.734432] FAULT_INJECTION: forcing a failure. [ 340.734432] name failslab, interval 1, probability 0, space 0, times 0 [ 340.745962] CPU: 0 PID: 25420 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 340.754473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 340.763821] Call Trace: [ 340.766414] dump_stack+0x1c9/0x2b4 [ 340.770040] ? dump_stack_print_info.cold.2+0x52/0x52 [ 340.775404] ? perf_trace_lock+0xde/0x920 [ 340.779557] should_fail.cold.4+0xa/0x11 [ 340.783624] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 340.788750] ? save_stack+0xa9/0xd0 [ 340.792378] ? save_stack+0x43/0xd0 [ 340.795992] ? kasan_kmalloc+0xc4/0xe0 [ 340.799871] ? kmem_cache_alloc_trace+0x152/0x780 [ 340.804805] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 340.809996] ? __list_lru_init+0x4d6/0x840 [ 340.814240] ? alloc_super+0x9a6/0xb10 [ 340.818150] ? vfs_get_super+0x6e/0x270 [ 340.822147] ? proc_get_tree+0x88/0xb0 [ 340.826060] ? do_mount+0x6c1/0x1fb0 [ 340.829812] ? ksys_mount+0x12d/0x140 [ 340.834355] ? __x64_sys_mount+0xbe/0x150 [ 340.838543] ? do_syscall_64+0x1b9/0x820 [ 340.842641] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 340.848109] ? __sched_text_start+0x8/0x8 [ 340.852267] ? lock_acquire+0x1e4/0x540 [ 340.856269] ? fs_reclaim_acquire+0x20/0x20 [ 340.860617] ? lock_downgrade+0x8f0/0x8f0 [ 340.864774] ? __x64_sys_mount+0xbe/0x150 [ 340.868947] ? check_same_owner+0x340/0x340 [ 340.873303] ? rcu_note_context_switch+0x730/0x730 [ 340.878265] __should_failslab+0x124/0x180 03:33:48 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") unshare(0x8000000) r1 = syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x8, 0x540ff9) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x7b6c813e}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000140)={r2, 0x9, 0x10}, &(0x7f0000000180)=0xc) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000000)) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e21, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x5}, 0x1c) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000100)) [ 340.882527] should_failslab+0x9/0x14 [ 340.886352] kmem_cache_alloc_trace+0x2cb/0x780 [ 340.891048] ? kasan_kmalloc+0xc4/0xe0 [ 340.895258] __memcg_init_list_lru_node+0x185/0x2d0 [ 340.900315] ? kvfree_rcu+0x20/0x20 [ 340.903958] ? __kmalloc_node+0x47/0x70 [ 340.907944] __list_lru_init+0x4d6/0x840 [ 340.911999] ? list_lru_destroy+0x500/0x500 [ 340.916322] ? prealloc_shrinker+0x213/0x480 [ 340.920725] ? __init_waitqueue_head+0x9e/0x150 [ 340.925403] ? inactive_list_is_low+0x850/0x850 [ 340.930082] ? __lockdep_init_map+0x105/0x590 [ 340.934753] alloc_super+0x9a6/0xb10 [ 340.938470] ? destroy_unused_super.part.11+0x110/0x110 [ 340.943837] ? lock_downgrade+0x8f0/0x8f0 [ 340.947987] ? kasan_check_read+0x11/0x20 [ 340.952242] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 340.956839] ? kasan_check_write+0x14/0x20 [ 340.961090] ? do_raw_spin_lock+0xc1/0x200 [ 340.965330] ? ns_test_super+0x50/0x50 [ 340.969214] sget_fc+0x269/0x950 [ 340.972600] ? compare_single+0x10/0x10 [ 340.976566] ? alloc_super+0xb10/0xb10 [ 340.980442] ? kasan_kmalloc+0xc4/0xe0 [ 340.984340] ? __kmalloc_track_caller+0x311/0x760 [ 340.989179] ? proc_root_lookup+0x60/0x60 [ 340.993327] vfs_get_super+0x6e/0x270 [ 340.997129] proc_get_tree+0x88/0xb0 [ 341.000851] vfs_get_tree+0x1cb/0x5c0 [ 341.004642] do_mount+0x6c1/0x1fb0 [ 341.008272] ? kasan_check_write+0x14/0x20 [ 341.012510] ? copy_mount_string+0x40/0x40 [ 341.016741] ? kasan_kmalloc+0xc4/0xe0 [ 341.020739] ? kmem_cache_alloc_trace+0x318/0x780 [ 341.025601] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 341.031132] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.036659] ? copy_mount_options+0x285/0x380 [ 341.041145] ksys_mount+0x12d/0x140 [ 341.044771] __x64_sys_mount+0xbe/0x150 [ 341.048740] do_syscall_64+0x1b9/0x820 [ 341.052626] ? finish_task_switch+0x1d3/0x870 [ 341.057117] ? syscall_return_slowpath+0x5e0/0x5e0 [ 341.062039] ? syscall_return_slowpath+0x31d/0x5e0 [ 341.066980] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 341.072027] ? prepare_exit_to_usermode+0x291/0x3b0 [ 341.077042] ? perf_trace_sys_enter+0xb10/0xb10 [ 341.081706] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 341.086548] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 341.091723] RIP: 0033:0x455ab9 [ 341.094893] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 341.114112] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 341.121899] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 341.129166] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 03:33:48 executing program 1 (fault-call:10 fault-nth:34): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 341.136520] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 341.143777] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 341.151035] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000021 03:33:48 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000140)={0x0, 0x93b}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000001c0)={r3, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x17}}}, 0x8, 0x7fff, 0x2, 0x100, 0x22}, 0x98) set_thread_area(&(0x7f0000000000)={0x401, 0xffffffffffffffff, 0x0, 0x52a, 0x7, 0x3, 0x6, 0xfffffffffffffffe, 0x0, 0x94}) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x4, [{{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}]}, 0x290) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000dbd000)={0x1, {{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}}}, 0x90) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r4, 0x404c534a, &(0x7f0000000080)={0x5, 0x7, 0x5}) 03:33:48 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x15000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:48 executing program 0: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 03:33:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 03:33:48 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:48 executing program 4: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) r1 = socket(0xffffffffffffffff, 0x5, 0x80) write(r1, &(0x7f0000000040)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) write(r1, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305030008000100010423dcffdf00", 0x1f) 03:33:48 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") socketpair(0x10, 0x80000, 0x200, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000080)=0x1) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4) mq_timedsend(0xffffffffffffffff, &(0x7f0000000240), 0x0, 0xfffffffffffffff7, 0x0) [ 341.663921] FAULT_INJECTION: forcing a failure. [ 341.663921] name failslab, interval 1, probability 0, space 0, times 0 [ 341.675282] CPU: 1 PID: 25470 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 341.683780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.693123] Call Trace: [ 341.695704] dump_stack+0x1c9/0x2b4 [ 341.699326] ? dump_stack_print_info.cold.2+0x52/0x52 [ 341.704521] ? __kernel_text_address+0xd/0x40 [ 341.709008] ? unwind_get_return_address+0x61/0xa0 [ 341.713961] should_fail.cold.4+0xa/0x11 [ 341.718022] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 341.723122] ? save_stack+0xa9/0xd0 [ 341.726734] ? save_stack+0x43/0xd0 [ 341.730347] ? kasan_kmalloc+0xc4/0xe0 [ 341.734237] ? kmem_cache_alloc_trace+0x152/0x780 [ 341.739070] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 341.744258] ? __list_lru_init+0x4d6/0x840 [ 341.748494] ? alloc_super+0x9a6/0xb10 [ 341.752374] ? vfs_get_super+0x6e/0x270 [ 341.756347] ? proc_get_tree+0x88/0xb0 [ 341.760219] ? vfs_get_tree+0x1cb/0x5c0 [ 341.764180] ? do_mount+0x6c1/0x1fb0 [ 341.767878] ? ksys_mount+0x12d/0x140 [ 341.771663] ? __x64_sys_mount+0xbe/0x150 [ 341.775803] ? do_syscall_64+0x1b9/0x820 [ 341.779849] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 341.785217] ? save_stack+0xa9/0xd0 [ 341.788834] ? lock_acquire+0x1e4/0x540 [ 341.792795] ? fs_reclaim_acquire+0x20/0x20 [ 341.797108] ? lock_downgrade+0x8f0/0x8f0 [ 341.802203] ? __x64_sys_mount+0xbe/0x150 [ 341.806339] ? check_same_owner+0x340/0x340 [ 341.810650] ? rcu_note_context_switch+0x730/0x730 [ 341.815659] __should_failslab+0x124/0x180 [ 341.819886] should_failslab+0x9/0x14 [ 341.823698] kmem_cache_alloc_trace+0x2cb/0x780 [ 341.828359] ? kasan_kmalloc+0xc4/0xe0 [ 341.832238] __memcg_init_list_lru_node+0x185/0x2d0 [ 341.837242] ? kvfree_rcu+0x20/0x20 [ 341.840877] ? __kmalloc_node+0x47/0x70 [ 341.844843] __list_lru_init+0x4d6/0x840 [ 341.848894] ? list_lru_destroy+0x500/0x500 [ 341.853208] ? prealloc_shrinker+0x213/0x480 [ 341.857600] ? __init_waitqueue_head+0x9e/0x150 [ 341.862262] ? inactive_list_is_low+0x850/0x850 [ 341.866937] ? __lockdep_init_map+0x105/0x590 [ 341.871426] alloc_super+0x9a6/0xb10 [ 341.875131] ? destroy_unused_super.part.11+0x110/0x110 [ 341.880485] ? lock_downgrade+0x8f0/0x8f0 [ 341.884636] ? kasan_check_read+0x11/0x20 [ 341.888776] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 341.893354] ? kasan_check_write+0x14/0x20 [ 341.897573] ? do_raw_spin_lock+0xc1/0x200 [ 341.901806] ? ns_test_super+0x50/0x50 [ 341.905683] sget_fc+0x269/0x950 [ 341.909043] ? compare_single+0x10/0x10 [ 341.913003] ? alloc_super+0xb10/0xb10 [ 341.916882] ? kasan_kmalloc+0xc4/0xe0 [ 341.920759] ? __kmalloc_track_caller+0x311/0x760 [ 341.925590] ? proc_root_lookup+0x60/0x60 [ 341.929733] vfs_get_super+0x6e/0x270 [ 341.933535] proc_get_tree+0x88/0xb0 [ 341.937236] vfs_get_tree+0x1cb/0x5c0 [ 341.941029] do_mount+0x6c1/0x1fb0 [ 341.944559] ? kasan_check_write+0x14/0x20 [ 341.948792] ? copy_mount_string+0x40/0x40 [ 341.953028] ? retint_kernel+0x10/0x10 [ 341.956905] ? copy_mount_options+0x213/0x380 [ 341.961401] ? __sanitizer_cov_trace_pc+0x14/0x50 [ 341.966232] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 341.971756] ? copy_mount_options+0x285/0x380 [ 341.976240] ksys_mount+0x12d/0x140 [ 341.979855] __x64_sys_mount+0xbe/0x150 [ 341.983832] do_syscall_64+0x1b9/0x820 [ 341.987711] ? finish_task_switch+0x1d3/0x870 [ 341.992210] ? syscall_return_slowpath+0x5e0/0x5e0 [ 341.997140] ? syscall_return_slowpath+0x31d/0x5e0 [ 342.002059] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 342.007066] ? prepare_exit_to_usermode+0x291/0x3b0 [ 342.012077] ? perf_trace_sys_enter+0xb10/0xb10 [ 342.016746] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 342.021582] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 342.026764] RIP: 0033:0x455ab9 [ 342.029936] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 342.049127] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 342.056849] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 03:33:49 executing program 0: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 03:33:49 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:49 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="26000000110047f181ff050143000000fffffffdc200000000000000092201e6050019000000", 0x26) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x2, 0x0) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000080)={"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"}) [ 342.064110] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 342.071379] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 342.078635] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 342.085896] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000022 03:33:49 executing program 1 (fault-call:10 fault-nth:35): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) 03:33:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) 03:33:49 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:49 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x800, 0x0) r1 = geteuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000040)={{{@in6, @in=@rand_addr=0x81, 0x4e21, 0x0, 0x4e23, 0xa, 0xa, 0x80, 0x80, 0x11, 0x0, r1}, {0x9, 0x81, 0x4be5, 0x63, 0xcf8, 0x4, 0x36, 0x8}, {0xf0, 0x77d, 0x2f, 0x7}, 0x5, 0x6e6bb8, 0x1, 0x1, 0x1, 0x1}, {{@in=@broadcast=0xffffffff, 0x4d5, 0x33}, 0xa, @in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, 0x0, 0xffffffff, 0x3, 0x1, 0x6}}, 0xe8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000140)={0x0, 0xffff, 0x1, 0xfffffffffffffbd8, 0x7, 0x8000, 0xfffffffffffffffe, 0x7, {0x0, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1, 0x0, 0x8, 0x136000000000000, 0x80000001}}, &(0x7f0000000200)=0xb0) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000240)=r3, 0x4) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f00000002c0)={0x8, &(0x7f0000000280)=[{0xfffffffffffffff9, 0x10000, 0x8000, 0x9}, {0x5, 0x8, 0x1, 0x3}, {0x20, 0x2, 0x5585, 0x3}, {0x2, 0x1, 0x5, 0x7f9}, {0xafe, 0x9, 0x7, 0x7fff}, {0x50, 0x7f, 0x100, 0x3}, {0x0, 0x101, 0x5, 0xfffffffffffffffc}, {0x234, 0xf48, 0x10000, 0x3}]}) r4 = memfd_create(&(0x7f0000000300)='eth0\x00', 0x2) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000340)={r3, 0xcd85}, 0x8) clock_gettime(0x7, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000003c0)={0x5b2, 0x7, 0x8, 0x20}, 0x8) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000400)={0x1f, 0x8, 0x7ff, 0x7}, 0x8) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000440)) epoll_wait(r0, &(0x7f0000000480)=[{}, {}, {}, {}], 0x4, 0x8) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r4, 0x118, 0x1, &(0x7f00000004c0)=0x3, 0x4) write$P9_RREADDIR(r0, &(0x7f0000000500)={0xa6, 0x29, 0x1, {0x4, [{{0x40, 0x1, 0x1}, 0x100, 0x2, 0x7, './file0'}, {{0x88, 0x0, 0x2}, 0xd4, 0x3ff, 0x7, './file0'}, {{0x8c, 0x2, 0x8}, 0x3, 0x7, 0x7, './file0'}, {{0x8, 0x2, 0x4}, 0x5, 0x4000000, 0x7, './file0'}, {{0x6, 0x4, 0x6}, 0x2, 0x7f, 0x7, './file0'}]}}, 0xa6) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f00000005c0)={0x6, 0x8}) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000600)={0x101, 0x4, 0x5, 0xc00000000000}, 0x10) ioctl$KDSETLED(r0, 0x4b32, 0x7) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000640)=""/79) ioctl$KIOCSOUND(r0, 0x4b2f, 0x1) setsockopt$packet_tx_ring(r4, 0x107, 0xd, &(0x7f00000006c0)=@req={0x7ff, 0x9, 0x7, 0x6}, 0x10) getsockname$inet6(r4, &(0x7f0000000700)={0x0, 0x0, 0x0, @mcast2}, &(0x7f0000000740)=0x1c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r0, 0x50, &(0x7f0000000780)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)=r5, 0x4) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000880)={r3, 0x100000001, 0x100, 0x1, 0x9, 0x200}, 0x14) mq_getsetattr(r4, &(0x7f00000008c0)={0xaaf3, 0x81, 0x8f7f, 0xfff, 0xfffffffffffffff7, 0xfffffffffffffffa, 0x2, 0xff}, &(0x7f0000000900)) setuid(r1) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000940)={r2, @in6={{0xa, 0x4e23, 0x26, @dev={0xfe, 0x80, [], 0x17}, 0x80000000}}}, 0x84) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a00)=r5, 0x4) socket$inet_smc(0x2b, 0x1, 0x0) [ 342.312712] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. [ 342.329744] netlink: 3 bytes leftover after parsing attributes in process `syz-executor4'. 03:33:49 executing program 0: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 03:33:49 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0xef93}, 0x4) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 03:33:49 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000440)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(camellia)\x00'}, 0x245) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x1, 0x5, 0xfed5, 0xa2d}) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x167, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$INOTIFY_IOC_SETNEXTWD(r2, 0x40044900, 0x2) recvmmsg(r1, &(0x7f0000000d80)=[{{&(0x7f0000000b00)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, 0x80, &(0x7f0000000cc0)=[{&(0x7f0000000c00)=""/154, 0x9a}], 0x1, &(0x7f0000000d00)=""/99, 0x63}}], 0x1, 0x0, &(0x7f0000000e80)={0x0, 0x1c9c380}) 03:33:49 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1400, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) [ 342.619924] FAULT_INJECTION: forcing a failure. [ 342.619924] name failslab, interval 1, probability 0, space 0, times 0 [ 342.631453] CPU: 1 PID: 25524 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 342.639981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.649442] Call Trace: [ 342.652049] dump_stack+0x1c9/0x2b4 [ 342.655710] ? dump_stack_print_info.cold.2+0x52/0x52 [ 342.660935] ? perf_trace_lock+0xde/0x920 [ 342.665127] should_fail.cold.4+0xa/0x11 03:33:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 342.669218] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 342.674526] ? save_stack+0xa9/0xd0 [ 342.678178] ? save_stack+0x43/0xd0 [ 342.681830] ? kasan_kmalloc+0xc4/0xe0 [ 342.685749] ? kmem_cache_alloc_trace+0x152/0x780 [ 342.690613] ? __memcg_init_list_lru_node+0x185/0x2d0 [ 342.695825] ? __list_lru_init+0x4d6/0x840 [ 342.700076] ? alloc_super+0x9a6/0xb10 [ 342.703987] ? vfs_get_super+0x6e/0x270 [ 342.707986] ? proc_get_tree+0x88/0xb0 [ 342.711886] ? do_mount+0x6c1/0x1fb0 [ 342.715616] ? ksys_mount+0x12d/0x140 [ 342.719414] ? __x64_sys_mount+0xbe/0x150 [ 342.723552] ? do_syscall_64+0x1b9/0x820 [ 342.727615] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 342.733022] ? lock_acquire+0x1e4/0x540 [ 342.737005] ? fs_reclaim_acquire+0x20/0x20 [ 342.741353] ? lock_downgrade+0x8f0/0x8f0 [ 342.745558] ? __x64_sys_mount+0xbe/0x150 [ 342.749737] ? check_same_owner+0x340/0x340 [ 342.754085] ? rcu_note_context_switch+0x730/0x730 [ 342.759042] __should_failslab+0x124/0x180 [ 342.763286] should_failslab+0x9/0x14 [ 342.767120] kmem_cache_alloc_trace+0x2cb/0x780 [ 342.771804] ? kasan_kmalloc+0xc4/0xe0 [ 342.775700] __memcg_init_list_lru_node+0x185/0x2d0 [ 342.780739] ? kvfree_rcu+0x20/0x20 [ 342.784394] ? __kmalloc_node+0x47/0x70 [ 342.788370] __list_lru_init+0x4d6/0x840 [ 342.792428] ? list_lru_destroy+0x500/0x500 [ 342.796758] ? prealloc_shrinker+0x213/0x480 [ 342.801607] ? __init_waitqueue_head+0x9e/0x150 [ 342.806276] ? inactive_list_is_low+0x850/0x850 [ 342.810969] ? __lockdep_init_map+0x105/0x590 [ 342.815480] alloc_super+0x9a6/0xb10 [ 342.819193] ? destroy_unused_super.part.11+0x110/0x110 [ 342.824573] ? lock_downgrade+0x8f0/0x8f0 [ 342.828748] ? kasan_check_read+0x11/0x20 [ 342.832908] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 342.837513] ? kasan_check_write+0x14/0x20 [ 342.841767] ? do_raw_spin_lock+0xc1/0x200 [ 342.846044] ? ns_test_super+0x50/0x50 [ 342.849935] sget_fc+0x269/0x950 [ 342.853298] ? compare_single+0x10/0x10 [ 342.857354] ? alloc_super+0xb10/0xb10 [ 342.861241] ? kasan_kmalloc+0xc4/0xe0 [ 342.865141] ? __kmalloc_track_caller+0x311/0x760 [ 342.869986] ? proc_root_lookup+0x60/0x60 [ 342.874142] vfs_get_super+0x6e/0x270 [ 342.877955] proc_get_tree+0x88/0xb0 [ 342.881674] vfs_get_tree+0x1cb/0x5c0 [ 342.885487] do_mount+0x6c1/0x1fb0 [ 342.889030] ? kasan_check_write+0x14/0x20 [ 342.893274] ? copy_mount_string+0x40/0x40 [ 342.897522] ? kasan_kmalloc+0xc4/0xe0 [ 342.901401] ? kmem_cache_alloc_trace+0x318/0x780 [ 342.906269] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 342.911809] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 342.917352] ? copy_mount_options+0x285/0x380 [ 342.921855] ksys_mount+0x12d/0x140 [ 342.925497] __x64_sys_mount+0xbe/0x150 [ 342.929501] do_syscall_64+0x1b9/0x820 [ 342.933399] ? finish_task_switch+0x1d3/0x870 [ 342.937901] ? syscall_return_slowpath+0x5e0/0x5e0 [ 342.942850] ? syscall_return_slowpath+0x31d/0x5e0 [ 342.947807] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 342.952837] ? prepare_exit_to_usermode+0x291/0x3b0 [ 342.957883] ? perf_trace_sys_enter+0xb10/0xb10 [ 342.962581] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 342.967461] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 342.972665] RIP: 0033:0x455ab9 [ 342.975861] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 342.995051] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 343.002790] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 343.010074] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 03:33:50 executing program 1 (fault-call:10 fault-nth:36): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000440)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, &(0x7f0000000480)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f00000001c0)='bdev\x00', 0x100000, &(0x7f00000002c0)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='.', &(0x7f0000000040)="045b898f73", 0x1004, 0x0) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000340)='iso9660\x00', 0x101000, &(0x7f0000000380)) accept4$inet(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x10, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mount(&(0x7f00000008c0)='.', &(0x7f0000000080)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f0000000ac0)) mount(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='proc\x00', 0x0, &(0x7f0000000580)) [ 343.017350] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 343.024613] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 343.031884] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000023 03:33:50 executing program 7: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0xff0f000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:50 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x7, 0x82) r1 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) fadvise64(r0, 0x4d, 0x10000, 0x1) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x81006) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) dup2(r0, r1) sendfile(r0, r0, &(0x7f0000000080), 0x102000004) socket(0x2, 0x3, 0x0) 03:33:50 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000100)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x1) syz_open_pts(r0, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x1) 03:33:50 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 03:33:50 executing program 0: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140), 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) 03:33:50 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1500, &(0x7f0000000200)=[{&(0x7f0000000500)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x24) [ 343.421272] FAULT_INJECTION: forcing a failure. [ 343.421272] name failslab, interval 1, probability 0, space 0, times 0 [ 343.432562] CPU: 1 PID: 25577 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 343.441060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.450422] Call Trace: [ 343.453030] dump_stack+0x1c9/0x2b4 [ 343.456674] ? dump_stack_print_info.cold.2+0x52/0x52 [ 343.461880] should_fail.cold.4+0xa/0x11 [ 343.465955] ? wait_for_completion+0x8d0/0x8d0 [ 343.470533] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 343.475652] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 343.480675] ? __memcg_init_list_lru_node+0x20a/0x2d0 [ 343.485869] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 343.491412] ? xas_find_tagged+0x49d/0x1310 [ 343.495733] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 343.501263] ? xas_store+0x52f/0x1720 [ 343.506111] ? ida_alloc_range+0x5d0/0xc70 [ 343.510345] ? lock_downgrade+0x8f0/0x8f0 [ 343.514485] ? lock_acquire+0x1e4/0x540 [ 343.518446] ? fs_reclaim_acquire+0x20/0x20 [ 343.522753] ? lock_downgrade+0x8f0/0x8f0 [ 343.526902] ? check_same_owner+0x340/0x340 [ 343.531214] ? kfree+0x15e/0x260 [ 343.534567] ? rcu_note_context_switch+0x730/0x730 [ 343.539487] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 343.545014] __should_failslab+0x124/0x180 [ 343.549243] should_failslab+0x9/0x14 [ 343.553058] kmem_cache_alloc+0x2af/0x760 [ 343.557192] ? up_read+0x110/0x110 [ 343.560721] ? down_read+0x1d0/0x1d0 [ 343.564428] ? proc_i_callback+0x30/0x30 [ 343.568475] proc_alloc_inode+0x1b/0x190 [ 343.572530] alloc_inode+0x63/0x190 [ 343.576146] new_inode_pseudo+0x71/0x1a0 [ 343.580195] ? prune_icache_sb+0x1b0/0x1b0 [ 343.584413] ? memcpy+0x45/0x50 [ 343.587699] proc_get_inode+0x1e/0x680 [ 343.591578] proc_fill_super+0x32c/0x630 [ 343.595630] ? proc_root_lookup+0x60/0x60 [ 343.599767] ? __kmalloc_track_caller+0x311/0x760 [ 343.604597] ? proc_root_lookup+0x60/0x60 [ 343.608735] vfs_get_super+0x15e/0x270 [ 343.612611] proc_get_tree+0x88/0xb0 [ 343.616314] vfs_get_tree+0x1cb/0x5c0 [ 343.620105] do_mount+0x6c1/0x1fb0 [ 343.623630] ? kasan_check_write+0x14/0x20 [ 343.627856] ? copy_mount_string+0x40/0x40 [ 343.632080] ? kasan_kmalloc+0xc4/0xe0 [ 343.635961] ? kmem_cache_alloc_trace+0x318/0x780 [ 343.640806] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 343.646355] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 343.651882] ? copy_mount_options+0x285/0x380 [ 343.656373] ksys_mount+0x12d/0x140 [ 343.659989] __x64_sys_mount+0xbe/0x150 [ 343.663959] do_syscall_64+0x1b9/0x820 [ 343.667836] ? finish_task_switch+0x1d3/0x870 [ 343.672327] ? syscall_return_slowpath+0x5e0/0x5e0 [ 343.677250] ? syscall_return_slowpath+0x31d/0x5e0 [ 343.682181] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 343.687198] ? prepare_exit_to_usermode+0x291/0x3b0 [ 343.692221] ? perf_trace_sys_enter+0xb10/0xb10 [ 343.696880] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 343.701720] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 343.706908] RIP: 0033:0x455ab9 [ 343.710081] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 343.729353] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 343.737056] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 343.744313] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 343.751752] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 343.759022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 343.766277] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000024 [ 343.773777] proc_fill_super: get root inode failed [ 343.781631] ================================================================== [ 343.789057] BUG: KASAN: use-after-free in dput.part.26+0x634/0x7a0 [ 343.795480] Read of size 4 at addr ffff88018be7e8c0 by task syz-executor1/25577 [ 343.802925] [ 343.804570] CPU: 1 PID: 25577 Comm: syz-executor1 Not tainted 4.18.0-rc5-next-20180718+ #10 [ 343.813068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 343.822415] Call Trace: [ 343.825013] dump_stack+0x1c9/0x2b4 [ 343.828631] ? dump_stack_print_info.cold.2+0x52/0x52 [ 343.833816] ? printk+0xa7/0xcf [ 343.837101] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 343.841876] ? dput.part.26+0x634/0x7a0 [ 343.845853] print_address_description+0x6c/0x20b [ 343.850706] ? dput.part.26+0x634/0x7a0 [ 343.854678] kasan_report.cold.7+0x242/0x30d [ 343.859085] __asan_report_load4_noabort+0x14/0x20 [ 343.864011] dput.part.26+0x634/0x7a0 [ 343.867798] ? shrink_dcache_sb+0x350/0x350 [ 343.872118] ? __kasan_slab_free+0x131/0x170 [ 343.876536] ? trace_hardirqs_on+0xd/0x10 [ 343.880675] dput+0x15/0x20 [ 343.883601] proc_kill_sb+0x125/0x1e0 [ 343.887391] ? proc_get_inode+0x680/0x680 [ 343.891527] ? proc_root_lookup+0x60/0x60 [ 343.895672] deactivate_locked_super+0x97/0x100 [ 343.900332] vfs_get_super+0x20f/0x270 [ 343.904234] proc_get_tree+0x88/0xb0 [ 343.907950] vfs_get_tree+0x1cb/0x5c0 [ 343.911740] do_mount+0x6c1/0x1fb0 [ 343.915282] ? kasan_check_write+0x14/0x20 [ 343.919525] ? copy_mount_string+0x40/0x40 [ 343.923752] ? kasan_kmalloc+0xc4/0xe0 [ 343.927641] ? kmem_cache_alloc_trace+0x318/0x780 [ 343.932488] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 343.938149] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 343.943686] ? copy_mount_options+0x285/0x380 [ 343.948178] ksys_mount+0x12d/0x140 [ 343.951805] __x64_sys_mount+0xbe/0x150 [ 343.955889] do_syscall_64+0x1b9/0x820 [ 343.959807] ? finish_task_switch+0x1d3/0x870 [ 343.964307] ? syscall_return_slowpath+0x5e0/0x5e0 [ 343.969242] ? syscall_return_slowpath+0x31d/0x5e0 [ 343.974171] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 343.979203] ? prepare_exit_to_usermode+0x291/0x3b0 [ 343.984213] ? perf_trace_sys_enter+0xb10/0xb10 [ 343.988894] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 343.993744] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 343.998923] RIP: 0033:0x455ab9 [ 344.002098] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 344.021528] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 344.029249] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 344.036518] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 344.043799] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 344.051062] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 344.058327] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000024 [ 344.065592] [ 344.067222] Allocated by task 4487: [ 344.070848] save_stack+0x43/0xd0 [ 344.074292] kasan_kmalloc+0xc4/0xe0 [ 344.078014] kasan_slab_alloc+0x12/0x20 [ 344.082008] kmem_cache_alloc+0x12e/0x760 [ 344.086169] __d_alloc+0xc8/0xd50 [ 344.089630] d_alloc_pseudo+0x1d/0x30 [ 344.093427] alloc_file_pseudo+0x158/0x3f0 [ 344.097650] sock_alloc_file+0x47/0x1b0 [ 344.101627] __sys_socket+0x172/0x260 [ 344.105453] __x64_sys_socket+0x73/0xb0 [ 344.109420] do_syscall_64+0x1b9/0x820 [ 344.113305] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 344.118473] [ 344.120084] Freed by task 4487: [ 344.123353] save_stack+0x43/0xd0 [ 344.126814] __kasan_slab_free+0x11a/0x170 [ 344.131052] kasan_slab_free+0xe/0x10 [ 344.134866] kmem_cache_free+0x86/0x2d0 [ 344.138834] dentry_free+0xe9/0x170 [ 344.142457] __dentry_kill+0x527/0x7a0 [ 344.146375] dentry_kill+0xc9/0x5a0 [ 344.150009] dput.part.26+0x66b/0x7a0 [ 344.153813] dput+0x15/0x20 [ 344.156743] __fput+0x574/0x8a0 [ 344.160023] ____fput+0x15/0x20 [ 344.163302] task_work_run+0x1ec/0x2a0 [ 344.167202] exit_to_usermode_loop+0x318/0x380 [ 344.171782] do_syscall_64+0x6be/0x820 [ 344.175683] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 344.180873] [ 344.182498] The buggy address belongs to the object at ffff88018be7e8c0 [ 344.182498] which belongs to the cache dentry(49:syz1) of size 288 [ 344.195504] The buggy address is located 0 bytes inside of [ 344.195504] 288-byte region [ffff88018be7e8c0, ffff88018be7e9e0) [ 344.207196] The buggy address belongs to the page: [ 344.212131] page:ffffea00062f9f80 count:1 mapcount:0 mapping:ffff8801c94fd180 index:0xffff88018be7e1e0 [ 344.221584] flags: 0x2fffc0000000200(slab) [ 344.226087] raw: 02fffc0000000200 ffffea00062f10c8 ffffea0007234548 ffff8801c94fd180 [ 344.234073] raw: ffff88018be7e1e0 ffff88018be7e080 0000000100000006 ffff8801a8b5cac0 [ 344.241951] page dumped because: kasan: bad access detected [ 344.247666] page->mem_cgroup:ffff8801a8b5cac0 [ 344.252146] [ 344.253758] Memory state around the buggy address: [ 344.258691] ffff88018be7e780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 344.266082] ffff88018be7e800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 344.273441] >ffff88018be7e880: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 344.280790] ^ [ 344.286223] ffff88018be7e900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 344.293583] ffff88018be7e980: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 344.300927] ================================================================== [ 344.308487] Kernel panic - not syncing: panic_on_warn set ... [ 344.308487] [ 344.315870] CPU: 1 PID: 25577 Comm: syz-executor1 Tainted: G B 4.18.0-rc5-next-20180718+ #10 03:33:51 executing program 0: r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x1}, 0xc) sendmmsg$alg(r0, &(0x7f0000000140), 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000100)=0x1e3, 0x83) [ 344.325776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 344.335402] Call Trace: [ 344.338045] dump_stack+0x1c9/0x2b4 [ 344.341696] ? dump_stack_print_info.cold.2+0x52/0x52 [ 344.346935] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 344.351731] panic+0x238/0x4e7 [ 344.355209] ? add_taint.cold.5+0x16/0x16 [ 344.359390] ? do_raw_spin_unlock+0xa7/0x2f0 [ 344.363819] ? do_raw_spin_unlock+0xa7/0x2f0 [ 344.368251] ? dput.part.26+0x634/0x7a0 [ 344.372246] kasan_end_report+0x47/0x4f [ 344.376242] kasan_report.cold.7+0x76/0x30d [ 344.380613] __asan_report_load4_noabort+0x14/0x20 [ 344.385577] dput.part.26+0x634/0x7a0 [ 344.389404] ? shrink_dcache_sb+0x350/0x350 [ 344.393765] ? __kasan_slab_free+0x131/0x170 [ 344.398221] ? trace_hardirqs_on+0xd/0x10 [ 344.402562] dput+0x15/0x20 [ 344.405516] proc_kill_sb+0x125/0x1e0 [ 344.409336] ? proc_get_inode+0x680/0x680 [ 344.413530] ? proc_root_lookup+0x60/0x60 [ 344.417669] deactivate_locked_super+0x97/0x100 [ 344.422327] vfs_get_super+0x20f/0x270 [ 344.426200] proc_get_tree+0x88/0xb0 [ 344.429905] vfs_get_tree+0x1cb/0x5c0 [ 344.433694] do_mount+0x6c1/0x1fb0 [ 344.437233] ? kasan_check_write+0x14/0x20 [ 344.441663] ? copy_mount_string+0x40/0x40 [ 344.445887] ? kasan_kmalloc+0xc4/0xe0 [ 344.449770] ? kmem_cache_alloc_trace+0x318/0x780 [ 344.454624] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 344.460168] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 344.465780] ? copy_mount_options+0x285/0x380 [ 344.470278] ksys_mount+0x12d/0x140 [ 344.473909] __x64_sys_mount+0xbe/0x150 [ 344.477876] do_syscall_64+0x1b9/0x820 [ 344.481753] ? finish_task_switch+0x1d3/0x870 [ 344.486244] ? syscall_return_slowpath+0x5e0/0x5e0 [ 344.491160] ? syscall_return_slowpath+0x31d/0x5e0 [ 344.496089] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 344.501114] ? prepare_exit_to_usermode+0x291/0x3b0 [ 344.506119] ? perf_trace_sys_enter+0xb10/0xb10 [ 344.510794] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 344.515645] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 344.520832] RIP: 0033:0x455ab9 [ 344.524003] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 344.543172] RSP: 002b:00007fc257f6fc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 344.550876] RAX: ffffffffffffffda RBX: 00007fc257f706d4 RCX: 0000000000455ab9 [ 344.558140] RDX: 0000000020000540 RSI: 0000000020000500 RDI: 00000000200004c0 [ 344.565406] RBP: 000000000072bea0 R08: 0000000020000580 R09: 0000000000000000 [ 344.572673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 344.579929] R13: 00000000004c01fb R14: 00000000004cfe38 R15: 0000000000000024 [ 344.587795] Dumping ftrace buffer: [ 344.591329] (ftrace buffer empty) [ 344.595027] Kernel Offset: disabled [ 344.598727] Rebooting in 86400 seconds..