yz_open_dev$tty1(0xc, 0x4, 0x1) dup2(r0, r1) bind$unix(r1, &(0x7f00000001c0)=@abs={0x1}, 0x6e) 06:05:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f0000000940)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 06:05:14 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000000)) 06:05:14 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0x5450, 0x0) 06:05:14 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x20000000) 06:05:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000004640)={0x0, 0x0, &(0x7f0000004600)={&(0x7f0000004340)=ANY=[], 0x70}}, 0x40) 06:05:14 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = dup2(r0, r1) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000001100)={@dev}) 06:05:14 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$FS_IOC_GETFSLABEL(r0, 0x5411, &(0x7f0000000100)) 06:05:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000380)=0x1f6) dup2(r0, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(r2, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000380)=0x1f6) getsockopt$IPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x15, 0x0, &(0x7f0000000180)) 06:05:15 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x10840, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:05:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x2000022d) r2 = dup(r1) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) 06:05:15 executing program 2: r0 = socket$nl_generic(0x2, 0x2, 0x88) sendmsg$FOU_CMD_DEL(r0, &(0x7f00000001c0)={&(0x7f0000000240), 0xfda6, &(0x7f0000000080)={&(0x7f0000000140)={0x44, 0x0, 0x0, 0x0, 0x0, {}, [@FOU_ATTR_AF={0xffffffffffffffb3}, @FOU_ATTR_IPPROTO, @FOU_ATTR_IFINDEX]}, 0x44}}, 0x0) 06:05:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_JOIN_OCB(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:05:15 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r0, 0x5451, 0x0) 06:05:15 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_SIOCSPGRP(r1, 0x8902, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 06:05:15 executing program 2: sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) syz_open_procfs(0xffffffffffffffff, 0x0) ioprio_set$pid(0x0, 0xffffffffffffffff, 0x0) 06:05:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "1a0000e2ffff0acaffffff0000e1fffffff300"}) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$TCSETA(r0, 0x5406, 0x0) 06:05:15 executing program 5: r0 = socket$nl_generic(0x2, 0x2, 0x88) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000180)={&(0x7f0000000680), 0x360, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x8}}, ["", "", "", "", "", "", "", ""]}, 0x24}}, 0x0) 06:05:15 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200000ee) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000140)={'syztnl1\x00', 0x0}) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:05:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_POOL_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x80c4) 06:05:15 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 06:05:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 06:05:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x4008000) 06:05:16 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname(r0, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000200)=0x80) dup3(r0, r1, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) 06:05:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) dup3(r0, r1, 0x0) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:05:16 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x0, 0x0) close(r0) socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 06:05:16 executing program 4: sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) syz_open_procfs$namespace(0x0, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 06:05:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4884) 06:05:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = eventfd(0x0) r2 = fcntl$dupfd(r0, 0x0, r1) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 06:05:17 executing program 1: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)=0x0) sched_setparam(r1, &(0x7f0000000300)) 06:05:17 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 06:05:17 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/net\x00') close(r0) socket$inet(0x10, 0x2, 0x0) sendmsg$NL80211_CMD_SET_MULTICAST_TO_UNICAST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 06:05:17 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) 06:05:17 executing program 1: r0 = inotify_init() close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000001880)={0x0, 0x0, &(0x7f0000001840)={0x0}}, 0x0) 06:05:17 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000500)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, 0x0) 06:05:17 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$CHAR_RAW_ZEROOUT(r2, 0x127f, 0x0) 06:05:17 executing program 2: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000180)={0x0, r2/1000+30000}, 0x10) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r3 = dup(r1) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 06:05:17 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$notify(r2, 0x402, 0x0) 06:05:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x200100c1, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000000240)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) sendmsg$NLBL_MGMT_C_VERSION(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) close(r0) r2 = gettid() socket$unix(0x1, 0x5, 0x0) tkill(r2, 0x1000000000016) 06:05:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0xc0) 06:05:17 executing program 0: r0 = socket(0x11, 0x3, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={0x0}}, 0x0) 06:05:17 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 06:05:17 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) dup2(r0, r1) getsockopt$inet_tcp_buf(r1, 0x6, 0xd, 0x0, &(0x7f0000000040)) 06:05:17 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$KDSKBSENT(r1, 0x5404, &(0x7f0000000000)={0x0, "00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e23f6800"}) 06:05:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='syscall\x00') close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 06:05:17 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "1a0000e2ffff0acaffffff1f80e1fffffff300"}) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, 0x0) 06:05:17 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsa\x00', 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6}]}, 0x10) 06:05:17 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x26e1, 0x0) close(r0) epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) 06:05:17 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 06:05:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x2000021c) sendmsg$unix(r1, &(0x7f0000000b80)={&(0x7f0000000100)=@abs, 0x6e, 0x0}, 0x20008000) r2 = dup(r1) sendmsg$NLBL_CALIPSO_C_LIST(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x4080) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 06:05:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/zero\x00', 0x0, 0x0) dup2(r0, r1) sendmsg$NL80211_CMD_SET_PMK(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 06:05:17 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) dup2(r1, r0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000000)) 06:05:17 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r0) sendmsg$NL80211_CMD_SET_BEACON(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 06:05:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003b40)=[{{&(0x7f0000002d80)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) write$P9_RUNLINKAT(r0, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r2, 0x5450, 0x0) 06:05:17 executing program 3: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='fd/3\x00') ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, 0x0) 06:05:17 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) syz_open_dev$vcsn(0x0, 0x0, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200000ee) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, 0x0, 0x101d0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x24, &(0x7f0000000400), 0x18) mmap(&(0x7f0000365000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:05:17 executing program 3: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyS3\x00', 0x6e8eba693f100952, 0x0) write$tun(r0, 0x0, 0x0) 06:05:17 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/user\x00') close(r0) socket$nl_route(0x10, 0x3, 0x0) write$vga_arbiter(r0, 0x0, 0x0) 06:05:17 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) close(r0) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000001c40), 0x4) 06:05:17 executing program 2: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$BLKRESETZONE(r0, 0x5450, 0x0) 06:05:17 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x14107e, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r1, r0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x9, &(0x7f0000000080)=@gcm_128={{}, "bb461aa2128cd61a", "ebbdfc3ff6500699cf78bd837ea7fe04", "94023100", "d53f28b7cb52c208"}, 0x28) 06:05:17 executing program 3: pipe(&(0x7f0000002480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$NS_GET_OWNER_UID(r0, 0xb704, 0x0) 06:05:17 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) ioctl$TCSETXW(r0, 0x5435, 0x0) 06:05:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x44000) 06:05:17 executing program 5: lsetxattr$trusted_overlay_origin(&(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0) 06:05:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000380)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132320) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x6, 0x0, 0x0) 06:05:17 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x200100c1, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) close(r0) r2 = gettid() r3 = socket$packet(0x11, 0x2, 0x300) r4 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r4, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) setsockopt$sock_int(r3, 0x1, 0x2b, &(0x7f0000000100)=0x20, 0x4) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) tkill(r2, 0x1000000000016) 06:05:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = creat(&(0x7f0000000ac0)='./file0\x00', 0x0) dup3(r0, r1, 0x0) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 06:05:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x85) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet_udplite(0x2, 0x2, 0x88) tkill(r1, 0x1000000000016) 06:05:18 executing program 3: r0 = socket(0xa, 0x3, 0x20) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x1c) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) 06:05:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) sendmsg$NL80211_CMD_SET_CHANNEL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x38}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) tkill(r1, 0x1000000000016) 06:05:18 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() sendmsg$NL80211_CMD_SET_NOACK_MAP(r1, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={0x0}}, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) tkill(r2, 0x1000000000016) 06:05:18 executing program 3: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup3(r1, r0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 06:05:18 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0x100000289) r1 = fcntl$dupfd(r0, 0x0, r0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r1, 0x5000943f, 0x0) 06:05:18 executing program 3: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) dup2(r1, r0) sendmsg(r0, &(0x7f0000005cc0)={0x0, 0x0, 0x0}, 0x0) 06:05:18 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) close(r0) socket(0x100000000011, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) 06:05:18 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000b00)='/dev/vcsa#\x00', 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x5451, 0x0) 06:05:18 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000033c0)='/dev/loop#\x00', 0x0, 0x0) fcntl$getflags(r0, 0x0) 06:05:18 executing program 2: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) close(r0) openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000180)=""/173, 0xad) 06:05:18 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000200)) 06:05:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x14) 06:05:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x0, 0x0) dup2(r0, r1) sendmsg$NL80211_CMD_SET_BEACON(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 06:05:19 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r0, &(0x7f0000000640)=[{{&(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) shutdown(r0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r2, &(0x7f0000000640)=[{{&(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) shutdown(r2, 0x0) dup2(r2, r3) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r1, 0x29, 0x37, 0x0, 0x0) 06:05:19 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r3 = dup2(r1, r0) write$P9_RVERSION(r3, 0x0, 0x0) close(r0) socket$unix(0x1, 0x1, 0x0) tkill(r2, 0x1000000000016) 06:05:19 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000002c0)=0x200, 0x2d3) connect$inet(r0, &(0x7f0000000780)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f0000000200)="96", 0x1, 0x0, 0x0, 0x0) recvfrom(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 06:05:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$TIOCMBIC(r0, 0x5417, 0x0) 06:05:19 executing program 2: r0 = socket(0x2, 0xa, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) 06:05:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000001fc0)='./file0\x00', 0x40, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x14, 0x0, 0x0) 06:05:19 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x6, 0x0) ioctl$FIBMAP(r0, 0x5421, &(0x7f0000000040)) 06:05:19 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) dup2(r0, r1) sendmsg$NL80211_CMD_DEL_TX_TS(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:05:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x2, 0x0, &(0x7f0000001900)) 06:05:19 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = accept$packet(r1, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f00000011c0)) 06:05:19 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$TCSETX(r1, 0x5409, 0x0) 06:05:19 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x5450) 06:05:19 executing program 1: mkdirat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x1ff) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) write$P9_RXATTRWALK(r0, 0x0, 0x0) 06:05:19 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 06:05:19 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r0, 0x0, 0x420000a77, 0x0) close(r1) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfffffd88) 06:05:19 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "1a0000e2ffff0acaffffff003cfefffffff300"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, 0x0) 06:05:19 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$NL80211_CMD_GET_MPATH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 06:05:19 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000180)) 06:05:19 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000100)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r0, 0x0) r1 = accept(r0, 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x5421, &(0x7f0000000300)) 06:05:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) fcntl$getown(r0, 0x9) 06:05:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) write$cgroup_freezer_state(r0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$unix(0x1, 0x2, 0x0) tkill(r1, 0x1000000000016) 06:05:19 executing program 1: r0 = open(&(0x7f00000009c0)='./file0\x00', 0x40440, 0x0) close(r0) socket(0x10, 0x3, 0x0) sendmsg$NLBL_CALIPSO_C_LIST(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:05:20 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x11, 0x0, 0x2c) 06:05:20 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x101005) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) tkill(r1, 0x401004000000016) 06:05:20 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='ppp1@.$mime_type-\x00', 0x0) write$char_usb(r0, 0x0, 0x0) 06:05:20 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x803fffff, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r0, 0x5451, 0x0) 06:05:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 06:05:20 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x241, 0x10) 06:05:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, "1a0000e2ffff0acaffffff0000e1fffffff300"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x22) r3 = socket(0x2, 0xa, 0x0) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$BTRFS_IOC_BALANCE(0xffffffffffffffff, 0x8906, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(0xffffffffffffffff, 0x8982, 0x0) 06:05:20 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x61) read(r0, &(0x7f0000000140)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_FIOGETOWN(r1, 0x8903, 0x0) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f00000001c0)) 06:05:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000002380)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, 0x0, 0x0, 0x0, 0x190}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000002600)={0x0, 0x0, &(0x7f00000025c0)={&(0x7f0000002580)={0x1c, 0x0, 0x70d}, 0x1c}}, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x5452, &(0x7f0000000000)={0xfdfdffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x0, @loopback}, {0x2, 0x0, @broadcast}}) 06:05:20 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) 06:05:20 executing program 5: creat(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = open(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) dup2(r0, r1) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0xf, &(0x7f0000000300)={'filter\x00', 0x4}, 0x68) 06:05:20 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) close(r0) creat(&(0x7f0000002140)='./file0\x00', 0x0) pwritev(r0, 0x0, 0x0, 0x0, 0x0) 06:05:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) getpeername(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000080)=0x80) vmsplice(r1, &(0x7f0000000500)=[{0x0}], 0x1, 0x2) [ 331.600858] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 331.639526] audit: type=1804 audit(1604297120.865:13): pid=29617 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name=2F726F6F742F73797A6B616C6C65722D746573746469723430383237393732362F73797A6B616C6C65722E36616C5871732F313035362FE91F7189591E9233614B dev="sda1" ino=16945 res=1 [ 331.677211] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 331.720330] audit: type=1804 audit(1604297120.865:14): pid=29622 uid=0 auid=0 ses=4 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name=2F726F6F742F73797A6B616C6C65722D746573746469723430383237393732362F73797A6B616C6C65722E36616C5871732F313035362FE91F7189591E9233614B dev="sda1" ino=16945 res=1 06:05:21 executing program 1: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)) 06:05:21 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = ioctl$NS_GET_PARENT(r0, 0x5421, 0x748000) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x5450) 06:05:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000100)={0x77359400}, 0x10) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = dup2(r0, r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$WG_CMD_GET_DEVICE(r2, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={0x0}}, 0x0) tkill(r1, 0x1000000000016) 06:05:21 executing program 5: r0 = memfd_create(&(0x7f00000000c0)='\xc0\x87:*\x18\xc1k\xa7\x87[\xa0o8\xaaK\xa5\xd3\v\x86\xca<\x7f\xfd6\x8d}\xd8\xf2G\xb8\xea\x93aG\xd4\xfd\x1eB\xdc`b\xce\xbbHe)\x90\x86\xe3\x96\b\xe0\xfa\xb1\xd8N\xb2W\xcb\x8d}3lm8\xa57\xc9\x00HOA\xc8mCR\xfc\xcb$u3\xec\xde%\xd0]\xd8\xebD\x82S\x17?\xd6As\xe3\xb1\x9aF\xe6\xba[\xc7%\x88 \xeeQR\x9f\x81\x8b\xdc\xc7\xdc\xdem\xbe\x7f2\x11)\xfb\xe0\tm\x17\xd8\xda@4\xbdj*T\x1e^\xf7o\xee\xdf\r\xb8w\x1d\xe7_\xde\x87\xdd\xc1\xf0\x91\x1a!\x9c\xd3\v\xc9\x95d\xe3*\xa9\xfa\x99\x9d\xb8\x89>\xc9\xf2\x16\x13{\x1aRo:\x16\x00+$\xedX\xb7KVqU\x18\xe2k\xbd\x0eV\x16\x14g\x1b\xb0\xcf\x93', 0x0) write(r0, &(0x7f0000000000)='/', 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x4000000000000011, r0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000780)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) 06:05:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x3da8000, 0x0) dup2(r0, r1) sendmsg$NL80211_CMD_SET_MPATH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 06:05:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) close(r0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r4, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) setsockopt$sock_int(r3, 0x1, 0x2b, &(0x7f0000000100)=0x10, 0x4) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) tkill(r2, 0x1000000000016) 06:05:21 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 06:05:21 executing program 5: r0 = timerfd_create(0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 06:05:21 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001240)='/dev/autofs\x00', 0x0, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x4400100000001, 0xfa) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) 06:05:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = accept$inet(r2, 0x0, 0x0) dup2(r0, r3) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f00000001c0)) 06:05:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000003740)) 06:05:21 executing program 2: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = dup(r0) symlinkat(&(0x7f0000000280)='./file0\x00', r0, &(0x7f00000002c0)='./file0\x00') r2 = dup(r1) readlinkat(r2, &(0x7f0000001840)='./file0\x00', &(0x7f0000001880)=""/4096, 0x1000) 06:05:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[], 0x208}}, 0x48000) 06:05:21 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$SOCK_DESTROY(r0, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={0x0}}, 0x0) 06:05:22 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000005c00)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x0, 0x0, 0x0) 06:05:22 executing program 5: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8020003) write$P9_RSYMLINK(r0, 0x0, 0x0) 06:05:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={0x0, 0xffffffffffffff7a}}, 0x0) 06:05:22 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r0, &(0x7f0000002500), 0x0, 0x40041) 06:05:22 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000000c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) r2 = accept4$unix(r1, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) fcntl$setownex(r2, 0xf, &(0x7f0000000040)) 06:05:22 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup2(r1, r0) r3 = accept$inet(r2, 0x0, 0x0) setsockopt$sock_cred(r3, 0x1, 0x28, &(0x7f0000000040), 0xc) 06:05:22 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) dup2(r0, r1) write$P9_RLERROR(r1, 0x0, 0x0) 06:05:22 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x0, 0x0) dup2(r0, r1) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 06:05:22 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f00000025c0)={0x0, 0x0, &(0x7f0000002580)={0x0}}, 0x0) 06:05:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x5451, 0x0) 06:05:22 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0xe, 0x0, &(0x7f0000000080)) 06:05:22 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000005d00)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r0, 0x0, 0x0) 06:05:22 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180)={0x0, 0xea60}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = dup(r0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={0x0}}, 0x20000010) 06:05:22 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) chroot(&(0x7f0000000480)='./file0\x00') capset(&(0x7f00002d0ff8)={0x19980330}, &(0x7f0000000000)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) 06:05:22 executing program 4: r0 = socket(0xa, 0x3, 0x7) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000240)={&(0x7f0000000000), 0x36, &(0x7f0000000200)={0x0}}, 0x0) 06:05:22 executing program 3: r0 = epoll_create(0x2) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 06:05:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8982, &(0x7f0000000000)={0x6, 'veth0_to_team\x00'}) 06:05:22 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$CHAR_RAW_ROSET(r0, 0x125d, 0x0) 06:05:22 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = accept$packet(r1, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 06:05:22 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, 0x0, 0x0) 06:05:22 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 06:05:22 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000380)) 06:05:22 executing program 3: pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$9p(r0, &(0x7f0000000080)="47244e7156aedbc8081b67f25377ea1ec0d1c344a0d86693934008da23844f9684fa8562a7784f63280dae1be0b4d885bd5e5ff28ec46ba13ebeb9caac14a3766939cf42edd1cc44e6456e9acd687f95b415aac5670c966724bf9ccbb90816956d2b8b0c19aa93642e97f740d9a0db8730c155c0a7f6cfa8d490dee92af89d", 0xfffffe91) 06:05:22 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = accept$packet(r1, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_SET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 06:05:22 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff}) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCGETX(r0, 0x5425, 0x0) 06:05:22 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180)={0x0, 0xea60}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = dup(r0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r1, &(0x7f0000000a80)={&(0x7f0000000940), 0xc, &(0x7f0000000a40)={0x0}}, 0x20000000) 06:05:22 executing program 5: r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/hwrng\x00', 0x0, 0x0) dup3(r0, r1, 0x0) mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0x0) renameat(r1, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') 06:05:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002740)={0x0}}, 0x40000) 06:05:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000003140)=[{{&(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10, 0x0}}], 0x1, 0x34044040) r1 = dup(r0) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x7c}}, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r1, &(0x7f0000000480)={&(0x7f0000000300), 0xc, &(0x7f0000000440)={0x0}}, 0x20004800) 06:05:22 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) dup3(r0, r1, 0x0) getsockopt$IP_SET_OP_GET_BYNAME(r1, 0x1, 0x1a, 0x0, &(0x7f0000000080)) 06:05:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[], 0xb4}}, 0x20000000) 06:05:22 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180)={0x0, 0xea60}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = dup(r0) syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000380)={&(0x7f0000000100), 0xc, &(0x7f0000000340)={0x0}}, 0x24000004) 06:05:22 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = accept$packet(r1, 0x0, 0x0) write$P9_RVERSION(r2, 0x0, 0x0) 06:05:22 executing program 1: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x5452, &(0x7f0000000040)) 06:05:23 executing program 3: syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') 06:05:23 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$NL80211_CMD_GET_STATION(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 06:05:23 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close(r0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) setsockopt$sock_int(r1, 0x1, 0x2b, &(0x7f0000000100)=0x20, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) 06:05:23 executing program 0: pipe(0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SCROLLCONSOLE(0xffffffffffffffff, 0x541c, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000000)=""/43) ioctl$int_in(r0, 0x4b66, &(0x7f0000000040)) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) ioctl$VT_RESIZE(r1, 0x5451, 0x0) 06:05:23 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000400)='/dev/hwrng\x00', 0x0, 0x0) close(r0) r1 = socket$inet6(0xa, 0x20000000000001, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x3d, &(0x7f0000000640)={{{@in=@loopback, @in6=@dev}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000380)=0xe8) 06:05:23 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) dup2(r0, r1) sendmsg$NLBL_MGMT_C_REMOVEDEF(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 06:05:23 executing program 0: sched_setscheduler(0x0, 0x5, &(0x7f0000000000)) r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/exec\x00', 0x2, 0x0) fcntl$setflags(r0, 0x2, 0x0) 06:05:23 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 06:05:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000000300)={&(0x7f0000000080), 0xc, &(0x7f0000000240)={0x0}}, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x3938700}}, 0x0) close(r0) socket$unix(0x1, 0x1, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) tkill(r2, 0x1000000000016) 06:05:23 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 06:05:23 executing program 3: sched_setscheduler(0x0, 0x5, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) shmat(0x0, &(0x7f0000ffa000/0x4000)=nil, 0x0) 06:05:23 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x6, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x5450, 0x0) 06:05:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_DEL(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0xc0) 06:05:23 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$KDFONTOP_COPY(r1, 0x540b, 0x0) 06:05:23 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r0, 0x5450, 0x0) 06:05:23 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(r0, 0x5450, 0x0) 06:05:24 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000000c0), 0x1c) write$P9_RLCREATE(r0, &(0x7f0000000400)={0x18}, 0x18) 06:05:24 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) 06:05:24 executing program 2: r0 = inotify_init() ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r0, 0x2, &(0x7f00000000c0)) 06:05:24 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TCGETS2(r1, 0x802c542a, &(0x7f0000000180)) 06:05:24 executing program 0: r0 = open(&(0x7f0000000180)='./file0\x00', 0x442, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) 06:05:24 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000013c0)={&(0x7f0000000040)={0xa, 0x2, 0x0, @ipv4={[], [], @dev}}, 0x1c, 0x0}, 0x0) 06:05:24 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x40) 06:05:24 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) dup2(r1, r0) ioctl$TIOCSRS485(r0, 0x540a, 0x0) 06:05:24 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000000)) 06:05:24 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) close(r0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) setsockopt$sock_int(r1, 0x1, 0x2b, &(0x7f0000000100)=0x20, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$NL80211_CMD_FLUSH_PMKSA(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:05:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = socket$inet6(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)={0x28, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000540)={@multicast1, @private=0xa010102}, 0xc) 06:05:24 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = dup2(r0, r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$TIPC_CMD_GET_NODES(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) close(r0) socket$inet6(0xa, 0x2, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, 0x0, 0x0) tkill(r1, 0x1000000000016) 06:05:24 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x5608, &(0x7f0000000000)) 06:05:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0xd, &(0x7f0000000000)="7662c7c855106fd936417f7dd319d307", 0x10) 06:05:24 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200000ee) sendmsg$NL80211_CMD_SET_QOS_MAP(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 06:05:24 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000f40)='/dev/ubi_ctrl\x00', 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_SET_COALESCE(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) [ 335.215835] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 335.254035] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 06:05:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6}]}, 0x10) r1 = dup(r0) sendmmsg$inet(r0, &(0x7f0000004200)=[{{&(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000008340)=ANY=[], 0x1f0}}], 0x1, 0x20008055) sendmsg$DEVLINK_CMD_PORT_SPLIT(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 06:05:24 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, 0x0, &(0x7f0000000080)) 06:05:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x804) 06:05:24 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x5451) 06:05:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x0, 0x0, 0x0) 06:05:24 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x0) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0xd, 0x0, 0x0) 06:05:24 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x5451, 0x0) 06:05:24 executing program 1: openat$urandom(0xffffffffffffff9c, 0x0, 0x408000, 0x0) 06:05:24 executing program 0: r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) fcntl$setlease(r0, 0x400, 0x1) 06:05:24 executing program 5: socketpair(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) recvmmsg(r1, &(0x7f00000090c0)=[{{&(0x7f00000050c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) fstat(r2, &(0x7f0000000040)) 06:05:26 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket(0xa, 0x80002, 0x0) r2 = dup2(r0, r1) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000000)={r4, 0x1, 0x6, @local}, 0x10) 06:05:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:05:26 executing program 2: pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 06:05:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 06:05:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r2 = dup2(r0, r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f00000000c0)={0x0, 0x3a, &(0x7f0000001bc0)={0x0, 0xfffffdef}}, 0x0) close(r0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r4, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000003480)=0xc) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @remote}, 0x14) tkill(r1, 0x1000000000016) 06:05:26 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$SO_TIMESTAMP(r1, 0x29, 0x23, 0x0, 0x0) 06:05:26 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_pktinfo(r0, 0x6, 0xd, &(0x7f0000000140)={0x0, @loopback, @remote}, 0xc) [ 337.171899] device lo entered promiscuous mode 06:05:26 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = accept$packet(r1, 0x0, 0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000040)) 06:05:26 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGREP(r1, 0x80084503, 0x0) 06:05:26 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x5451, 0x0) [ 337.197645] device lo left promiscuous mode [ 337.207755] device dummy0 entered promiscuous mode [ 337.212872] device dummy0 left promiscuous mode 06:05:26 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$BTRFS_IOC_SNAP_CREATE(r0, 0x5451, 0x0) 06:05:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$setstatus(r0, 0x4, 0x2000) 06:05:26 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) r2 = accept4$unix(r1, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 06:05:26 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, 0x0) 06:05:26 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x101042) write$P9_RGETATTR(r0, 0x0, 0x0) 06:05:26 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_STATUS(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 06:05:26 executing program 5: shmat(0x0, &(0x7f0000fff000/0x1000)=nil, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000240)=[{0x0, 0x24, 0x0}], 0x492492492492730, 0x0) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x4a) 06:05:26 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) 06:05:26 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) ioctl$TIOCGRS485(r0, 0x542e, 0x0) 06:05:26 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/user\x00') close(r0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCREVOKE(r1, 0x40044591, 0x0) write$P9_RFSYNC(r0, 0x0, 0x0) 06:05:26 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7e, 0x0) close(r0) epoll_create1(0x0) epoll_wait(r0, &(0x7f0000005f00)=[{}], 0x1, 0x0) 06:05:26 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x1, 0x0) close(r0) socket(0x10, 0x2, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_UPDATE_FT_IES(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$NL80211_CMD_SET_PMKSA(0xffffffffffffffff, 0x0, 0x0) 06:05:26 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x2, 0x0) write$P9_RFSYNC(r0, 0x0, 0x0) 06:05:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/11, 0x158) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) ioctl$VT_SETMODE(r0, 0x5602, 0x0) 06:05:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) write$P9_RREADLINK(r1, 0x0, 0x0) 06:05:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) 06:05:26 executing program 2: syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000680)='fd/3\x00') ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000000)=""/17) 06:05:26 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/loop-control\x00', 0x0, 0x0) close(r0) memfd_create(&(0x7f0000000040)='.\x00', 0x0) write$P9_RLERRORu(r0, 0x0, 0x0) 06:05:27 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = dup2(r0, r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) close(r1) r2 = gettid() tkill(r2, 0x1000000000016) 06:05:27 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 06:05:27 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000380)='/dev/input/event#\x00', 0x6, 0x0) fdatasync(r0) 06:05:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup3(r0, r1, 0x0) sendmsg$NLBL_CIPSOV4_C_REMOVE(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 06:05:27 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000380)='/dev/vcsa#\x00', 0x6, 0x0) ioctl$BLKBSZGET(r0, 0x5451, 0x0) 06:05:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010002, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = dup2(r0, r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) close(r0) socket$unix(0x1, 0x1, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 06:05:27 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='memory.high\x00', 0x2, 0x0) write$P9_RVERSION(r0, 0x0, 0x1) 06:05:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000000980)={&(0x7f0000000500)=@in={0x2, 0x4e23, @remote}, 0x80, 0x0}, 0xc000) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 06:05:27 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) close(r0) socket$unix(0x1, 0x800000000002, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) 06:05:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = inotify_init() dup2(r0, r1) sendmsg$ETHTOOL_MSG_RINGS_GET(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 06:05:27 executing program 4: r0 = signalfd(0xffffffffffffffff, &(0x7f00000000c0), 0x8) close(r0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, &(0x7f0000000700)) 06:05:27 executing program 2: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$BTRFS_IOC_INO_PATHS(r0, 0x5450, 0x0) 06:05:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) socket$netlink(0x10, 0x3, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 06:05:27 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) dup2(r1, r0) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 06:05:27 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000003140)='/dev/null\x00', 0x800, 0x0) 06:05:27 executing program 1: r0 = socket(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000084, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r2 = memfd_create(&(0x7f0000000280)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\xa2Ey\xdb\xd1\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xde\xc5\xe96\xddUE\xc98M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\x00\xa5\xc24\xd6\xfe7\x0f', 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x11, r2, 0x0) tkill(r1, 0x1000000000016) 06:05:27 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) r1 = ioctl$NS_GET_PARENT(r0, 0x5421, 0x748000) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0x5450, 0x0) 06:05:27 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) dup3(r1, r0, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x488c0) 06:05:27 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) r1 = ioctl$NS_GET_PARENT(r0, 0x5421, 0x748000) ioctl$FICLONE(r1, 0x5451, 0xffffffffffffffff) 06:05:27 executing program 5: r0 = inotify_init() close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) 06:05:27 executing program 3: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/exec\x00', 0x2, 0x0) close(r0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000001840)) 06:05:27 executing program 4: r0 = eventfd(0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) dup3(r1, r0, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f00000018c0)={0x0, "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"}) 06:05:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x8913, &(0x7f0000000340)={'sit0\x00', 0x0}) 06:05:27 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10041, 0x21) 06:05:27 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x321, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3", 0x1, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = gettid() recvmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)=""/199, 0xc7}], 0x1}}], 0x264642f, 0x0, 0x0) tkill(r1, 0x14) r2 = fcntl$dupfd(r0, 0x0, r0) sendmsg$NL80211_CMD_GET_POWER_SAVE(r2, &(0x7f00000004c0)={&(0x7f0000000200), 0xc, &(0x7f0000000480)={0x0}}, 0x0) 06:05:27 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x141201, 0x0) r1 = dup(r0) write$P9_RLOCK(r1, 0x0, 0x0) 06:05:27 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "00002100e6250100ff00"}) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) getrandom(&(0x7f0000001ac0)=""/4096, 0x1000, 0x0) ioctl$TIOCMGET(r1, 0x5415, 0x0) 06:05:27 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000000)='./file0\x00', 0x40, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$FICLONE(r1, 0x5451, r2) 06:05:27 executing program 4: r0 = socket(0xa, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x8, 0xfffffffffffffffe, &(0x7f0000000100)) 06:05:27 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = fcntl$dupfd(r0, 0x0, r0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r2 = gettid() ioctl$KDSKBMETA(r1, 0x4b63, 0x0) tkill(r2, 0x1000000000016) 06:05:27 executing program 3: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getresuid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f00000002c0)) chown(&(0x7f0000000200)='./file0\x00', r0, 0x0) 06:05:27 executing program 1: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) close(r0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 06:05:27 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = dup(r0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x4000) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)}, 0x20000000) 06:05:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup(r0) ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x2) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) 06:05:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={0x0, 0x50}}, 0x1) close(r1) socket$inet6(0xa, 0x3, 0x8) r2 = gettid() tkill(r2, 0x1000000000016) 06:05:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) sendmsg$NL80211_CMD_SET_CQM(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) 06:05:28 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsa\x00', 0x0, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) fgetxattr(r0, &(0x7f0000000000)=@known='system.sockprotoname\x00', 0x0, 0x0) 06:05:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000009c0)=ANY=[], 0x1f4}}, 0x20008010) 06:05:28 executing program 1: r0 = socket(0xa, 0x803, 0x1) setsockopt$inet_udp_encap(r0, 0x29, 0x22, 0x0, 0x0) 06:05:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) ioctl$NS_GET_OWNER_UID(r1, 0xb704, 0x0) 06:05:28 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) fsetxattr$trusted_overlay_opaque(r0, 0x0, 0x0, 0x0, 0x0) 06:05:29 executing program 0: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_CHANGE_NAN_CONFIG(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 06:05:29 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x4000811, r0, 0x0) 06:05:29 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = dup(r0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x39}) 06:05:29 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x26e1, 0x0) close(r0) socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x7, &(0x7f0000000000), 0x4) 06:05:29 executing program 4: sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) 06:05:29 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 06:05:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/if_inet6\x00') dup3(r0, r1, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 06:05:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) sendmsg$NL80211_CMD_REGISTER_FRAME(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) close(r0) socket$packet(0x11, 0x2, 0x300) tkill(r2, 0x1000000000016) 06:05:29 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = ioctl$TUNGETDEVNETNS(r0, 0x5450, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getpeername(r2, &(0x7f0000000540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f00000005c0)=0x80) dup2(r2, r3) sendmsg$DEVLINK_CMD_RELOAD(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x0) 06:05:29 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) flock(r0, 0x6) 06:05:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000140)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) sendmsg$NL80211_CMD_SET_CQM(r1, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={0x0, 0x240}}, 0x20000000) 06:05:29 executing program 1: socket$nl_route(0x10, 0x3, 0x0) pipe2(&(0x7f0000000000), 0x0) pipe2(&(0x7f0000000000), 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r0, 0x8983, &(0x7f0000000000)) 06:05:29 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r0) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x0) 06:05:29 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) 06:05:29 executing program 1: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2a6781, 0x0) 06:05:29 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x1) 06:05:29 executing program 4: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x3fa2b94c5818a977, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 06:05:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1f1441, 0x0) write$eventfd(r0, 0x0, 0x0) 06:05:29 executing program 2: r0 = socket(0x10, 0x2, 0x2) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 06:05:29 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/icmp\x00') r1 = socket$netlink(0x10, 0x3, 0x0) dup2(r1, r0) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:05:29 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x46) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect$unix(r1, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept$inet6(r0, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r2, 0x5421, &(0x7f0000000140)) 06:05:29 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='auxv\x00') close(r0) epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}], 0x1, 0x0, 0x0, 0x0) 06:05:29 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) r1 = signalfd4(r0, &(0x7f0000000040), 0x8, 0x0) close(r1) socket$nl_sock_diag(0x10, 0x3, 0x4) write$P9_RRENAME(r0, 0x0, 0x0) 06:05:29 executing program 2: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0xa0000, 0x0) 06:05:29 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000002c0)=0x200, 0x4) connect$inet(r0, &(0x7f0000000780)={0x2, 0x4e23}, 0x10) write$P9_RCLUNK(r1, &(0x7f0000000140)={0x7}, 0x7) recvfrom(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 06:05:29 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) 06:05:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={0x0}}, 0x4) 06:05:29 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) close(r0) socket(0x10, 0x2, 0x0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={0x0}}, 0x0) 06:05:29 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001300)='/dev/full\x00', 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCREVOKE(r1, 0x40044591, 0x0) r2 = dup3(r1, r0, 0x0) write$P9_RMKDIR(r2, 0x0, 0x0) 06:05:29 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x321, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000280)='G', 0x1, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000040)={0x0, 0x7530}, 0x10) r1 = gettid() recvmmsg(r0, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/199, 0xc7}], 0x1}}], 0x40003a0, 0x0, 0x0) tkill(r1, 0x14) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 06:05:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$unix(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x40000001) tkill(r2, 0x1000000000016) 06:05:29 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f00000000c0)) 06:05:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x200000ee) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000001680)='/dev/net/tun\x00', 0x0, 0x0) r4 = dup2(r3, r0) ioctl$TIOCSTI(r4, 0x5412, 0x0) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:05:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x4008010) 06:05:29 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x400c000, &(0x7f0000000300)={0x2, 0x4e20}, 0x10) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 06:05:29 executing program 2: r0 = socket$inet(0x2, 0x801, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000002c0)=0x200, 0x4) connect$inet(r0, &(0x7f0000000780)={0x2, 0x4e23}, 0x10) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[], 0x1) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2140) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 06:05:29 executing program 4: sched_setscheduler(0x0, 0x0, &(0x7f0000000180)) syz_open_procfs$namespace(0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x4e23, 0x40, @loopback, 0x3}}, 0x0, 0x0, 0x16, 0x0, "6c035fd65bf5135851ce3cf07bbcd20a5a38ae4ab177a23a116ac31e641c2942c3faf9f7637bf58d4d3288baa26cdb616d39c89738235d8a52160ed521c4544b88519ad27f3d5bb8f3072f6325fcf14f"}, 0xd8) 06:05:29 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) ioctl$BTRFS_IOC_SNAP_DESTROY(r0, 0x5000940f, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 06:05:29 executing program 4: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000000)='NLBL_MGMT\x00') r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r2 = shmget$private(0x0, 0x1000, 0x30, &(0x7f0000ffd000/0x1000)=nil) r3 = geteuid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) newfstatat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) getgroups(0x5, &(0x7f0000000500)=[0x0, 0xffffffffffffffff, 0x0, 0xee00, 0xee01]) semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000540)={{0x3, r3, r4, r5, r6, 0x100, 0x7}, 0x1, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x8}) ioprio_set$uid(0x0, r3, 0x10000) dup2(r1, r0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000380)) 06:05:29 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "1aff0000e1fffffff300"}) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r1, 0xf501, 0x0) 06:05:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 06:05:29 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) dup2(r1, r0) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 06:05:29 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, @nfc, @llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, @ax25={0x3, @default}}) 06:05:30 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_proto_private(r0, 0x2, &(0x7f0000000140)) 06:05:30 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x5450, 0x0) 06:05:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000780)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:05:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 06:05:30 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x5451, 0x0) 06:05:30 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r1 = epoll_create(0x7) r2 = dup3(r0, r1, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, 0x0) 06:05:30 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0x5450, 0x0) 06:05:30 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)='sysfs\x00', 0x1, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fsetxattr$security_evm(r0, 0x0, 0x0, 0x0, 0x0) 06:05:30 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup3(r0, r1, 0x0) write$binfmt_misc(r1, 0x0, 0x0) 06:05:30 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000001340), 0x4) [ 340.892239] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 340.926672] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 06:05:30 executing program 0: r0 = eventfd2(0x0, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 06:05:30 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x321, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3", 0x1, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = gettid() recvmmsg(r0, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/199, 0xc7}], 0x1, 0x0, 0xffffff7f}}], 0x40003a0, 0x0, 0x0) tkill(r1, 0x14) r2 = fcntl$dupfd(r0, 0x0, r0) write$cgroup_devices(r2, 0x0, 0x0) 06:05:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 06:05:30 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x20010) 06:05:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20050001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x2c851) 06:05:30 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$EXT4_IOC_MIGRATE(r0, 0x5450) 06:05:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ttyS3\x00', 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 06:05:30 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x181282) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 06:05:30 executing program 2: r0 = socket(0x2, 0xa, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f00000001c0)) 06:05:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x349, 0x20010080, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$NL80211_CMD_GET_KEY(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x8901) close(r0) socket$nl_crypto(0x10, 0x3, 0x15) r2 = gettid() tkill(r2, 0x1000000000016) 06:05:30 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKGETSIZE64(r0, 0x1264, 0x0) 06:05:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001a40)='cgroup.controllers\x00', 0x26e1, 0x0) close(r0) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x600, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/188, 0xbc}], 0x2, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000001980)='/dev/null\x00', 0x400080, 0x0) 06:05:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x4) 06:05:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) r2 = dup(r1) write$apparmor_current(r2, 0x0, 0x0) 06:05:31 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) dup2(r0, r1) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000040)=""/232) 06:05:31 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_percpu_user\x00', 0x275a, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) dup3(r1, r0, 0x0) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 06:05:31 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') openat$cgroup_int(r0, &(0x7f0000000080), 0x2, 0x0) 06:05:31 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) dup3(r0, r1, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x1d, &(0x7f0000000000), 0x4) 06:05:31 executing program 3: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x0) 06:05:31 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x6000}, 0x0) 06:05:31 executing program 5: ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000080)={0x0, 'sit0\x00', {0xfffffffe}}) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r2, 0x8983, &(0x7f0000000080)) 06:05:31 executing program 0: r0 = eventfd(0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:05:31 executing program 2: r0 = socket$inet(0x2, 0x3, 0x20) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, 0x0, 0x0) 06:05:31 executing program 1: signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') 06:05:31 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$EVIOCGBITKEY(r0, 0x80404521, 0x0) 06:05:31 executing program 3: timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000440)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, r0+10000000}}, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x13, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r2 = memfd_create(&(0x7f0000000340)='\x97&\x89\\\xd0\xe7\xca\x16ZO\x948\xe1\x01\xe5`iq@Nse;\xa8Fpj\x0e\x04!\xd5\xc5YBz\x94\xaf$\x89\x00\x00\xc2G\x86Xe\xf1/V\x8cvS\xa6K&u\x9dX\xcc\r\x12\x11\x99\xe7\xce\xaeA\xb8-E\xa1\xf8\xe4~IS\xc1\x04\xf78\xf1\'\xdfv\x90\xbc\xd1\xda\x88\xf0\x1e\r\xd5\x03\xf3\xaf\xfd\xf4&a?\xcaG\n\xe5j%\xa5\xcc\xa6\x86\xb2\xdeY\x17yX\x01_\x7f\xf4tW.\x81\n\xf3\v\x8d\x12pa\x91\x9b\x8cxd\x06\xa7k\n\x86\xc3\xb6\x910\xf2L\xf0\xaf\xe1jd\xda\x1f\x8bVrd\xa4\xb34\xfcUj\x1ad:#\x96\xf9\xd7\x1c]ImZlU\".\x18)\xcf\x1am\xdc\xd7\x8e\xe0\xa3\x82\xec\x9b\xfb\xc9\x81\x9c\xdc\xb7\x0f\xdd\xd3\xd7\xbe\x89\x7f3\x1d\x1c@\x8eu\x85\xcew\x89\x95&3FX\xb1\xaf\xa6\x96\xa2\x13\x1f-\b\xcf\x00'/246, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) execveat(r2, &(0x7f0000000240)='\x00', 0x0, 0x0, 0x1000) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) 06:05:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x4000001) close(r0) socket$inet6(0xa, 0x3, 0x400) tkill(r2, 0x1000000000016) 06:05:31 executing program 0: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x5450, 0x0) 06:05:31 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup2(r0, r1) ioctl$TUNATTACHFILTER(r2, 0x401054d5, 0x0) 06:05:31 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 06:05:31 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$BLKBSZGET(r1, 0x80081270, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 06:05:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x50) 06:05:31 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$nl_crypto(0x10, 0x3, 0x15) dup2(r1, r0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) 06:05:31 executing program 4: r0 = timerfd_create(0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'lo\x00'}) 06:05:31 executing program 2: syz_genetlink_get_family_id$net_dm(&(0x7f0000005c80)='NET_DM\x00') 06:05:31 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_TDLS_MGMT(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={0x0}}, 0x0) 06:05:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x19) dup2(r1, r0) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_SET_WDS_PEER(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) [ 342.459415] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 342.489774] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 06:05:32 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) dup2(r0, r1) syz_open_pts(r1, 0x0) 06:05:32 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r0, 0x0, 0x0, 0x0, 0x0) 06:05:32 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4}, 0x1c) write$P9_RLOPEN(r1, &(0x7f0000000080)={0x18}, 0x18) 06:05:32 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000040)) 06:05:32 executing program 1: r0 = open$dir(&(0x7f00000003c0)='./file1\x00', 0x2140, 0x0) fsync(r0) 06:05:32 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x181282) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = dup(r0) ioctl$BLKROGET(r1, 0x125e, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 06:05:32 executing program 2: pipe(&(0x7f00000039c0)={0xffffffffffffffff}) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, 0x0) 06:05:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) write$P9_RSTATu(r0, 0x0, 0x0) 06:05:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xffffffffffffffca, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup(r0) sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 06:05:32 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xc}}}, 0x1c) r1 = dup(r0) write$eventfd(r1, &(0x7f0000001140), 0x8) 06:05:32 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$KDGETKEYCODE(r1, 0x5450, 0x0) 06:05:32 executing program 5: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = dup2(r0, r1) sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) setsockopt$inet_udp_int(r2, 0x11, 0x0, 0x0, 0x0) 06:05:32 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) r2 = dup2(r1, r1) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x3d, 0x0) write$evdev(r2, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) dup2(r3, r1) tkill(r0, 0x1000000000016) 06:05:32 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r0, 0x0) setsockopt(r0, 0x0, 0x1, 0x0, 0x0) 06:05:32 executing program 3: sendmsg$NL80211_CMD_SET_POWER_SAVE(0xffffffffffffffff, 0x0, 0x9c03b17fdfe985b) 06:05:32 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000001400)='/proc/thread-self/attr/current\x00', 0x2, 0x0) close(r0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000002680)) 06:05:32 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) r2 = signalfd(r1, &(0x7f0000000000), 0x8) dup2(r0, r2) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 06:05:32 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40) 06:05:32 executing program 5: splice(0xffffffffffffffff, 0xfffffffffffffffd, 0xffffffffffffff9c, 0x0, 0x0, 0x8) 06:05:32 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ttyS3\x00', 0x0, 0x0) dup2(r0, r1) pread64(r1, 0x0, 0x0, 0x0) 06:05:33 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x5, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={0x0}}, 0x0) 06:05:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000780)='/dev/vcsa\x00', 0x0, 0x0) dup2(r0, r1) sendmsg$DEVLINK_CMD_TRAP_POLICER_SET(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 06:05:33 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) 06:05:33 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) close(r0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 06:05:33 executing program 0: sched_setscheduler(0x0, 0x5, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) 06:05:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = dup2(r0, r0) sendmsg$NL80211_CMD_SET_WIPHY(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$nl_crypto(0x10, 0x3, 0x15) tkill(r1, 0x1000000000016) 06:05:33 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsa\x00', 0x0, 0x0) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) 06:05:33 executing program 4: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x66, 0x0, &(0x7f0000000800)) 06:05:33 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$NL80211_CMD_GET_COALESCE(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={0x0}}, 0x0) 06:05:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000180)={{0x2, 0x0, @remote}, {0x0, @multicast}, 0x0, {0x2, 0x0, @multicast2}, 'lo\x00'}) 06:05:33 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x88d01, 0x0) write$binfmt_misc(r0, 0x0, 0x63) 06:05:33 executing program 3: socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$packet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x40) write(r0, 0x0, 0x0) 06:05:33 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCL_BLANKSCREEN(r1, 0x540b, 0x0) 06:05:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') dup2(r0, r1) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000001240)={@mcast1, 0x0, 0x0, 0x0, 0x8}, &(0x7f0000001280)=0x20) 06:05:33 executing program 4: msgget$private(0x0, 0x1) 06:05:33 executing program 2: r0 = socket(0xa, 0x1, 0x0) sendmsg$inet6(r0, &(0x7f0000002a40)={&(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c, 0x0}, 0x20000068) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x40) 06:05:33 executing program 0: sched_setscheduler(0x0, 0x5, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) 06:05:33 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x321, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000280)='G', 0x1, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = gettid() recvmmsg(r0, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/199, 0xc7}], 0x1}}], 0x40003a0, 0x0, 0x0) tkill(r1, 0x14) r2 = fcntl$dupfd(r0, 0x0, r0) sendmsg$NL80211_CMD_TDLS_OPER(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 06:05:33 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ubi_ctrl\x00', 0x0, 0x0) dup2(r0, r1) sendto$packet(r1, 0x0, 0x0, 0x4000080, 0x0, 0x1e) 06:05:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) dup2(r0, r1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x48, &(0x7f0000000000)={@loopback}, 0x20) 06:05:33 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = dup2(r0, r0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000)={0x77359400}, 0x10) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) tkill(r1, 0x1000000000016) 06:05:33 executing program 3: mkdirat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x1ff) r0 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_VERSION(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 06:05:33 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) recvmmsg(r0, &(0x7f0000001940), 0x173, 0x0, 0x0) r1 = dup(r0) r2 = gettid() bind$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000006c80)=[{{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f00000016c0)="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", 0x2da}], 0x1}}], 0x1, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x401004000000016) 06:05:33 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = socket(0x1, 0x5, 0x0) dup3(r1, r0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 06:05:33 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0x100000289) r1 = fcntl$dupfd(r0, 0x0, r0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) 06:05:33 executing program 4: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180)={0x77359400}, 0x10) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r2 = dup(r0) write$binfmt_elf64(r2, 0x0, 0x0) 06:05:33 executing program 3: sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, 0x0, 0x0) 06:05:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) write$P9_RWALK(r1, 0x0, 0x0) close(r1) syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') r2 = gettid() tkill(r2, 0x1000000000016) 06:05:33 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0x10840, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000000)) 06:05:33 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$9p(r0, 0x0, 0x0) 06:05:33 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x3, 0x0) r1 = dup2(r0, r0) ioctl$CHAR_RAW_REPORTZONE(r1, 0xc0101282, 0x0) 06:05:33 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERROR(r0, &(0x7f0000000180)=ANY=[], 0xfffffcc0) write$P9_RFSYNC(r0, &(0x7f0000000040)={0x7}, 0x7) 06:05:34 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x4000004) 06:05:34 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff}) fcntl$F_SET_FILE_RW_HINT(r0, 0xf, 0x0) 06:05:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) sendmsg$NL80211_CMD_START_SCHED_SCAN(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:05:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x148}}, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$packet(0x11, 0x2, 0x300) tkill(r2, 0x1000000000016) 06:05:35 executing program 1: r0 = semget$private(0x0, 0x4, 0x0) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000f00)=""/239) 06:05:35 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ttyS3\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r0) sendmsg$NLBL_CALIPSO_C_REMOVE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 06:05:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) r2 = dup(r1) sendmsg$BATADV_CMD_SET_VLAN(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 06:05:35 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) r1 = ioctl$NS_GET_PARENT(r0, 0x5421, 0x748000) ioctl$BTRFS_IOC_QUOTA_CTL(r1, 0x5450, 0x0) 06:05:35 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001240)='/dev/autofs\x00', 0x0, 0x0) close(r0) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZEX(r0, 0x4b60, 0x0) 06:05:35 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000680)='/dev/net/tun\x00', 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 06:05:35 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$TUNSETCARRIER(r0, 0x5450, 0x0) 06:05:35 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) dup2(r0, r1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x21, 0x0, &(0x7f0000000180)) 06:05:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = gettid() sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={0x0}}, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x40000001) tkill(r2, 0x1000000000016) 06:05:35 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) r1 = dup(r0) write$P9_RMKNOD(r1, 0x0, 0x0) 06:05:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000500)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080), 0x14) 06:05:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) dup2(r0, r1) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xc, &(0x7f0000000000)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x0, 0x0, 0x0, "a64fa31e6f47336673f87280544b06000000a973b9d8b8751a180eb18fa413abf2a6518230d21d300730ab8054305355309fb77f8eec236635dfdbf8cb9867080000007777d400"}, 0xd8) 06:05:35 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x5) r1 = dup(r0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0x100000289) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) timer_create(0x0, &(0x7f00000002c0)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) write$P9_RSTAT(r1, 0x0, 0x0) 06:05:35 executing program 0: r0 = eventfd(0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 06:05:35 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0x5450, 0x0) 06:05:35 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0x113460, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 06:05:35 executing program 0: sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0xe0c1, 0x0) 06:05:35 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='environ\x00') r1 = ioctl$NS_GET_PARENT(r0, 0x5421, 0x748000) fcntl$setlease(r1, 0x406, 0x0) 06:05:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={0x0}}, 0x0) 06:05:35 executing program 3: r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x5450, 0x0) 06:05:35 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x5451, 0x0) 06:05:35 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000140)) 06:05:35 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PROBE_CLIENT(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 06:05:35 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x2, &(0x7f0000000180)={'caif0\x00', @link_local}) 06:05:36 executing program 2: r0 = socket(0x2, 0x1, 0x0) sendmsg$NL80211_CMD_GET_KEY(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x4015) 06:05:36 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0xffffff4c}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x5, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffbf) 06:05:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x349, 0x20010080, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) write$P9_RLERRORu(r1, 0x0, 0x0) close(r0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x2, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 06:05:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) fcntl$setsig(r0, 0xa, 0x0) 06:05:36 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) close(r0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f00000000c0)={@multicast2, @remote, @loopback}, 0xc) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)={@multicast2, @loopback}, 0x10) 06:05:36 executing program 0: sched_setscheduler(0x0, 0x5, &(0x7f0000000000)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='environ\x00') ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) 06:05:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_SCRUB_CANCEL(r0, 0x5451, 0x0) 06:05:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NL80211_CMD_NEW_KEY(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 06:05:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0, 0xc46987fe}}, 0x0) 06:05:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x20000000) 06:05:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r0, r1) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 06:05:36 executing program 3: creat(&(0x7f0000001080)='./file0\x00', 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'btrfs.', '\'\x00'}, 0x0, 0x0) 06:05:36 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x10840, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x14, 0x0, 0x0) 06:05:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @private0}, 0x1c) 06:05:36 executing program 4: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) dup2(r0, r1) lseek(r1, 0x0, 0x0) 06:05:36 executing program 2: r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) getpeername(r0, 0x0, &(0x7f00000004c0)) 06:05:36 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) pipe2(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup3(r0, r1, 0x0) sendmsg$TIPC_NL_KEY_SET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x80) 06:05:36 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_GATEWAYS(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 06:05:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) close(r1) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, 0x0, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @dev}, 0x10) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x2a, &(0x7f00000003c0)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) 06:05:36 executing program 1: mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x9) r0 = shmget$private(0x0, 0x4000, 0x488, &(0x7f0000ff9000/0x4000)=nil) shmat(r0, &(0x7f0000ff9000/0x2000)=nil, 0x5000) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x8000, 0x0) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000040)={0x1}) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000080)=0x0) sched_getparam(r2, &(0x7f00000000c0)) setsockopt$inet6_tcp_buf(r1, 0x6, 0x21, &(0x7f0000000100)="104f643c3c175a2174558b517e90e17f57d8d87ad63d3cab419108429ac400a7a4d0955d876ae41e3c69fee70e0151ef13e0c0c4d52f4b2a563cdbe29fe98da05c4464faae3cf390f8e990cd80bdf907d78c144cfaddd4b95e28fc4c14d8b26e9866768e95436b6b644d45a4316413140c54f4380907aad5c0", 0x79) fsync(r1) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f00000001c0)={0x9, {{0x2, 0x4e20, @multicast1}}}, 0x88) prlimit64(r2, 0xf, 0x0, &(0x7f0000000280)) socket$inet_tcp(0x2, 0x1, 0x0) write$P9_ROPEN(r3, &(0x7f0000000880)={0x18, 0x71, 0x1, {{0x0, 0x2, 0x5}, 0x8001}}, 0x18) statfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000740)=""/194) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f00000003c0)=0x7, 0x4) r4 = open$dir(&(0x7f0000000400)='./file0\x00', 0x0, 0x10) faccessat(r4, &(0x7f0000000440)='./file0\x00', 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000700)=0x7, 0xff99) r5 = dup(0xffffffffffffffff) ioctl$EVIOCGEFFECTS(r3, 0x80044584, &(0x7f00000004c0)=""/198) ioctl$TIOCNXCL(r5, 0x540d) semctl$GETZCNT(r0, 0x1, 0xf, &(0x7f00000005c0)=""/188) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000680), 0x4) 06:05:36 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup3(r1, r0, 0x0) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 06:05:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) dup3(r0, r1, 0x0) sendmsg$DEVLINK_CMD_TRAP_SET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 06:05:36 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$SMC_PNETID_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:05:36 executing program 3: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/attr/exec\x00', 0x2, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 06:05:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) dup2(r0, r1) sendmsg$ETHTOOL_MSG_RINGS_GET(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) 06:05:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x11) 06:05:36 executing program 2: r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) fgetxattr(r0, &(0x7f0000000380)=@known='system.sockprotoname\x00', 0x0, 0x0) 06:05:36 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) sendmsg$BATADV_CMD_GET_DAT_CACHE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 06:05:36 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, 0x0) sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)={0x204, 0x15, 0x400, 0x70bd26, 0x25dfdbfe, {0x1d, 0x1f}, [@INET_DIAG_REQ_BYTECODE={0x38, 0x1, "a7456c3b54153f33abf47b469fb2bf4014bdceaa6b046e53796b6abd0201a783da4e2ee935d5854236f3fa6986185a5603385af3"}, @INET_DIAG_REQ_BYTECODE={0xb7, 0x1, "339024377e5fcf6958555b627dfe66fe28c0a8db0414111dd297690bfe810c572b75415ae24c23d214317c58f1a82e05f3c751dcba4b311e98fb783b5ad4e9f95813635126e78984c0ab6ee86f7986c2fdd07d76e5de81c24f668c7588de542afdefafc975954cc46481dcd47c94428e99cf5c2dc091e788640489b214fee0be42b7ad750642d9fe21c774a5e9cc0588673193b7209adef08a44d5b6b336ca276143f3d7a87419674c6cf69180a4e52df118e2"}, @INET_DIAG_REQ_BYTECODE={0x6b, 0x1, "3931f8ad0c5fe1b81e6fd1c9f447aebb3f23c832a13c60ae141cc5d76f5544c15d918c0c610156111c3adccbc76e71d4e2f409576fce1ff3573bb5689dd5dd02999b736104d5cf04267de11580b2ba7226c4568ea500fba8634da4d739caca8734c3df2e4ceba5"}, @INET_DIAG_REQ_BYTECODE={0x93, 0x1, "51cba6fd992323e0bbafe56d1826f6b4daaef0132bd72669abc357d85b292ec1bd0e0090441e9fdb5eadf1ec557dbd6195908dd5beedc7bba31badc1070ad67ab570ed552a3b96b1b3ecc39007d332ef812c3ad3e159a1a588361ee83a756114ff22ccd9a6c827eb069f5b1a72f96febdd89036bb9ecf94309f055797be45737b028030464a294927dda4f57007e3d"}]}, 0x204}, 0x1, 0x0, 0x0, 0x80}, 0x40) 06:05:37 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x1}]}, 0x10) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x75d, 0x44000122, 0x0) 06:05:37 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x200000000001, 0x0) bind$unix(r1, &(0x7f0000000140)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = accept4$packet(r1, 0x0, 0x0, 0x0) getsockname(r2, 0x0, &(0x7f0000000540)) 06:05:37 executing program 0: timer_create(0x0, 0x0, &(0x7f0000000200)=0x0) timer_getoverrun(r0) 06:05:37 executing program 3: sched_setscheduler(0x0, 0x5, &(0x7f0000000000)) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) 06:05:37 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/net\x00') close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001800)) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 06:05:37 executing program 2: socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[], 0x20}}, 0x0) 06:05:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$sock(r0, &(0x7f0000001940)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4040041) 06:05:37 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x29, 0x14, 0x0, 0x300) 06:05:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200800000000013, &(0x7f0000000340)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21}, 0x1c) getpeername$inet6(r0, 0x0, &(0x7f0000000100)) 06:05:37 executing program 4: socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) dup2(r0, r1) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x24, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6}]}, 0x24}}, 0x0) 06:05:37 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) dup3(r1, r0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x8903, &(0x7f0000000000)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:05:37 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) write$apparmor_current(r0, 0x0, 0x0) 06:05:37 executing program 5: r0 = socket(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) connect$netlink(r0, &(0x7f0000000000)=@unspec, 0xc) 06:05:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$NL80211_CMD_DISASSOCIATE(r2, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={0x0, 0x1084}}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180)='nl80211\x00') r3 = gettid() tkill(r3, 0x1000000000016) 06:05:37 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 348.080613] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 348.113439] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 06:05:37 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f00000010c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r2, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000080)=0x80) dup3(r2, r3, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 06:05:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200000ee) sendmsg$NL80211_CMD_UPDATE_FT_IES(r1, &(0x7f00000006c0)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={0x0}}, 0x200048d4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 06:05:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x2) write$9p(r1, 0x0, 0x0) 06:05:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x40) 06:05:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BLKIOOPT(r0, 0x1279, 0x0) 06:05:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000002380)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, 0x0}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000002600)={0x0, 0x0, &(0x7f00000025c0)={&(0x7f0000002580)={0x1c, 0x0, 0x70d}, 0x1c}}, 0x0) dup3(r0, r1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r2, &(0x7f0000002380)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, 0x0}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r2, &(0x7f0000002600)={0x0, 0x0, &(0x7f00000025c0)={&(0x7f0000002580)={0x1c, 0x0, 0x70d}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_CONNECT(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 06:05:37 executing program 3: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 06:05:37 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 06:05:37 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[], 0x1c}}, 0x10) 06:05:37 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$NL80211_CMD_SET_KEY(r0, 0x0, 0x0) 06:05:38 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:05:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000000)={{{@in=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {{@in=@local}, 0x0, @in6=@local}}, 0xe8) 06:05:38 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0x5451, 0x0) 06:05:38 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCMBIS(r0, 0x4b66, &(0x7f0000000080)) 06:05:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={0x0, 0x3c}}, 0x0) socket(0x0, 0x0, 0x0) r2 = gettid() getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000000)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0x7) tkill(r2, 0x1000000000016) 06:05:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_GET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xfffffdd7}}, 0x0) 06:05:38 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x82182) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) dup2(r0, r2) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 06:05:38 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x4, 0x0) ioctl$CHAR_RAW_GETSIZE64(r0, 0x5450, 0x0) 06:05:38 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) r1 = dup(r0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$TIOCSPGRP(r1, 0x5410, 0x0) timer_settime(r2, 0x0, &(0x7f00000000c0)={{0x0, 0x3938700}, {0x0, 0x1c9c380}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) 06:05:38 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup3(r0, r1, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) ioctl$KDGKBTYPE(r2, 0x4b33, 0x0) 06:05:38 executing program 4: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup3(r1, r0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$RNDADDENTROPY(r2, 0x40085203, 0x0) 06:05:38 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) getsockopt$inet6_int(r1, 0x29, 0x13, 0x0, &(0x7f00000000c0)) 06:05:38 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) getsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) 06:05:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = dup2(r0, r0) sendmsg$TCPDIAG_GETSOCK(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x4831) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) tkill(r1, 0x1000000000016) 06:05:38 executing program 2: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self\x00', 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) write$P9_RFLUSH(r0, 0x0, 0x0) 06:05:38 executing program 4: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) close(r0) memfd_create(&(0x7f0000000140)='cpuset@(\x00', 0x0) write$P9_RXATTRCREATE(r0, 0x0, 0x0) 06:05:39 executing program 0: r0 = socket(0x2, 0x2, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000240)={&(0x7f0000000300), 0x68, &(0x7f0000000200)={&(0x7f00000001c0)={0xffffffffffffff01, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x8}}, ["", "", "", "", ""]}, 0x24}}, 0x0) 06:05:39 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x0) 06:05:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) write$vga_arbiter(r1, 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r1) syz_open_procfs(0x0, &(0x7f0000000040)='net/snmp6\x00') tkill(r2, 0x1000000000016) 06:05:39 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000540)='environ\x00') ioctl$KDGETKEYCODE(r0, 0x4b4c, 0x0) 06:05:39 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000340)) 06:05:39 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x0) 06:05:39 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = inotify_init() dup3(r0, r1, 0x0) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 06:05:39 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 06:05:39 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r1, 0xf501, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 06:05:39 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0xf, 0x0, &(0x7f0000000080)) 06:05:39 executing program 5: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 06:05:39 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) 06:05:39 executing program 4: r0 = socket(0x2, 0x1, 0x0) close(r0) open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) 06:05:39 executing program 2: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/attr/exec\x00', 0x2, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) 06:05:40 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) ioctl$EVIOCGABS0(r0, 0x5450, 0x0) 06:05:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) sched_setscheduler(0x0, 0x0, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, 0x0) 06:05:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r1 = eventfd(0x0) dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000000), 0x4) 06:05:40 executing program 5: r0 = socket$inet(0x2, 0x3, 0x7ff) ioctl$CHAR_RAW_DISCARD(r0, 0x1277, &(0x7f0000000840)) 06:05:40 executing program 2: r0 = inotify_init1(0x0) ioctl$EVIOCGABS0(r0, 0x5450, 0x0) 06:05:40 executing program 3: r0 = socket(0x1, 0x5, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup3(r1, r0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) dup3(r2, r3, 0x0) sendmsg$TIPC_NL_BEARER_SET(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 06:05:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000140)) 06:05:40 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) dup2(r0, r1) write$cgroup_pid(r1, 0x0, 0xfffffd21) 06:05:40 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000400)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x5451) 06:05:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = dup2(r0, r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) close(r0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r4, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) setsockopt$sock_int(r3, 0x1, 0x2b, &(0x7f0000000100)=0x20, 0x4) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) tkill(r1, 0x1000000000016) 06:05:40 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) read(r1, &(0x7f0000000600)=""/11, 0x232) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)) dup2(r1, r0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, 0x0) 06:05:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) dup3(r0, r1, 0x0) sendmsg$netlink(r1, &(0x7f0000005dc0)={0x0, 0x0, 0x0}, 0x0) 06:05:40 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/user\x00') close(r0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) 06:05:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = gettid() write$P9_RRENAMEAT(r1, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r1) r3 = socket$packet(0x11, 0x2, 0x300) r4 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r4, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) setsockopt$sock_int(r3, 0x1, 0x2b, &(0x7f0000000100)=0x20, 0x4) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) tkill(r2, 0x1000000000016) 06:05:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) 06:05:40 executing program 3: r0 = socket(0x2, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8953, &(0x7f00000000c0)) 06:05:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4880) 06:05:40 executing program 1: r0 = open(&(0x7f0000000100)='./file0\x00', 0x40, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000140)) 06:05:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create(0x4) dup3(r0, r1, 0x0) getpeername$unix(r1, 0x0, &(0x7f0000000080)) 06:05:40 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x806) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = fcntl$dupfd(r0, 0x0, r0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) 06:05:40 executing program 3: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='sysfs\x00', 0x0, 0x0) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=ANY=[]) 06:05:40 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x5450, 0x0) 06:05:40 executing program 1: sched_setscheduler(0x0, 0x5, &(0x7f0000000080)) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) dup2(r1, r0) 06:05:40 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$TIOCSCTTY(r0, 0x541b, 0x20000000) 06:05:40 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r2 = dup3(r0, r1, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x3, &(0x7f0000000100)={0x0, {{0xa, 0x0, 0x0, @dev}}, {{0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}, 0x108) 06:05:41 executing program 5: r0 = inotify_init1(0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 06:05:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) close(r0) socket(0x11, 0xa, 0x0) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080), 0x4e, &(0x7f0000000180)={0x0}}, 0x0) tkill(r2, 0x1000000000016) 06:05:41 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x5450, 0x0) 06:05:41 executing program 1: r0 = socket$unix(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x66, 0x0, &(0x7f0000000040)) 06:05:41 executing program 3: r0 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$FS_IOC_SETFLAGS(r0, 0x5451, 0x0) 06:05:41 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, 0x0) 06:05:41 executing program 4: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000180)={0x0, 0xea60}, 0x10) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = dup(r1) sendmsg$ETHTOOL_MSG_RINGS_GET(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 06:05:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x8000, &(0x7f0000000080)=@in={0x2, 0x4e21, @empty}, 0x80) sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={0x0}}, 0x0) 06:05:41 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) 06:05:41 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$eventfd(r0, 0x0, 0x0) 06:05:41 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x1ff, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, 0x0, 0x0) 06:05:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x8, 0x0, &(0x7f0000000140)) 06:05:41 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x5, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup2(r1, r0) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000200)) 06:05:41 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(r0) sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000440)={&(0x7f0000000240), 0x5fb3a9a66b6aad22, &(0x7f00000003c0)={0x0}}, 0x0) 06:05:41 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x5452, &(0x7f0000000100)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}) 06:05:42 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x4, 0x0) ioctl$BLKTRACESTOP(r0, 0x5450, 0x0) 06:05:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x80) 06:05:42 executing program 1: r0 = creat(&(0x7f0000001900)='./file0\x00', 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) dup2(r1, r0) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 06:05:42 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x806) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, 0x0) mmap(&(0x7f000050a000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:05:42 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r0, 0x942e, 0x0) tkill(r1, 0x1000000000016) 06:05:42 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = dup(r0) write$cgroup_devices(r1, 0x0, 0xfffffd8c) 06:05:42 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000001a00), 0x8, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000000)) 06:05:42 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000005c00)='/dev/vcs\x00', 0x0, 0x0) getsockname$unix(r0, 0x0, 0x0) 06:05:42 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r0, 0x3, 0x0) 06:05:42 executing program 5: r0 = memfd_create(&(0x7f0000000000)='\x00', 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) 06:05:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket(0x11, 0xa, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x1c}, 0x1c}}, 0x0) tkill(r2, 0x1000000000016) 06:05:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) dup3(r0, r1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x15, 0x0, &(0x7f00000000c0)) 06:05:42 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SIOCGSTAMP(r0, 0x5450, 0x0) 06:05:42 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000002380)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, 0x0}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000002600)={0x0, 0x0, &(0x7f00000025c0)={&(0x7f0000002580)={0x1c, 0x0, 0x70d}, 0x1c}}, 0x0) dup3(r0, r1, 0x0) sendmsg$inet6(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 06:05:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x5451, 0x0) 06:05:43 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) close(r0) syz_genetlink_get_family_id$netlbl_unlabel(0x0) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x0) 06:05:43 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockname(r1, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @remote}}}}, &(0x7f00000000c0)=0x80) dup2(r0, r2) sendmsg$nl_generic(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x0) 06:05:43 executing program 5: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x80805) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = dup2(r0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) ioctl$sock_FIOGETOWN(r1, 0x8903, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x40100c000000013) 06:05:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x10) 06:05:43 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) 06:05:43 executing program 2: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) 06:05:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x4008f50a, 0x0) 06:05:43 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_GET_MPP(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:05:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) write$P9_RSTATu(r0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000080)='uid_map\x00') tkill(r1, 0x13) 06:05:43 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, 0x0) 06:05:43 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) setsockopt(r0, 0x1, 0x9, &(0x7f0000000340)="eb87c7e4", 0x4) 06:05:43 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) dup3(r0, r1, 0x0) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000012c0)={0x0}}, 0x0) 06:05:43 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, 0x0) tkill(r1, 0x40100c000000013) 06:05:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup3(r1, r0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f0000000080)={'veth0_virt_wifi\x00'}) 06:05:44 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x4040020) 06:05:44 executing program 0: r0 = epoll_create(0x7ff) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) sendmsg$NL80211_CMD_SET_WDS_PEER(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 06:05:44 executing program 2: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r2, r3) ioctl$CHAR_RAW_RRPART(r4, 0x5451, 0x0) 06:05:44 executing program 1: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self\x00', 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 06:05:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) sendmsg$BATADV_CMD_GET_HARDIF(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) 06:05:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = accept$inet6(r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x3c, 0x0, 0x800, 0x6, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @private2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @mcast2}]}, 0x3c}}, 0x0) 06:05:44 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) r1 = dup(r0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000100)={0x0, 0xb0}}, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000004c0)={{0x0, 0xffffffffffffffff}, 0x80000000}) r2 = gettid() tkill(r2, 0x40100c000000013) 06:05:44 executing program 1: open$dir(&(0x7f00000000c0)='.\x00', 0x2e8240, 0x80) 06:05:44 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000800)={0xffffffffffffffff}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) dup2(r0, r1) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 06:05:44 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NL80211_CMD_GET_STATION(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 06:05:44 executing program 0: sched_setscheduler(0x0, 0x5, &(0x7f0000000080)) r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$FIDEDUPERANGE(r0, 0x5451, 0x0) 06:05:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x20000000) 06:05:44 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) ioctl$EVIOCRMFF(r0, 0x2, &(0x7f0000000040)) [ 355.269684] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 06:05:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x4000000) 06:05:44 executing program 2: shmget$private(0x0, 0x3000, 0x4, &(0x7f0000ffb000/0x3000)=nil) 06:05:44 executing program 0: r0 = memfd_create(&(0x7f0000000000)='wlan0(\x00', 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 06:05:44 executing program 4: r0 = socket(0x2, 0x2, 0x0) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x104}}, 0x0) 06:05:45 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8983, 0x0) 06:05:45 executing program 5: syz_open_procfs(0x0, &(0x7f0000000200)='oom_adj\x00') r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESDEC=r0], 0x14) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='oom_adj\x00') write$P9_RCREATE(r1, &(0x7f0000000040)={0x18}, 0x18) 06:05:45 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={0x0}}, 0x0) 06:05:45 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE(r0, 0x5450, 0x0) 06:05:45 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r2) dup2(r2, r0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) 06:05:45 executing program 0: timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() r2 = dup2(r0, r0) sendmsg$NL80211_CMD_DISASSOCIATE(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) recvmmsg(r0, &(0x7f0000003c00)=[{{0x0, 0x0, &(0x7f0000003b00), 0x0, &(0x7f0000000180)=""/106, 0x6a}}], 0x400000000000116, 0x0, &(0x7f0000000040)={0x77359400}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1004000000013) 06:05:45 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) dup3(r0, r1, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x23, &(0x7f0000000040), 0x4) 06:05:45 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) read$char_usb(r0, &(0x7f00000000c0)=""/174, 0xae) 06:05:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) sendmsg$NL80211_CMD_SET_NOACK_MAP(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) close(r0) syz_open_dev$tty1(0xc, 0x4, 0x1) tkill(r2, 0x1000000000016) 06:05:45 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 06:05:45 executing program 3: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) dup3(r1, r0, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 06:05:45 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xd) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup2(r1, r0) r3 = accept$inet6(r2, 0x0, 0x0) ioctl$BLKIOMIN(r3, 0x5450, 0x0) 06:05:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x0) close(r0) socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000002c0)={@mcast1}, 0x14) 06:05:45 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000080)=0x80) dup3(r0, r1, 0x0) sendmsg$ETHTOOL_MSG_WOL_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 06:05:45 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x5452, &(0x7f0000000540)) 06:05:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000006c0)={0x0}}, 0x4048000) 06:05:45 executing program 2: r0 = eventfd(0x0) ioctl$EVIOCGEFFECTS(r0, 0x5452, &(0x7f0000000040)=""/126) 06:05:46 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) dup2(r0, r1) sendmsg$ETHTOOL_MSG_EEE_SET(r1, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={0x0}}, 0x0) 06:05:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_GETVERSION(r0, 0x5452, &(0x7f00000000c0)) 06:05:46 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f00000003c0)=0x80400100000001, 0x4) connect$inet6(r1, &(0x7f0000000100), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x29, &(0x7f0000000300)={{{@in6=@dev={0xfe, 0x80, [], 0x22}, @in6=@loopback}}, {{@in=@remote}, 0x0, @in=@dev}}, 0xe8) 06:05:46 executing program 4: r0 = epoll_create(0x5) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000980)='/dev/autofs\x00', 0x0, 0x0) dup2(r0, r1) epoll_pwait(r1, &(0x7f00000001c0)=[{}], 0x1, 0x0, 0x0, 0x0) 06:05:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$BTRFS_IOC_FS_INFO(r0, 0x5450, 0x0) 06:05:46 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={0x0}}, 0x0) 06:05:46 executing program 2: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$TUNSETCARRIER(r0, 0x5450, 0x0) 06:05:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0xc0, 0x0) dup2(r0, r1) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000000), 0x4) 06:05:46 executing program 4: r0 = socket(0x1, 0x5, 0x0) ioctl$KDSKBLED(r0, 0x4b65, 0x0) 06:05:46 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f00000000c0)=0xffffffffffffffff) 06:05:46 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0xc0100, 0x0) 06:05:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff}) dup3(r0, r1, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 06:05:46 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = epoll_create1(0x0) dup3(r0, r1, 0x0) getsockopt$netlink(r1, 0x10e, 0x3, &(0x7f0000000000)=""/41, &(0x7f0000000040)=0x29) 06:05:46 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x5421, &(0x7f0000000280)=""/154) 06:05:46 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/attr/current\x00', 0x2, 0x0) dup2(r0, r1) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 06:05:46 executing program 0: r0 = socket$inet(0x2, 0x2000000001, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000002c0)=0x200, 0x4) connect$inet(r0, &(0x7f0000000780)={0x2, 0x4e23}, 0x10) sendto$inet(r0, &(0x7f0000000200)='\x00', 0x1, 0x0, 0x0, 0x0) recvfrom(r0, 0x0, 0xfffffffffffffe9b, 0x2000, 0x0, 0x85) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 06:05:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = accept$inet6(r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendmsg$NL80211_CMD_GET_PROTOCOL_FEATURES(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x1) 06:05:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x800) 06:05:46 executing program 2: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40, 0x0) close(r0) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, &(0x7f0000000040)) 06:05:46 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) connect$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x14) r1 = dup2(r0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r1) socket$packet(0x11, 0x2, 0x300) tkill(r2, 0x1000000000016) 06:05:46 executing program 0: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) close(r0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x33, 0x0, &(0x7f00000000c0)) 06:05:46 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCEXCL(r0, 0x540c) 06:05:46 executing program 5: r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000001000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF2(r0, 0x402c542d, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, "ae041a045d90868a6c5500e00b00"}) 06:05:46 executing program 2: r0 = inotify_init1(0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x27}}, 0x10) 06:05:46 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = dup(r0) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x3a0}}, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x1c}, 0x1c}}, 0x0) tkill(r2, 0x401004000000016) [ 357.355273] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 06:05:46 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x2) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r0, 0x8010661b, 0x0) 06:05:46 executing program 4: r0 = socket(0xa, 0x1, 0x0) sendmsg$inet6(r0, &(0x7f00000005c0)={&(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c, 0x0}, 0x20000068) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={0x0}}, 0x2404e814) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) connect$netlink(r0, &(0x7f0000000500)=@unspec, 0xc) 06:05:46 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = accept$packet(r0, 0x0, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$FIDEDUPERANGE(r1, 0x5421, &(0x7f0000000080)) 06:05:47 executing program 3: pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff}, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSBRK(r0, 0x5427) 06:05:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$DEVLINK_CMD_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 06:05:47 executing program 2: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, 0x0, 0x0) 06:05:47 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000004, 0x24032, r0, 0x0) 06:05:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) close(r0) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_SET_MPATH(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 06:05:47 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 06:05:47 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x40010006, 0x0, 0x0) 06:05:47 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x40000000000000, 0x0) close(r0) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000001c0), 0x4) 06:05:47 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = dup(r0) ioctl$GIO_SCRNMAP(r1, 0x4b40, 0x0) 06:05:47 executing program 1: r0 = socket(0x2, 0x2, 0x0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={0x0, 0x34}}, 0x0) 06:05:47 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5451, 0x0) 06:05:47 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x48004) 06:05:47 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TIOCL_UNBLANKSCREEN(r1, 0x541c, 0x0) 06:05:47 executing program 3: r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/attr/current\x00', 0x2, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSIG(r0, 0x40045436, 0x3) 06:05:48 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ttyS3\x00', 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 06:05:48 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) ioctl$TCXONC(r1, 0x540a, 0x0) r2 = dup(r1) write$P9_RWRITE(r2, &(0x7f0000000040)={0xb}, 0xb) close(r0) 06:05:48 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) close(r0) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f00000000c0)) 06:05:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f00000003c0)={&(0x7f0000000200)={0x2, 0x0, @private}, 0x10, &(0x7f0000000080)=[{&(0x7f00000002c0)="f3d783e6e617a998044cfb01e5085f8f3e04217b87fe21f4d3406e63932662a46cb94b8d6490f0e1745207dac41a071ea3dc40f32730cfe5c8a964af376f8325eb488d451dcd08735bee5742", 0x4c}], 0x1, &(0x7f0000000380), 0xfffffffffffffeb2}, 0x0) 06:05:48 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup3(r1, r0, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 06:05:48 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) getgroups(0x1, &(0x7f0000000000)=[0xee01]) ioctl$TUNSETGROUP(r0, 0x5451, r1) 06:05:49 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x3, 0x0) 06:05:49 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 06:05:49 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000680)) 06:05:49 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = open(&(0x7f0000000140)='./file0\x00', 0x30142, 0x0) dup3(r0, r1, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x88, 0x64, 0x0, &(0x7f0000000080)) 06:05:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, 0x0) 06:05:49 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x5452, &(0x7f0000000040)={'wg1\x00'}) 06:05:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000780)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) write$P9_RWSTAT(r1, &(0x7f0000000180)={0x7}, 0x7) r2 = accept$inet(r0, 0x0, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 06:05:49 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) dup2(r1, r0) ioctl$PIO_UNIMAP(r0, 0x540b, 0x0) 06:05:49 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) dup2(r1, r0) sched_setscheduler(0x0, 0x5, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8983, 0x0) 06:05:49 executing program 3: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x2, &(0x7f00000010c0)) 06:05:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000440)='/dev/zero\x00', 0x0, 0x0) dup2(r0, r1) sendmsg$NL80211_CMD_SET_COALESCE(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 06:05:49 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x22, 0x0, 0x0) [ 359.938506] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 06:05:49 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 06:05:49 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000000)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x3d, &(0x7f0000000340)=""/196, &(0x7f00000000c0)=0xc4) 06:05:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x4000) [ 359.983044] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 06:05:49 executing program 2: shmget(0x3, 0x4000, 0x200, &(0x7f0000ffa000/0x4000)=nil) 06:05:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vcs\x00', 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 06:05:49 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000200)) 06:05:49 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f00000002c0)=ANY=[], 0x7686d6f) r1 = gettid() ioctl$BTRFS_IOC_RESIZE(r0, 0x50009403, 0x0) tkill(r1, 0xb) 06:05:49 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r0, 0x5452, &(0x7f0000000080)) 06:05:49 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PIO_FONTX(r0, 0x541b, &(0x7f0000000540)={0x0, 0x0, 0x0}) 06:05:49 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000100000013, &(0x7f0000000180)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x2000021c) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040), 0x4) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x8004000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 06:05:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) dup3(r0, r1, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x1d, 0x0, &(0x7f0000000100)) 06:05:49 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000d00)='limits\x00') sendmsg$unix(r0, 0x0, 0x0) 06:05:49 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$NL80211_CMD_SET_BSS(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) close(r2) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r4, 0x0) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x1000000000016) 06:05:49 executing program 4: r0 = socket(0x10, 0x2, 0x2) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 06:05:49 executing program 2: sched_setscheduler(0x0, 0x5, &(0x7f0000000000)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$EVIOCSABS2F(0xffffffffffffffff, 0x401845ef, 0x0) 06:05:49 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) r1 = epoll_create1(0x0) dup3(r1, r0, 0x0) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0, 0x0, 0x0) 06:05:49 executing program 4: sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(0xffffffffffffffff, 0x0, 0x0) 06:05:49 executing program 0: r0 = eventfd(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) dup2(r2, r3) sendmsg$SMC_PNETID_ADD(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[], 0x3c}}, 0x0) 06:05:50 executing program 3: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg(r0, &(0x7f0000000880)={0x0, 0x0, 0x0}, 0x0) 06:05:50 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, 0x0, 0x380000000000000, 0x40080d5) 06:05:50 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x803, 0xebc0) dup2(r0, r1) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "f5449117da533ab250a6816b655635c5d2af59"}) 06:05:50 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) r2 = fcntl$dupfd(r1, 0x0, r0) sendmsg$unix(r2, &(0x7f0000002bc0)={0x0, 0x0, 0x0}, 0x4000) sendmsg$NL80211_CMD_DEL_INTERFACE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) shutdown(r2, 0x0) 06:05:50 executing program 2: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x6, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) r2 = dup2(r1, r1) write$P9_RSETATTR(r2, 0x0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x3d, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) dup2(r3, r1) tkill(r0, 0x1000000000016) 06:05:50 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$TIOCMGET(r0, 0x5415, 0x0) 06:05:50 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180)={0x0, 0xea60}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = dup(r0) sendmsg$NL80211_CMD_SET_MPATH(r1, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000002c0)={0x0}}, 0x20000004) 06:05:50 executing program 1: sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, 0x0, 0x86324db5b4a5affb) 06:05:50 executing program 3: r0 = epoll_create(0x2) r1 = dup2(r0, r0) epoll_pwait(r1, 0x0, 0x21a, 0x0, &(0x7f00000005c0), 0x8) 06:05:50 executing program 0: r0 = epoll_create(0x40000acf) close(r0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="0003000000c8"], 0x28) write(r1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_SET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) 06:05:50 executing program 0: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000700)) sendmsg$NL80211_CMD_SET_WIPHY(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={0x0}}, 0x0) 06:05:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) 06:05:50 executing program 1: sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/exec\x00') ioctl$CHAR_RAW_RESETZONE(r0, 0x5452, &(0x7f0000000080)) 06:05:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = inotify_init() dup3(r0, r1, 0x0) sendmsg$BATADV_CMD_GET_HARDIF(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 06:05:50 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x8001004000000016) 06:05:50 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) r0 = eventfd(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) dup2(r2, r3) sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 06:05:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000003780)={0x0, 0x0, &(0x7f0000003740)={0x0}}, 0x0) 06:05:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGSKNS(r0, 0x5450, 0x0) 06:05:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f00000003c0)=0x404100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = socket(0x2, 0x80001, 0x0) r2 = dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x132441) connect$unix(r2, &(0x7f00000000c0)=@abs, 0x6e) write$cgroup_subtree(r2, 0x0, 0x0) 06:05:51 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = fcntl$dupfd(r0, 0x0, r0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, 0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) 06:05:51 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NL80211_CMD_SET_CHANNEL(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) 06:05:51 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000), 0x2, 0x0) 06:05:51 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$EVIOCGEFFECTS(r1, 0x80044584, 0x0) 06:05:51 executing program 2: capset(&(0x7f0000000240)={0x19980330}, &(0x7f0000000280)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r0, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000340)={0x0}}, 0x0) 06:05:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) dup3(r0, r1, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x40000) 06:05:51 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={0x0}}, 0x4000046) 06:05:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_INTERFACE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x4000010) 06:05:52 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r0) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 06:05:52 executing program 2: r0 = socket(0x2, 0x1, 0x0) sendmsg$NL80211_CMD_DEL_STATION(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x4000) 06:05:52 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) close(r0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) accept$packet(r0, 0x0, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) connect$unix(r2, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 06:05:52 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$TIOCNXCL(r0, 0x5450) 06:05:52 executing program 1: sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='sysfs\x00', 0x0, 0x0) sendmsg$NL80211_CMD_SET_PMK(0xffffffffffffffff, 0x0, 0x0) 06:05:52 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x5451, 0x0) 06:05:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, 0x0, &(0x7f0000000680)) 06:05:52 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup(r0, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) 06:05:52 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$TUNGETDEVNETNS(r0, 0x5450, 0x0) fcntl$getown(r1, 0x9) 06:05:52 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) dup3(r1, r0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000000)) 06:05:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xa4}}, 0x0) close(r0) socket$nl_generic(0x2, 0x2, 0x88) tkill(r2, 0x1000000000016) 06:05:52 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) chroot(&(0x7f00000000c0)='./file0\x00') capset(&(0x7f0000000080)={0x20080522}, &(0x7f0000cc0000)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) 06:05:52 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, "1a0000e2ffff0acaffffff0000e1fffffff300"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, 0x0) 06:05:52 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x0, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_SET_PMKSA(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 06:05:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000780)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = accept4$unix(r0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000100), 0x1b5, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, 0x0, 0x8, 0x70bd27, 0x25dfdbfb, {{}, {}, {0x18, 0x17, {0x17, 0x2, @l2={'ib', 0x3a, 'syz_tun\x00'}}}}}, 0x34}}, 0x0) 06:05:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r1, &(0x7f0000010500)={0x0, 0x0, &(0x7f00000104c0)={0x0}}, 0x14004800) 06:05:52 executing program 5: r0 = getuid() setuid(r0) r1 = shmget(0xffffffffffffffff, 0x2000, 0x10, &(0x7f0000ffa000/0x2000)=nil) shmctl$SHM_STAT_ANY(r1, 0xb, 0x0) shmctl$SHM_LOCK(r1, 0xb) r2 = geteuid() ioprio_get$uid(0x3, r2) newfstatat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0/file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) setregid(r3, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x2, 0x0) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000000)={{0x2, r2, r3, 0x0, 0xee01, 0x1, 0x4}, 0x9, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7}) fchownat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', r0, r3, 0x800) r4 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r4, 0x5451, 0x0) 06:05:52 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x181282) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = dup(r0) ioctl$sock_SIOCDELDLCI(r1, 0x8981, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 06:05:52 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f00000005c0)) 06:05:52 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGISO7816(r0, 0x540a, 0x0) 06:05:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x4090) [ 363.420326] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 363.449092] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 06:05:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x20000000) 06:05:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x2, &(0x7f00000070c0)={0x3, 'nr0\x00'}) 06:05:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/ubi_ctrl\x00', 0x0, 0x0) dup2(r0, r1) r2 = dup2(r1, r0) getsockname$inet6(r2, 0x0, &(0x7f0000000080)) 06:05:52 executing program 0: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) 06:05:52 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x4, 0x0, 0x0) 06:05:52 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) pwritev(r0, &(0x7f0000001200), 0x0, 0x0, 0x0) 06:05:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r2 = dup2(r0, r0) write$vga_arbiter(r2, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) write(r3, 0x0, 0x0) tkill(r1, 0x1000000000016) 06:05:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) setresgid(0x0, 0x0, r1) 06:05:52 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect$unix(r1, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept4$inet6(r0, 0x0, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000080)=@ethtool_gfeatures}) 06:05:52 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) close(r0) socket$packet(0x11, 0x2, 0x300) tkill(r2, 0x1000000000016) 06:05:53 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x23, 0x0, 0x0) 06:05:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x890b, &(0x7f0000000180)={'wlan0\x00'}) 06:05:53 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) close(r0) r1 = inotify_init1(0x0) mknod(&(0x7f0000000ec0)='./file0\x00', 0x0, 0x0) r2 = inotify_add_watch(r1, &(0x7f0000001080)='./file0\x00', 0x20000401) inotify_rm_watch(r0, r2) 06:05:53 executing program 4: sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x3405238cb0fffffb) 06:05:53 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) r2 = dup2(r0, r1) write$cgroup_subtree(r2, 0x0, 0x0) 06:05:53 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000001180)='/dev/input/event#\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x5450, 0x0) 06:05:53 executing program 0: sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) times(0x0) 06:05:53 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) dup2(r0, r1) getsockname$inet6(r1, 0x0, &(0x7f0000006bc0)) 06:05:53 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x89a0, 0x0) 06:05:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000240)) 06:05:53 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "1a0000e2ffff0acaffffff0000e1fffffff300"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r2, 0x8004f50e, 0x0) 06:05:53 executing program 5: r0 = memfd_create(&(0x7f0000000100)='-B\xd5NI\xc5j\x9appp\xf0\b\x84\xa2m\x00\v\x18\x004\x89\xda S\xea\xedC\xe3\xc0<\xe3\x98(\x1c\xb0\xa2Ey\xdb\xd9\xa7\xb1S\xf1:)\x00\xbb\x8d\xac\xacva}knh#\xcf)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bcc\xad\x89\x9ck\xdeu\x00\x00\x00\x00\x00\x00\x00M\xcd\xfb\xcc\x97\xb4\v\xa9=\xcdJx\xaa\x00~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b7\x0f\x00'/133, 0x0) write$cgroup_pid(r0, &(0x7f0000000240), 0x12) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r1, 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000740), 0x40000000a5fc) sysfs$1(0x1, &(0x7f0000000000)='/dev/ptmx\x00') 06:05:53 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 06:05:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) dup2(r0, r1) sendmsg$DEVLINK_CMD_SB_POOL_SET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 06:05:53 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 06:05:53 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000000), &(0x7f00000000c0)=0xfffffffffffffd78) 06:05:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000002380)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, 0x0}, 0x0) syz_open_dev$vcsn(&(0x7f00000003c0)='/dev/vcs#\x00', 0xffffffff, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000002600)={0x0, 0x0, &(0x7f00000025c0)={&(0x7f0000002580)={0x1c, 0x0, 0x70d}, 0x1c}}, 0x0) dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={0x0}}, 0x20000004) connect$inet6(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) setgroups(0x0, 0x0) 06:05:53 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) r1 = dup2(r0, r0) sendmsg$NLBL_CIPSOV4_C_REMOVE(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x40000) 06:05:53 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) ioctl$TIOCGSERIAL(r0, 0x541e, 0x0) 06:05:53 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$TCSETSW2(r1, 0x402c542c, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, "77bcc91b0c67730c985c1a019651158a020bb1"}) 06:05:53 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000002c0)=0x200, 0x4) connect$inet(r0, &(0x7f0000000780)={0x2, 0x4e23}, 0x10) sendto$inet(r1, &(0x7f0000000200)="96", 0x1, 0x0, 0x0, 0x0) recvfrom(r0, 0x0, 0x0, 0x2000, 0x0, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 06:05:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_QOS_MAP(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x50) 06:05:53 executing program 4: r0 = socket(0xa, 0x2, 0x0) setsockopt$packet_add_memb(r0, 0x29, 0x22, 0x0, 0x0) 06:05:54 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000480)={0xffffffffffffffff}) dup2(r0, r1) ioctl$TIOCGICOUNT(r1, 0x5409, 0x0) 06:05:54 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x40004090) 06:05:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) ioctl$TIOCGPGRP(r1, 0x540f, 0x0) 06:05:54 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$NL80211_CMD_LEAVE_OCB(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) 06:05:54 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0x5427, 0x0) 06:05:54 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 06:05:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$NLBL_MGMT_C_REMOVE(0xffffffffffffffff, 0x0, 0x0) close(r0) socket$inet_udp(0x2, 0x2, 0x0) tkill(r2, 0x1000000000016) 06:05:54 executing program 4: r0 = socket(0x2, 0x2, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) 06:05:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8982, 0x0) 06:05:54 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f0000001080)='./file0\x00', 0x40040, 0x0) dup3(r0, r1, 0x0) sendmsg$nl_crypto(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 06:05:54 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0x5450, 0x0) 06:05:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x20000040) 06:05:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_SETVERSION(r0, 0x8912, &(0x7f00000000c0)) 06:05:54 executing program 0: sched_setscheduler(0x0, 0x5, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0x0) 06:05:54 executing program 4: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) dup3(r1, r0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5452, &(0x7f0000000200)={{}, 0x0, 0x0, @unused, @subvolid}) 06:05:54 executing program 3: r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x80440, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000005280)) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 06:05:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='maps\x00') ioctl$EXT4_IOC_MOVE_EXT(r0, 0x5451, 0x0) 06:05:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x349, 0x20010080, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000000400)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) sendmsg$NL80211_CMD_DEL_STATION(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$nl_crypto(0x10, 0x3, 0x15) r2 = gettid() tkill(r2, 0x1000000000016) 06:05:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$P9_RLCREATE(r0, 0x0, 0xffffffc8) 06:05:54 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup2(r0, r0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup2(r1, r2) setsockopt$packet_int(r2, 0x107, 0x11, &(0x7f0000000040), 0x4) 06:05:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) dup2(r0, r1) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000140), 0x4) 06:05:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) sendmsg$NL80211_CMD_GET_WOWLAN(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x4000) 06:05:54 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) fchownat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1000) 06:05:54 executing program 4: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x40000) 06:05:54 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000005180), 0x0, 0x40010020, 0x0) 06:05:54 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x4800) 06:05:54 executing program 2: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) r2 = epoll_create(0x20) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) 06:05:54 executing program 3: capset(&(0x7f00000000c0)={0x20071026}, &(0x7f0000000100)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0/../file0\x00', 0x0) 06:05:54 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.max.depth\x00', 0x2, 0x0) write$P9_RCREATE(r0, 0x0, 0x0) 06:05:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000780)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000100), 0x1b5, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4$packet(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 06:05:54 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) dup2(r0, r1) getpeername$inet6(r1, 0x0, &(0x7f0000000080)) 06:05:54 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup2(r1, r0) r4 = accept$inet6(r3, 0x0, 0x0) sendmsg$NL80211_CMD_DEL_MPATH(r4, &(0x7f0000000180)={0x0, 0xfffffffffffffd01, &(0x7f0000000140)={0x0}}, 0x0) 06:05:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010002, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = dup2(r0, r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$BATADV_CMD_GET_NEIGHBORS(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) close(r0) socket(0xa, 0x2, 0x0) tkill(r1, 0x1000000000016) 06:05:54 executing program 0: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0xd) r0 = socket(0x2, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x8953, &(0x7f0000000000)) 06:05:54 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$packet(r0, &(0x7f0000002440), 0x0, 0x6008004, 0x0, 0x0) 06:05:54 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x21, 0x0, &(0x7f0000000040)) [ 365.572381] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 06:05:54 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001240)='/dev/autofs\x00', 0x0, 0x0) close(r0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001240)='/dev/autofs\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) write(r2, 0x0, 0x0) dup2(r2, r1) write$cgroup_type(r1, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 06:05:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x200100c1, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) sendmsg$NLBL_MGMT_C_LISTALL(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYBLOB='$'], 0x24}}, 0x0) close(r0) r2 = gettid() socket$inet6(0xa, 0x3, 0x5) tkill(r2, 0x1000000000016) 06:05:54 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0x5451, 0x0) [ 365.621625] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 06:05:54 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg$inet(r0, &(0x7f0000002140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 06:05:54 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000dc0)) 06:05:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x4010) 06:05:54 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff}) dup3(r0, r1, 0x0) getsockname$inet6(r1, 0x0, &(0x7f0000000040)) 06:05:55 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x42) write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 06:05:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_mreq(r0, 0x0, 0x20, 0x0, &(0x7f0000000880)) 06:05:55 executing program 4: pipe(&(0x7f00000039c0)={0xffffffffffffffff}) ioctl$BLKBSZSET(r0, 0x40081271, 0x0) 06:05:55 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGICOUNT(r0, 0x4b36, 0x0) 06:05:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001540)={0x0, 0xbd4}}, 0x20044085) 06:05:55 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000004400)='comm\x00') dup2(r0, r1) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x4, 0x0, &(0x7f0000000080)=0xd) 06:05:55 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8901, &(0x7f0000000000)={0x3, 'bond_slave_1\x00'}) 06:05:55 executing program 2: r0 = socket(0x1, 0x5, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:05:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f0000000080)={0x0, 0x5, &(0x7f0000000040)={0x0, 0xfffffddc}}, 0x0) 06:05:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r0, &(0x7f0000000640)=[{{&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, 0x0}}], 0x0, 0x0, 0x0) dup2(r0, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) recvmmsg(r2, &(0x7f0000000640)=[{{&(0x7f0000000240)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, 0x0}}], 0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x33, 0x0, &(0x7f0000000180)) 06:05:55 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept4$unix(r2, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x5450, r3) 06:05:55 executing program 2: r0 = socket(0x11, 0xa, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) 06:05:55 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) close(r0) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) ioctl$PIO_UNIMAP(r1, 0x4b37, 0x0) 06:05:55 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) dup2(r1, r0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r0, 0x541b, 0x960000) 06:05:55 executing program 5: openat$vcs(0xffffffffffffff9c, 0x0, 0x4021e2, 0x0) 06:05:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001280)={0x0}}, 0x804) 06:05:56 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000008940)='/dev/loop-control\x00', 0x4c1, 0x0) 06:05:56 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(r0, 0x5450, 0x0) 06:05:56 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSRS485(r0, 0x540a, 0x0) 06:05:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x20008800) 06:05:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup2(r0, r1) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:05:56 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) 06:05:56 executing program 0: execve(0x0, &(0x7f0000000280)=[&(0x7f0000000040)='/dev/vcsa\x00'], 0x0) r0 = eventfd(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) dup2(r2, r3) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 06:05:56 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(r0, 0x5000940f, 0x0) 06:05:56 executing program 5: r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000040)={0x0, 0x1, 0x6, @broadcast}, 0x10) 06:05:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) dup3(r0, r1, 0x0) getsockopt$sock_int(r1, 0x1, 0x2f, 0x0, &(0x7f00000000c0)) 06:05:56 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000000)={0x0, 0x0, @status}) 06:05:56 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$TUNGETDEVNETNS(r0, 0x5450, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x5451, 0x0) 06:05:56 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000400)='/dev/urandom\x00', 0x0, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 06:05:56 executing program 1: r0 = timerfd_create(0x0, 0x0) close(r0) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt(r0, 0x0, 0x6, 0x0, 0x0) 06:05:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) fchownat(r0, &(0x7f0000001280)='\x00', 0x0, 0x0, 0x1000) 06:05:56 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8982, 0x0) 06:05:56 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) dup2(r0, r1) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 06:05:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x880) 06:05:56 executing program 2: pipe2$9p(&(0x7f0000000940)={0xffffffffffffffff}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r0) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) 06:05:56 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0x4) r1 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) dup2(r0, r1) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080), 0x4) 06:05:56 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r1) r4 = dup3(r0, r3, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_GET(r4, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={0x0, 0x20c}}, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000340)) sendmsg$DEVLINK_CMD_SB_POOL_SET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000100)={{}, {r6, r7+30000000}}, 0x0) tkill(r5, 0x401004000000016) 06:05:56 executing program 4: r0 = inotify_init1(0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSBRK(r0, 0x5427) 06:05:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xf) r1 = dup2(r0, r0) write$P9_RWRITE(r1, 0x0, 0x0) 06:05:56 executing program 3: r0 = eventfd(0x0) write$P9_RGETATTR(r0, &(0x7f0000001b00)={0xa0}, 0xa0) 06:05:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NEW_STATION(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x10) 06:05:56 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) dup2(r1, r0) sendmsg$NL80211_CMD_SET_MESH_CONFIG(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 06:05:56 executing program 4: r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/current\x00', 0x2, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={0x0}}, 0x0) 06:05:56 executing program 5: pipe2$9p(&(0x7f0000001940)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000000)={0x6}, 0x0) 06:05:56 executing program 3: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000001080)='/dev/vcsa\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(r0, 0x5450, 0x0) 06:05:56 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$EVIOCSKEYCODE_V2(r0, 0x5452, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "9cc48d7b065b901dcbc47dbb8a93efcab34e00"}) 06:05:56 executing program 0: socketpair$unix(0x1, 0x200000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003b40)=[{{&(0x7f0000002d80)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) write$P9_RUNLINKAT(r0, 0x0, 0x0) dup3(r0, r2, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 06:05:56 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = dup(r0) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f00000008c0)={&(0x7f0000000140), 0xc, &(0x7f0000000880)={0x0}}, 0x0) 06:05:56 executing program 1: ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) 06:05:56 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$NS_GET_USERNS(r0, 0x5450, 0x0) 06:05:56 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180)={0x0, 0xea60}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = dup(r0) sendmsg$NL80211_CMD_ADD_NAN_FUNCTION(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 06:05:56 executing program 4: r0 = socket(0x10, 0x3, 0x0) getpeername$inet(r0, 0x0, &(0x7f0000000040)) 06:05:56 executing program 1: prctl$PR_CAPBSET_READ(0x1c, 0x100000000000021a) 06:05:56 executing program 5: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180)={0x77359400}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r2 = dup(r0) write$P9_RRENAMEAT(r2, 0x0, 0x0) 06:05:56 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSW2(r0, 0x4b36, 0x0) 06:05:56 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r0, 0x5451, 0x0) 06:05:56 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup2(r0, r1) sendmsg$SMC_PNETID_DEL(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 06:05:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup2(r0, r0) bind$netlink(r1, &(0x7f0000000180), 0xc) 06:05:56 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) close(r0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$netlink(r0, &(0x7f0000001fc0)={0x0, 0x0, 0x0}, 0x0) 06:05:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 06:05:56 executing program 2: r0 = timerfd_create(0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x5450, 0x0) 06:05:56 executing program 0: socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6}]}, 0x10) 06:05:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) dup2(r0, r1) getsockopt$inet6_tcp_buf(r1, 0x6, 0xd, 0x0, &(0x7f0000000140)) 06:05:57 executing program 5: sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) fsetxattr(r0, &(0x7f0000000000)=@known='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) 06:05:57 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETA(r0, 0x5425, 0x0) 06:05:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) write$evdev(0xffffffffffffffff, &(0x7f00000000c0)=[{{0x0, 0x7530}}, {{0x77359400}}], 0x30) r2 = gettid() timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x401004000000016) 06:05:57 executing program 2: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r0) socket(0x100000000011, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) 06:05:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) sendmsg$ETHTOOL_MSG_RINGS_SET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$inet6_udplite(0xa, 0x2, 0x88) tkill(r2, 0x1000000000016) 06:05:57 executing program 3: r0 = socket$nl_crypto(0x10, 0x3, 0x15) socketpair(0x1, 0x80005, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) dup2(r1, r0) write$char_usb(r0, 0x0, 0x0) 06:05:57 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f00000000c0)) 06:05:57 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000340)) 06:05:57 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) close(r0) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_GET_MPATH(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 06:05:57 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "99d5c4bc4963a907"}) 06:05:57 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000180)) 06:05:57 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) r2 = msgget$private(0x0, 0x240) shmat(r2, &(0x7f0000fff000/0x1000)=nil, 0x4000) msgctl$MSG_STAT_ANY(r2, 0xd, &(0x7f00000000c0)=""/253) semctl$GETZCNT(0xffffffffffffffff, 0x1, 0xf, &(0x7f00000001c0)=""/159) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=0x0) setfsuid(r3) r4 = getuid() write$P9_RSTATu(0xffffffffffffffff, &(0x7f0000000280)={0x58, 0x7d, 0x1, {{0x0, 0x43, 0x282, 0x0, {0x0, 0x4, 0x2}, 0x800000, 0x8, 0x8, 0x5, 0x0, '', 0x0, '', 0x9, '*/]&)$#%-', 0x7, ')\\,+{*#'}, 0xffffffffffffff66, '', 0x0, 0xee01, r4}}, 0x58) dup2(r0, r1) r5 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r5, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000080)=0x80) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r6, 0x6, 0x6, 0x0, &(0x7f0000000000)) r7 = shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x0) shmdt(r7) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="0232dcd6efac88ffffff", @ANYRES16=r8, @ANYBLOB="000a25bd7000ffdbdf2504007343346399c1f6171bee671da7a9076cff2a24a9a8843c9b118786091476ff574cb313fdf4135154a5cfa0ce5deac649404d7da5df2f44536031009aaf7a097a2660b00f1f9d785a2fc3d3be87a0badb04ab00000000c85f16842fb4382c00000000000000"], 0x28}, 0x1, 0x0, 0x0, 0x40851}, 0x20040040) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="f0000000", @ANYRES16=r8, @ANYBLOB="00042dbd7000fcdbdf250800000008000500000000000800040008000000080004007d07000014000180060002002e0000000800090075000000780003801400020076657468315f6d61637674617000000014000600fc0000000000000000000000000000000800010001000000080005000000000005000800ff0000000500080003000000060007004e220000140002007465616d3000000000000000000000000800010000000000060007004e20000038000180060001000200000008000b00736970000700060072720000060002001d0000000c0007000d000000100000000700060073680000838f7c9bf79460bbc86e7f749b98ed171a6a383f205a9325dcef9b49dc3d67d554b6819548cc997c9d6cea1e8f40d350092941d317866b095107a41beac1627a94abf004e2e75bdc07bf36bd2404700ad535e2f460a326f4fbb94def0a67678cff9d3aed422de84089e680f3f4b61e94b4f8cdb1a94aecc56c6b7e2e7157c99ca218d17dd1bfe70d54fcd1db05a63efab0950ce1c07b06d300a48f86169759a9cc2c8ea854c241cb416a7451229a820a6183d4ed21ddfad917877ebebddd4bd8fc3e7abe9c2afb68f7eb3e0038f6b489f472e1374b93f88c2c46a487cf85347645416c1e4f5ee3d3a134c73641bd92769cb264cca5d4c0c500"], 0xf0}, 0x1, 0x0, 0x0, 0x48000}, 0x4040000) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000003c0)={&(0x7f00000004c0)={0x7c, r8, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x20}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x240400c0) 06:05:57 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) 06:05:57 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000006c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(r0, 0x5450, 0x0) 06:05:57 executing program 1: sched_setscheduler(0x0, 0x5, &(0x7f00000004c0)) r0 = syz_open_dev$vcsa(&(0x7f0000000380)='/dev/vcsa#\x00', 0x6, 0x0) ioctl$TIOCSIG(r0, 0x5450, 0x0) 06:05:57 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x4000080) 06:05:57 executing program 0: r0 = socket$inet(0xa, 0x3, 0x4) setsockopt$inet_opts(r0, 0x29, 0x4, 0x0, 0x23) 06:05:57 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) dup2(r1, r0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, 0x0, 0x0) 06:05:57 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RRENAMEAT(r0, 0x0, 0x0) 06:05:57 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000005c00)='/dev/vcs\x00', 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r0, 0x0, 0x0) 06:05:58 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcs\x00', 0x0, 0x0) ioctl$KDGETMODE(r0, 0x4b3b, 0x0) 06:05:58 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x100000000000000, 0x0) ioctl$TUNSETGROUP(r0, 0x5451, 0x0) 06:05:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x800) 06:05:58 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r0, r1) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 06:05:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) dup2(r0, r1) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x12, 0x0, &(0x7f00000000c0)) 06:05:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_POWER_SAVE(r0, 0x0, 0x0) 06:05:58 executing program 1: process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000700), 0x0, 0x0) 06:05:58 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x4010) 06:05:58 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @empty}, 0x1c) dup2(r2, r2) dup2(r0, r1) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:05:58 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000340)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x200100c1, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r2 = dup2(r1, r1) sendmsg$TEAM_CMD_NOOP(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000013c0)={0x0}}, 0x0) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f0000000a00)={0x0, 0x9c8, "8b30f1c4e3c30d47225da787d6ed5062275d5085e0ffc1486c292ec1a21bd89a5b7418d0355deb67f0eff65efd9d0a2d28f0ffb9e4037b730127186871570c9af4b0561dba4769882ebb5b03a5b0f09630a4075a90a85476194ec2e90d7f1455f4163eb787dfee5be08c59084f807cc070f7473b2559651e3d0b9cf1b01f311290e7721db074892a28f9dafcada7d451ef488e731fb280480655c0b5f2b0ac26d0c0801991c982c623ebdb600f40a55fb7d877f431687172b6f7e693a62c6dc7de4307dbe9611312c0b5980d85a314c265085725140e4c001df23b16153353bb51a60e0775b5005d0e92abb40574f9269fb4e4d13bae8e2019b4162f92df4ec957c8a3b2e18099b41944a72f3f7ae635e15d05b0b3670d052fa35acdba2578381fe1818cc6a40dad0d9de791ec1b93b554ade9e5ff61da2e7797575c8925a020ae29a43984956de85d9426212589ed89482d35ed1a7ff24fd9290783a1111657fdeabc4d2a1ef624aed4cd0fa30fef766be5201260cf1d2bd24e6cd393df58de7fcc670e864e554bd52f43707637b8148e2d05d377f9ec7381143e1e0daf523a909c8cef79387fb9a6f75f7eb5438b69359465ccc6a7040e3217d745616febfb56b861f4e0bdae5f5a48d7df468520f0976515fd6b775f01a32c512f3e45482f1e40e6fccfb45207b66b2d467e4cfebe567e886487c8d04d0042944589f6909579406bd8f63010ba920c99f53b593bdcd43101c096181f55ea099508ba9b673db68c7d4035aace4b007a024f07b642bf43c9a4ce707d3825964be9ba7fb069338ba6dbfd3ef0df60d105203412b9e4ccc57d98fc65b74e89eb8c923a25b16a78ba3af118b128c714ad80b1de71f1733eb44d709d4deb66634ddc95702a7ca94aea84b656704b370d1bc8ad6a709e0c80cf7f864b1201c15673ee97b5c882d1adc5e44abf1be1821a2fdc18e3cefe4682de97f71c98ceaf980868e06cfec998807f744becabb403e59b8c1f26c5dd2f5cf39ef3874d46dceb6bf73a87ff7798b1d70a83c571f4a187fb7d29ffd713973877adb405ae50fd595c77201ff72b72ce7fd798192e098ff439dca2a3852f55476ef0359d4167a3c6b2799f3f21a9201a1fdb0ceb21a92be00a83161aacce5ecc460db1924e81abec3e3c9117825a72946651d1198371da46b84200ee2f79d609e86f7717accc10f814e735b31460833c94682f7a7cfe6c68cd93bcd2b50be64bd6bfeba580bf2ef6b8084e6b03ea29921f36d936415a997400356d818bbe32fdf8d469b5b74a7aaea57324378f10bebbaa73b80ae17fe91feb990fbd3eb50c1adbfad2653e0d315b43365fb9f5e555436d9ae5223b8ef25d6cd577847ced3f0465a086acbcc8e0d534075fb3061ebcaf285aad7ad6a392b11bae67b0beb88c26dedcdefabf5d67229b399b37af294d27d5039c2e3e2d09a350bbf5d6638394a863e4a35ec13318c20b11220313712aacffcfe5165aefc7fe0f8959e5c54299b87f35d9776280abce0d5bb25560f5fd7d0d2c0a8147a08861576b8210638019c913eeb658e254bedb894c878ae4bf0e504953486d47bc86a204addd710c503d576d9629c5939c545771639c766e1c499dd754ff204f4e0a2e71bb57552246a96c5cc4044ab37a7f30c0e9efed32f5f2bda4d3d2a8a696ab4cb4c5a736f074dc843843701dc22f08d5ac7ed4346fa82ec654cc13838e0622dfdcf414d1ab68230a91dd37320da2f23f390245a20025382a881bf6f7f8f4d6fc9ee171d052129f8c2eafa6bf7b98fa059fb36330328f65510b299cf9dc417796feb41d6a36f5ab2cbfcd2034fcedc6110c3128f39ffb03141cafd14f13c519b44f2b37e7e142cd1e4bf357335c36db33f54910585d5ef370c203fa4a6c0307a64b365b8969f72d752ac232b9d144fae4d9788b793bd54f98a0ab08e5627148f8b72cf00cb93a077c417ef089d5eb83381ca4edff1a2d6a5d3379824a6fbe7c5eda887e4944cce98faa88e64ea1fb3b486a02d2d9af95da0fbe2ddd87bb8ec13772c0d81f6609feda2d1bea7f75b68ec033e978bb9773b071ed68bdec1c2f98d6686951893f56f304863f719342bcfcdae72a6018bbd5fb43416b13798ca717f274a784d160322330fff1d1ae4272a27c6fc31801e010ce49ffe6ba873e65b7e59fae70a2e53fa9404bdd8fdb060d9dbbcd5e6d124f8c3919c7a4ef5cc3ee4a32e784b6a4e1df0068b4a35b8e18f49a4dbbaede3d069ef1f678f86e2dd6efe8f6e15df9ce10e985d24da1feb9a8d426a3e0e76d0ab3b71f0379c6f070e7dae74ba0cf4eeefcd07db27d440ac9187a345309da30037de4e7074c26944b799dea92c27589b342b4e5ea920cf1e4cb1a8c89ba8cdede3e424af7bcb4092def295d92b4ed133659c85fedfe7485bfdc7a694a84fa4bbdde7559472e7589323bfb59936e115b850bd4ca1d08162e518970860a3905dfbfa689f3ca598660c1e24dea6e953e80835e6541580745b5c7f30cd7d7dc6494b6c752f0c704d2997745edbe564217f90975bd94068c6f047cb7473a636473e3e04a1405fe0d5f601de128ec79b0e230197a7297cbf6fed7fdfeb52e83342d26b7ca190a8884ab9a5382eff0382f2d7f3050a52a20a51eb7e9c5d0f488aa458d2c5e763a90fbe99adafb206a2557fd51a4005fe3ded09afbed5dadecf37cc9c3eeea00e49a614f941e8e312e837e41c211454a0232fba359f18154d0e0dbd2cee6113524a8ed8c575ee8d3c0d8c0151648d56cb874b9ee6edb71e90e360a40674e0ca86100990659e83124722176740604f7e6f29ac61fff5e1ebe3476375b1076b27631fd978a609d0f06cf6192b84e248c8f199e533fd401bc1d965570681730193975ff86e5cd7055b5444a98b484fbbfc52d1ee3ee510e2ed4adf240bbd2917c252f816f4a5c21ac4f1ea3cdb5fc23363e188c3e7ff2a3d9de03d3a411faecee76b6d8360a7863a416a8a32bb8fe86e9ee4a0a795659dcc6256c5ffb482f5f411fee2a065fa6f64f7cb693371be7736b07b7866d8ac5a1e898dc3883c50fa0303978aa83bff6bedca7dfd377336da4ceea68993dbcdeac12297fea325d7ec8b037417b2a69d130e16a4bb13ed5a1dfd09608724aeb46ff320e76a1bf2e20cafff46f323baa5f55b65934af05592e631f8a5bde44a3cf726265787bfba67784e9dfed3fc05b6a79fb0851f7ebc10f522a9860c40a896f2cb79c8f8aee71968c67d687d6535d6dc32b19b04a42849f71f9782773740ca5a9eabfffc844e3716270190d5b946c208c0a88671b039c40de65474337989d9be691335958a8ad75a3ac290972129e40d5f0c44c9811259559512fcfbd1debd16c6f7ced8408bf6fc5d9dab64edc13cd9eca847bae77f551a41dd6257b9a0bdc5d3e8ae01b071afb32877106c5e5cea7a6cad4128d1ab4de8a13c7046ea95abcf5740a2b13009eea38bed872ed44d810619b0262ae18b18ecf6dda57e699e2539600d5f2f5f7cb01ff550a27045ce5c641209d33ce"}) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r0, 0x15) 06:05:58 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, "1a0600e2ffff0aca7effff0000e1ffbffff300"}) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$KDSKBSENT(r2, 0x4b49, &(0x7f0000000240)={0x1, "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"}) 06:05:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20050001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) sendmsg$GTP_CMD_GETPDP(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x24000040) 06:05:58 executing program 3: r0 = inotify_init1(0x0) close(r0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) write(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:05:58 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x200000000001, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = dup3(r1, r0, 0x0) r3 = accept4$packet(r2, 0x0, 0x0, 0x0) setsockopt$sock_timeval(r3, 0x1, 0x14, &(0x7f0000000080)={0x77359400}, 0x10) 06:05:58 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000380)={0x2, 0x0, @multicast2}, 0x10) 06:05:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x31, &(0x7f0000000040)={0x0, {{0x2, 0x0, @empty}}}, 0x88) 06:05:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r2 = dup2(r0, r0) write$tun(r2, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) close(r0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r3, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0xffffffffffffb939}, 0x1c) tkill(r1, 0x1000000000016) 06:05:58 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/urandom\x00', 0x0, 0x0) close(r0) socket(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_SET_WIPHY(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 06:05:58 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x5450, 0x0) 06:05:58 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLIST(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 06:05:58 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) getsockopt$inet_udp_int(r1, 0x11, 0xa, 0x0, &(0x7f00000000c0)) 06:05:58 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) io_setup(0x40a0, &(0x7f0000000040)) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x5452, &(0x7f0000000080)) 06:05:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=ANY=[], 0x168}}, 0xc014) 06:05:59 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001100)='/dev/full\x00', 0x109082, 0x0) write$P9_RRENAME(r0, 0x0, 0x0) 06:05:59 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000)='freezer.state\x00', 0x2, 0x0) write$P9_RWRITE(r0, 0x0, 0x0) 06:05:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = epoll_create1(0x0) dup2(r0, r1) getsockopt$inet6_buf(r1, 0x29, 0x3c, 0x0, &(0x7f0000000040)) 06:05:59 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) r1 = socket$nl_route(0x10, 0x3, 0x0) dup2(r1, r0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 06:05:59 executing program 1: pipe(&(0x7f0000002480)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) 06:05:59 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FS_IOC_SETVERSION(r0, 0x8912, &(0x7f0000000080)) 06:05:59 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = accept$packet(r1, 0x0, 0x0) getsockopt$IP_SET_OP_GET_BYNAME(r2, 0x1, 0x1a, 0x0, &(0x7f0000000180)) 06:05:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESTOP(r0, 0x5450, 0x0) 06:05:59 executing program 3: r0 = socket(0x10, 0x803, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r0, 0x891e, 0x0) 06:05:59 executing program 4: capset(&(0x7f0000000040)={0x20080522}, &(0x7f00000000c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) 06:05:59 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$P9_RMKDIR(r0, 0x0, 0x0) 06:05:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r4, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) setsockopt$sock_int(r3, 0x1, 0x2b, &(0x7f0000000100)=0x20, 0x4) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) tkill(r2, 0x1000000000016) 06:05:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000005c0)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000100), 0x1b5, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) r2 = accept4$packet(r0, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:05:59 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x4, 0x2000000008031, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$packet(r0, &(0x7f00000000c0), 0x14) 06:05:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ubi_ctrl\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000100)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) dup2(r0, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000200)=[@sack_perm, @timestamp, @mss, @window], 0x4) 06:05:59 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) readv(r0, 0x0, 0x0) 06:05:59 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) ioctl$EVIOCGBITSND(r0, 0x5451, 0x0) 06:05:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) dup2(r0, r1) sendmsg$NLBL_MGMT_C_PROTOCOLS(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 06:05:59 executing program 3: r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0xa5000900) r2 = inotify_init1(0x0) r3 = inotify_add_watch(r2, &(0x7f0000000180)='.\x00', 0xc0) inotify_rm_watch(r1, r3) [ 370.139339] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 370.173978] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 06:05:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) capset(&(0x7f00000000c0)={0x20071026}, &(0x7f0000000100)) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) 06:05:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, 0x0, 0x0, 0x20000050, &(0x7f0000001040)={0x2, 0x4e22, @empty}, 0x10) 06:05:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x20040800) 06:05:59 executing program 4: r0 = socket(0x11, 0x3, 0x0) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 06:05:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, 0x80) sendmsg$sock(r0, &(0x7f0000000500)={&(0x7f00000000c0)=@l2tp6={0xa, 0x0, 0x0, @empty}, 0x80, 0x0}, 0x24004050) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$ETHTOOL_MSG_DEBUG_GET(r1, &(0x7f0000000dc0)={0x0, 0x0, &(0x7f0000000d80)={0x0}}, 0x400c8c1) 06:05:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x5452, &(0x7f0000000080)=@generic) 06:05:59 executing program 2: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NL80211_CMD_GET_WOWLAN(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 06:05:59 executing program 5: r0 = open(&(0x7f0000000180)='./file0\x00', 0x442, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x2, &(0x7f0000000080)={'batadv0\x00', @dev}) 06:05:59 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) flock(r0, 0x8) 06:05:59 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000005c00)='/dev/vcs\x00', 0x0, 0x0) accept$unix(r0, 0x0, 0x0) 06:05:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) dup2(r0, r1) sendmsg$NL80211_CMD_CONTROL_PORT_FRAME(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) 06:05:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCGSTAMP(r0, 0x5450, 0x0) 06:05:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000280), 0x3d6, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) r2 = accept4$inet6(r0, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 06:05:59 executing program 1: shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x7800) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xa) 06:05:59 executing program 5: r0 = socket(0x11, 0x2, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000061c0)={0x0}}, 0x0) 06:05:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_DISASSOCIATE(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 06:05:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000003100), 0x0, 0x40000020, 0x0) 06:05:59 executing program 3: socketpair(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$netlink(r0, 0x0, &(0x7f0000000080)) 06:06:00 executing program 5: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ftruncate(r0, 0x0) 06:06:00 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) 06:06:00 executing program 0: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000880)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180)={0x77359400}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r2 = dup(r0) write$P9_RLINK(r2, 0x0, 0x0) [ 370.763926] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 06:06:00 executing program 3: r0 = open(&(0x7f0000000180)='./file0\x00', 0x442, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x5450, 0x0) 06:06:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) write$P9_RSTAT(r0, 0x0, 0xfffffde5) [ 370.810472] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 06:06:00 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(r0, r1, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f00000030c0)={0x0, 0x0, &(0x7f0000003080)={0x0}}, 0x0) 06:06:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, 0x0, &(0x7f0000000140)) 06:06:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr(r0, 0x0, 0x0, 0x0, 0x0) 06:06:00 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) close(r0) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)) write$P9_RFLUSH(r0, 0x0, 0x0) 06:06:00 executing program 2: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = dup2(r0, r0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) close(r1) socket(0xa, 0x2, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 06:06:00 executing program 5: r0 = eventfd(0x0) writev(r0, &(0x7f0000000a40)=[{&(0x7f00000004c0)="df015be2a1043cce", 0x8}], 0x1) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="aba732e9970a72a4", 0x8}], 0x1) r1 = gettid() timer_create(0x0, &(0x7f0000000780)={0x0, 0x12}, &(0x7f00009b1ffc)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 06:06:00 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) close(r0) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x560d, &(0x7f0000000240)={0xb}) 06:06:00 executing program 4: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/attr/exec\x00', 0x2, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 06:06:00 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) dup2(r0, r1) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 06:06:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x890b, &(0x7f0000000000)={'vxcan1\x00'}) 06:06:00 executing program 4: r0 = socket$nl_generic(0x2, 0x2, 0x88) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xfecb, &(0x7f0000000180)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 06:06:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x200000ee) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, 0x0, 0x0) r2 = eventfd(0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) r4 = dup2(r3, r2) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'veth1\x00'}) ioctl$EVIOCGUNIQ(r4, 0x80404508, 0x0) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 06:06:00 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) write$binfmt_misc(r0, 0x0, 0x0) 06:06:00 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='fd/3\x00') ioctl$BLKPG(r0, 0x1269, 0x0) 06:06:00 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NL80211_CMD_PROBE_CLIENT(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) 06:06:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) dup3(r0, r1, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 06:06:00 executing program 5: sched_setscheduler(0x0, 0x5, &(0x7f0000000000)) syz_open_procfs$namespace(0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0) 06:06:00 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) 06:06:00 executing program 4: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:06:00 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x2) write$nbd(r0, 0x0, 0x0) 06:06:00 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) getpeername(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f00000000c0)=0x80) dup2(r0, r1) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 06:06:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r0) socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, 0x59) 06:06:00 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$TUNGETDEVNETNS(r0, 0x5450, 0x0) ioctl$FITHAW(r1, 0x5450) 06:06:00 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, 0x0) 06:06:00 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 06:06:00 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) dup2(r1, r0) ioctl$TIOCGSID(r0, 0x5429, 0x0) 06:06:00 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x0, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x5451, 0x0) 06:06:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_pts(r0, 0x0) dup2(r1, r2) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000140)) 06:06:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x20040850) 06:06:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup2(r0, r1) sendmsg$NLBL_MGMT_C_ADDDEF(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 06:06:00 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) close(r0) epoll_create(0x9) epoll_wait(r0, &(0x7f00000006c0)=[{}], 0x1, 0x0) 06:06:00 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x2002, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) 06:06:00 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, 0x0) 06:06:00 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = dup2(r0, r0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$CHAR_RAW_ROSET(r1, 0x125d, 0x0) 06:06:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000440)='/dev/zero\x00', 0x0, 0x0) dup2(r0, r1) getpeername$inet(r1, 0x0, &(0x7f0000000180)) 06:06:01 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "043bfdd9a64e8286cae91ebd1315a6a3c3fb83"}) 06:06:01 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) ioctl$BTRFS_IOC_FS_INFO(r0, 0x8400941f, 0x0) 06:06:01 executing program 3: r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) close(r0) socket$inet6(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 06:06:01 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) ioctl$BTRFS_IOC_SET_FEATURES(r1, 0x540b, 0x0) 06:06:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r0) ioctl$LOOP_GET_STATUS(r0, 0x5452, &(0x7f0000000000)) 06:06:01 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:06:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r0) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 06:06:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) getsockopt$inet_mreqn(r1, 0x0, 0x20, 0x0, &(0x7f0000000000)=0x39a) 06:06:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_MCAST_RATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x20004000) 06:06:01 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 06:06:01 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r0, 0x8982, &(0x7f0000000100)) 06:06:01 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080), 0x2, 0x0) fstat(r0, &(0x7f0000000900)) 06:06:01 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) dup2(r0, r1) sendmsg$NL80211_CMD_GET_MPATH(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 06:06:01 executing program 2: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x8020003) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', 0x0, 0x0, 0x0) 06:06:01 executing program 4: r0 = epoll_create(0x6) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x0) 06:06:01 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={0x0}}, 0x0) 06:06:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SURVEY(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={0x0, 0xfffffdaf}}, 0x0) 06:06:01 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5452, &(0x7f0000000100)) 06:06:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000002380)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, 0x0}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000002600)={0x0, 0x0, &(0x7f00000025c0)={&(0x7f0000002580)={0x1c, 0x0, 0x70d}, 0x1c}}, 0x0) dup3(r0, r1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r2, &(0x7f0000002380)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, 0x0}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r2, &(0x7f0000002600)={0x0, 0x0, &(0x7f00000025c0)={&(0x7f0000002580)={0x1c, 0x0, 0x70d}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_START_AP(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001900)={0x0}}, 0x0) 06:06:01 executing program 5: sched_setscheduler(0x0, 0x5, &(0x7f0000000040)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, 0x0, 0x0) 06:06:01 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3) getsockopt$IP_SET_OP_GET_FNAME(r0, 0x1, 0xe, 0x0, &(0x7f0000000000)) 06:06:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) r1 = dup2(r0, r0) connect$netlink(r1, &(0x7f0000000280)=@unspec, 0x2) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 06:06:01 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_SET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 06:06:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6}]}, 0x10) r1 = dup(r0) sendmmsg$inet(r0, &(0x7f0000004200)=[{{&(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000008340)=ANY=[], 0x1f0}}], 0x1, 0x20008055) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x10040) 06:06:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CHANGE_NAN_CONFIG(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x44891) 06:06:01 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKFLSBUF(r0, 0x4c05, &(0x7f0000000000)) 06:06:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) tkill(r1, 0x1000000000016) [ 372.395748] sock: process `syz-executor.2' is using obsolete getsockopt SO_BSDCOMPAT 06:06:01 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) dup3(r1, r0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x6c1) r2 = dup(r0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x14}, 0x14}}, 0x0) 06:06:01 executing program 1: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = socket(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$KDGETKEYCODE(r2, 0x4b60, 0x0) 06:06:01 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) sendmsg$inet6(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 06:06:01 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000300)) 06:06:01 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) close(r0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) setsockopt$sock_int(r1, 0x1, 0x2b, &(0x7f0000000100)=0x20, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$NL80211_CMD_CHANGE_NAN_CONFIG(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 06:06:01 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$TIOCL_SELLOADLUT(r1, 0x541c, 0x0) 06:06:01 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) dup2(r1, r0) ioctl$TIOCGISO7816(r0, 0x540a, 0x0) 06:06:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x8000) 06:06:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000013"], 0x1c}}, 0x0) close(r1) socket$inet6(0xa, 0x3, 0xf9) tkill(r2, 0x1000000000016) 06:06:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) pipe2(&(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup2(r0, r1) sendmsg$ETHTOOL_MSG_COALESCE_GET(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) 06:06:01 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) dup2(r1, r2) r3 = accept4$unix(r2, 0x0, 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f0000000100), 0x4) 06:06:01 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000001280)='/dev/urandom\x00', 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_FLUSH_PMKSA(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 06:06:02 executing program 1: r0 = epoll_create(0x5) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000980)='/dev/autofs\x00', 0x0, 0x0) dup2(r0, r1) epoll_wait(r1, &(0x7f0000000e80)=[{}], 0x1, 0x0) 06:06:02 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x5, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup3(r1, r0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:06:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LISTALL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x8000) 06:06:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x2, &(0x7f0000000000)={'batadv_slave_0\x00'}) 06:06:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f00000007c0)='./file0\x00', 0x0) r2 = dup3(r0, r1, 0x0) ioctl$VT_RESIZE(r2, 0x5401, &(0x7f0000000000)) 06:06:02 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) close(r1) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r2, 0x0) connect$unix(r0, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) accept4$inet(r1, 0x0, 0x0, 0x0) 06:06:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={0x0}}, 0x0) 06:06:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x258}}, 0x20044001) 06:06:02 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) r1 = dup(r0) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r1, 0x8008f512, 0x0) 06:06:02 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) creat(&(0x7f0000000100)='./file0\x00', 0xca) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 06:06:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) dup3(r0, r1, 0x0) sendmsg$ETHTOOL_MSG_WOL_GET(r1, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={0x0}}, 0x44080) 06:06:02 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000640)='/dev/loop#\x00', 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x5452, &(0x7f0000000000)) 06:06:02 executing program 5: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) sendmsg$FOU_CMD_ADD(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 06:06:02 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f00000001c0)) 06:06:02 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FICLONERANGE(r0, 0x5452, &(0x7f0000000040)) 06:06:02 executing program 5: r0 = socket(0xa, 0x3, 0x2) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r0, &(0x7f0000000180)={&(0x7f0000000000), 0x26, &(0x7f0000000140)={&(0x7f0000000340)={0xbc, 0x0, 0x0, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private0}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8}]}, @MPTCP_PM_ATTR_ADDR={0x44, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_ID={0x5}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}]}, 0xbc}}, 0x0) 06:06:02 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x2) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = fcntl$dupfd(r0, 0x0, r0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, 0x0) 06:06:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000140)={0x0, 'lo\x00'}) 06:06:02 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6(0xa, 0x3, 0x400) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x17}}}, 0x1c) r2 = dup2(r1, r0) write$P9_RUNLINKAT(r2, 0x0, 0x0) [ 373.330114] 8021q: VLANs not supported on lo 06:06:03 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xd) listen(r1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = dup2(r1, r0) r4 = accept$inet6(r3, 0x0, 0x0) ioctl$FIBMAP(r4, 0x5452, &(0x7f0000000000)) 06:06:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, 0x0, 0x0) 06:06:03 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x14, 0x0, &(0x7f0000000040)) 06:06:03 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) write$P9_RCLUNK(r1, 0x0, 0x0) 06:06:03 executing program 0: semtimedop(0x0, &(0x7f0000000000)=[{}], 0x1, 0xfffffffffffffffd) 06:06:03 executing program 3: r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0x5450, 0x0) 06:06:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x5411, &(0x7f0000000080)={'batadv0\x00'}) 06:06:03 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20050091, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x274}}, 0x0) close(r1) socket$packet(0x11, 0x2, 0x300) tkill(r2, 0x1000000000016) 06:06:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x0, 0x0) dup3(r0, r1, 0x0) getsockopt$sock_int(r1, 0x1, 0x2b, 0x0, &(0x7f0000000240)) 06:06:03 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) getsockopt$IP_SET_OP_GET_BYNAME(r0, 0x1, 0x1a, 0x0, &(0x7f0000000040)) 06:06:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340)='/dev/hwrng\x00', 0x0, 0x0) dup2(r0, r1) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x14, 0x0, 0x0) 06:06:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[], 0x1cc}}, 0x40080) 06:06:03 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) close(r0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) bind$packet(r1, &(0x7f0000000000)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x0) 06:06:03 executing program 5: socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f0000000dc0)={0x0, 0x0, &(0x7f0000000d80)={0x0}}, 0x0) 06:06:03 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r0) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:06:03 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x0) 06:06:03 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_type(r0, 0x0, 0x0) 06:06:03 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x4) 06:06:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, 0x0, &(0x7f0000000040)) 06:06:04 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = open(&(0x7f0000001080)='./file0\x00', 0x40040, 0x0) dup3(r0, r1, 0x0) sendmsg$NL80211_CMD_SET_CQM(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) 06:06:04 executing program 4: sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) syz_open_procfs$namespace(0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) 06:06:04 executing program 0: r0 = socket(0x2, 0x2, 0x0) sendmsg$NL80211_CMD_SET_PMKSA(r0, &(0x7f00000019c0)={&(0x7f0000000000), 0x6e, &(0x7f0000000700)={0x0}}, 0x0) 06:06:04 executing program 5: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self\x00', 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 06:06:04 executing program 3: ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, 0x0) 06:06:04 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup3(r0, r1, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 06:06:04 executing program 5: socket$inet6(0xa, 0x1d, 0x0) 06:06:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup3(r0, r1, 0x0) write$binfmt_misc(r2, 0x0, 0x0) 06:06:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={0x0, 0xffffff7d}}, 0x0) 06:06:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) dup2(r0, r1) sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 06:06:04 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000002c0)=0x200, 0x4) connect$inet(r0, &(0x7f0000000780)={0x2, 0x4e23}, 0x10) write$P9_RSTATFS(r1, &(0x7f0000000100)={0x43}, 0x43) recvfrom(r1, 0x0, 0x0, 0x2000, 0x0, 0x0) sendmsg$NL80211_CMD_REGISTER_BEACONS(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 06:06:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000080)=0x80) dup3(r0, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 06:06:04 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x20, 0x0, &(0x7f0000000400)) 06:06:04 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x5421, &(0x7f0000000080)) 06:06:04 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = dup(r0) write$cgroup_subtree(r1, 0x0, 0x0) 06:06:04 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000400)) ioctl$TIOCL_SETVESABLANK(r0, 0x4b37, 0x0) 06:06:04 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_LIST(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 06:06:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vcs\x00', 0x0, 0x0) dup2(r0, r1) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x32, 0x0, &(0x7f0000000000)) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r3 = dup(r2) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$EVIOCGPHYS(r3, 0x80404507, &(0x7f0000000080)=""/191) 06:06:04 executing program 3: r0 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x5451, 0x0) 06:06:04 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 06:06:04 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x5450, 0x0) 06:06:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x4000002) 06:06:05 executing program 3: r0 = msgget(0xffffffffffffffff, 0x0) msgsnd(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="02"], 0x0, 0x0) msgrcv(r0, &(0x7f0000000040)=ANY=[], 0x0, 0x0, 0x800) 06:06:05 executing program 2: r0 = eventfd(0x0) close(r0) signalfd(0xffffffffffffffff, &(0x7f0000000340), 0x8) signalfd(r0, &(0x7f00000000c0), 0x8) 06:06:05 executing program 5: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x105600) 06:06:05 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$P9_RCLUNK(r0, &(0x7f0000000200)={0x7}, 0x7) 06:06:05 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0xc) 06:06:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$TIOCGPTPEER(r0, 0x8904, 0x74a000) 06:06:05 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r0, 0x5451, 0x0) 06:06:05 executing program 3: pselect6(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0), &(0x7f0000000140)={0x0}) 06:06:05 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000040)) 06:06:05 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$BTRFS_IOC_LOGICAL_INO(r0, 0x5451, 0x0) 06:06:05 executing program 0: semget$private(0x0, 0x1, 0x4fd) 06:06:05 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003b40)=[{{&(0x7f0000002d80)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) write$P9_RUNLINKAT(r0, 0x0, 0x0) dup3(r0, r2, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 06:06:05 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) 06:06:05 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$DEVLINK_CMD_SB_POOL_SET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="88"], 0x88}}, 0x0) close(r0) socket$inet_icmp_raw(0x2, 0x3, 0x1) tkill(r2, 0x1000000000016) 06:06:05 executing program 4: timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000180)={0x0, r2/1000+30000}, 0x10) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r3 = dup(r1) sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 06:06:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x4008014) 06:06:05 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 06:06:05 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private0}}}, &(0x7f0000000080)=0x80) ioctl$BLKPG(r1, 0x5450, 0x0) 06:06:05 executing program 1: r0 = openat$dir(0xffffffffffffff9c, &(0x7f000000bd00)='./file0\x00', 0x2a40, 0x0) readv(r0, 0x0, 0x0) 06:06:05 executing program 5: sched_setscheduler(0x0, 0x5, &(0x7f0000000180)) syz_open_procfs(0x0, 0x0) chown(&(0x7f0000000080)='./file0\x00', 0xee01, 0x0) 06:06:05 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) read(r0, &(0x7f0000000040)=""/18, 0x12) 06:06:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = dup2(r0, r0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000003500)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) tkill(r1, 0x1000000000016) 06:06:05 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10, 0x0}, 0x8880) sendmsg$NL80211_CMD_SET_CQM(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 06:06:05 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x29, 0x22, 0x0, 0x0) 06:06:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r1, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c40)={0x0}}, 0x0) 06:06:05 executing program 4: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0xe89c0, 0x0) 06:06:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_user\x00', 0x275a, 0x0) ioctl$SIOCGIFHWADDR(r0, 0x5421, &(0x7f00000000c0)) 06:06:05 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x6) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000003c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$sock_SIOCINQ(r2, 0x541b, 0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) 06:06:05 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) fcntl$notify(r0, 0x402, 0x0) 06:06:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x4c81a) 06:06:05 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) close(r0) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCBRADDBR(r0, 0x541b, 0x0) 06:06:05 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180)={0x77359400}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = dup(r0) r2 = gettid() sendmsg$NLBL_CALIPSO_C_LIST(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) timer_create(0x0, &(0x7f0000000280)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000140)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000016) 06:06:05 executing program 4: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, 0x0) 06:06:06 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001100)='/dev/autofs\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(r1, r0, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000000), 0x4) 06:06:06 executing program 2: r0 = inotify_init1(0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 06:06:06 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, 0x0) 06:06:06 executing program 4: r0 = socket(0x11, 0x3, 0x0) write$P9_RMKDIR(r0, 0x0, 0x0) 06:06:06 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000200)='/dev/urandom\x00', 0x0, 0x0) close(r0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000380)={0x0, "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"}) 06:06:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) dup2(r0, r1) sendmsg$ETHTOOL_MSG_FEATURES_GET(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) 06:06:06 executing program 3: msgget(0x0, 0x340) 06:06:06 executing program 2: r0 = socket$inet(0x2, 0x803, 0x1) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000100)) 06:06:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup2(r0, r0) sendmsg$NET_DM_CMD_START(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x24000880) 06:06:06 executing program 0: r0 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000b00)) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 06:06:06 executing program 4: r0 = socket(0x2, 0x2, 0x0) sendmsg$NL80211_CMD_DEAUTHENTICATE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 06:06:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x22, 0x0, &(0x7f0000000080)) 06:06:07 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x4000001) 06:06:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() write$P9_RSETATTR(r1, 0x0, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r4, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) setsockopt$sock_int(r3, 0x1, 0x2b, &(0x7f0000000100)=0x20, 0x4) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) tkill(r2, 0x1000000000016) 06:06:07 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='cmdline\x00') close(r0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) shutdown(r0, 0x0) 06:06:07 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x200000000001, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = dup3(r1, r0, 0x0) r3 = accept4$packet(r2, 0x0, 0x0, 0x0) ioctl$SIOCGSTAMP(r3, 0x5450, 0x0) 06:06:07 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000004c0)={&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}, 0x0) write$P9_RSETATTR(r1, 0x0, 0x0) dup2(r1, r2) sendmsg$IPVS_CMD_ZERO(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 06:06:07 executing program 0: r0 = open(&(0x7f00000005c0)='.\x00', 0x0, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_SET_CHANNEL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 06:06:07 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1, &(0x7f00000000c0), 0x4) 06:06:07 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0x5450, 0x0) 06:06:07 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0xe8d, 0x0) close(r0) socket(0xa, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x9, 0x0, &(0x7f0000000040)) 06:06:07 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0x100000289) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r0, 0x80089419, 0x0) 06:06:07 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup3(r1, r0, 0x0) r3 = accept4$unix(r2, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x2, &(0x7f0000000140)={'batadv_slave_1\x00'}) 06:06:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000080)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000340), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet6_int(r1, 0x29, 0x22, 0x0, 0x0) 06:06:07 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 06:06:07 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000140)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={0x0}}, 0x24000024) 06:06:07 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/dev\x00') 06:06:07 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) dup2(r0, r1) write$P9_RCLUNK(r1, 0x0, 0x0) 06:06:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000040)) 06:06:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2}, 0x1c) listen(r1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x2, @loopback}, 0x10) r2 = accept4$unix(r1, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 06:06:07 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$EVIOCGABS0(r0, 0x5450, 0x0) 06:06:07 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) ioctl$GIO_UNIMAP(r1, 0x4b66, 0x0) [ 378.299277] TCP: request_sock_TCP: Possible SYN flooding on port 2. Sending cookies. Check SNMP counters. 06:06:07 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000004500)='/dev/vcs#\x00', 0x0, 0x0) r2 = dup3(r1, r0, 0x0) sync_file_range(r2, 0x0, 0x0, 0x0) 06:06:08 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) write$cgroup_subtree(r0, 0x0, 0x0) 06:06:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 06:06:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='net/udplite6\x00') dup2(r0, r1) sendmsg$NL80211_CMD_SET_STATION(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 06:06:08 executing program 2: semop(0x0, &(0x7f0000000380)=[{0x3}], 0x1) 06:06:08 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) close(r0) socket$netlink(0x10, 0x3, 0x0) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 06:06:08 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = dup2(r1, r1) r3 = accept4$inet6(r2, 0x0, 0x0, 0x0) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 06:06:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000080)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) socket$unix(0x1, 0x1, 0x0) tkill(r1, 0x1000000000016) 06:06:08 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x54, 0x2ad640) r1 = syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x0, 0x1) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$VT_GETSTATE(r2, 0x5603, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r2, 0xc0406618, &(0x7f0000000000)={{0x0, 0x0, @reserved="f3a8746d6ec26a1f76f0b8fb6ddc22a22d172a5b5d411c8d4690d073ca131adf"}}) close(r0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(r0, 0x5409, 0x0) 06:06:08 executing program 0: sendmsg$BATADV_CMD_GET_HARDIF(0xffffffffffffffff, 0x0, 0x0) 06:06:08 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCCBRK(r0, 0x5428) 06:06:08 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x2a, 0x0, &(0x7f0000000040)) 06:06:08 executing program 1: pipe(&(0x7f0000002480)={0xffffffffffffffff, 0xffffffffffffffff}) renameat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 06:06:08 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) r1 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) ioctl$LOOP_SET_FD(r0, 0x5450, r1) 06:06:08 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$TUNGETDEVNETNS(r0, 0x5450, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x5450, 0x0) 06:06:08 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0xc91fb11b5068c3fc) 06:06:08 executing program 5: r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x80440, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000005280)) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={0x0}}, 0x0) 06:06:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create(0x100) dup3(r0, r1, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[], 0x214}}, 0x0) 06:06:09 executing program 2: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_DEL_KEY(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)={0x0}}, 0x0) 06:06:09 executing program 4: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:06:09 executing program 3: capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={0x0}}, 0x0) 06:06:09 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv_slave_0\x00'}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x890c, &(0x7f0000000000)={'ip6_vti0\x00', 0x0}) 06:06:09 executing program 5: socketpair$unix(0x1, 0x200000005, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000003b40)=[{{&(0x7f0000002d80)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) write$P9_RUNLINKAT(r0, 0x0, 0x0) dup3(r0, r2, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r3, &(0x7f0000002380)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, 0x0}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r3, &(0x7f0000002600)={0x0, 0x0, &(0x7f00000025c0)={&(0x7f0000002580)={0x1c, 0x0, 0x70d}, 0x1c}}, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 06:06:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000002240)='/dev/vcsa#\x00', 0x1000, 0x0) dup2(r0, r1) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000080), 0x4) 06:06:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000080)=0x80) dup3(r1, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_DEST(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 06:06:09 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x20000000001, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = accept4$inet(r2, 0x0, 0x0, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$sock_SIOCOUTQ(r3, 0x5411, &(0x7f0000000000)) 06:06:10 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x4c06, 0x0) 06:06:10 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r0) sendmsg$DEVLINK_CMD_SB_POOL_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:06:10 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCSTI(r1, 0x5412, 0x0) 06:06:10 executing program 3: r0 = socket(0x10, 0x2, 0x0) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) dup3(r0, r1, 0x0) sendmsg$DEVLINK_CMD_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:06:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffc47, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r0) r3 = socket$packet(0x11, 0x2, 0x300) r4 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r4, 0x0, 0x8, &(0x7f0000000040)=0xd3, 0x4) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) bind$packet(r3, &(0x7f0000000000)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) tkill(r2, 0x16) 06:06:10 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(r0, 0x5421, &(0x7f00000000c0)) 06:06:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = dup2(r0, r0) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x401004000000016) 06:06:10 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r0) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) 06:06:10 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ttyS3\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f00000001c0)) 06:06:10 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x0) 06:06:10 executing program 2: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x4, 0xffffffffffffffff}) 06:06:10 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000180)={0x0, 0x7530}, 0x10) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = dup(r0) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}}, 0x0) 06:06:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r2 = dup2(r0, r0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000000)={0x77359400}, 0x10) write$P9_RREMOVE(r2, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 06:06:10 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000001a00), 0x8, 0x0) close(r0) syz_open_dev$loop(&(0x7f0000007000)='/dev/loop#\x00', 0x2, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000000)) 06:06:10 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(r0, 0x0, 0x0) 06:06:10 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/11, 0x7103) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) r1 = dup(r0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r1, 0x8983, 0x0) 06:06:10 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x4, 0x0) dup2(r0, r1) setns(r1, 0x0) 06:06:10 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r1, &(0x7f0000000080), 0x1c) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = dup2(r1, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) dup2(r3, r0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, 0x0, 0x0) 06:06:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x26e1, 0x0) close(r0) socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 06:06:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendto(r0, 0x0, 0xff56, 0x0, 0x0, 0x5b) 06:06:11 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000700)='/dev/urandom\x00', 0x0, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$NLBL_UNLABEL_C_ACCEPT(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 06:06:11 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) write$P9_RREADDIR(r0, 0x0, 0x0) 06:06:11 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 06:06:11 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$sock(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="14", 0x1}], 0x1}, 0x8091) close(r0) 06:06:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0xe}]}]}}, &(0x7f00000001c0)=""/251, 0x32, 0xfb, 0x8}, 0x20) 06:06:11 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1a, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:06:11 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000000)=""/251, 0x26, 0xfb, 0x8}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x6, 0xfd, &(0x7f00000001c0)=""/253, 0x0, 0x0, [], 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x5}, 0x10}, 0x78) 06:06:11 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x10, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x48], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:06:11 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3230c8db, 0x0, 0x0, 0x0, 0x7, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:06:11 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x3, 0x3, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}}, &(0x7f0000000180)='syzkaller\x00', 0x6, 0xfd, &(0x7f00000001c0)=""/253, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:06:11 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x18eb0000000000}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x7, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 06:06:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum={0x0, 0x0, 0x0, 0xd}]}}, &(0x7f00000001c0)=""/251, 0x26, 0xfb, 0x8}, 0x20) 06:06:11 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) close(r0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)) 06:06:11 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) close(r0) 06:06:11 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x6, 0x3, &(0x7f0000000140)=@framed={{0x18, 0x2}}, &(0x7f0000000180)='syzkaller\x00', 0x6, 0xfd, &(0x7f00000001c0)=""/253, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:06:11 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f00000001c0)=""/251, 0x26, 0xfb, 0x8}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r0, 0x10, &(0x7f0000000100)={&(0x7f0000000040)=""/162, 0xa2}}, 0x10) 06:06:11 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x80, 0x0, @perf_config_ext={0x0, 0xcc27}, 0x4, 0x3230c8db, 0x5, 0x5, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 06:06:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x1}]}]}}, &(0x7f00000001c0)=""/251, 0x2e, 0xfb, 0x1}, 0x20) 06:06:11 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x19, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:06:11 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f00000001c0)=""/251, 0x26, 0xfb, 0x8}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r0, 0x10, &(0x7f00000003c0)={0x0, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=r1, 0x4) 06:06:11 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x2], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:06:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f00000001c0)=""/251, 0x26, 0xfb, 0x8}, 0x20) bpf$BPF_GET_BTF_INFO(0x17, 0x0, 0x0) 06:06:11 executing program 0: perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 06:06:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x5, 0x2}]}]}}, &(0x7f00000001c0)=""/251, 0x32, 0xfb, 0x8}, 0x20) 06:06:11 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x8, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:06:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f0000000200)=""/4096, 0xfe36, 0x1000, 0x1}, 0x20) 06:06:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@fwd={0x5}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x2e]}}, &(0x7f00000004c0)=""/147, 0x2b, 0x93, 0x1}, 0x20) 06:06:11 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18200000", @ANYRES32=0x1, @ANYBLOB="0000000000800000851000000400000018200000", @ANYRES32=0x1, @ANYBLOB="000000ffffff7f000000000003000000000000000000000018044500", @ANYRES32=0x1, @ANYBLOB="00000000000000008510"], &(0x7f0000000080)='syzkaller\x00', 0x4, 0xa6, &(0x7f00000000c0)=""/166, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:06:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x8}, 0x10) 06:06:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd={0x0, 0x600}]}}, &(0x7f0000000200)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 06:06:11 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x6, 0x3f9, &(0x7f0000000140)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x0, 0xfd, &(0x7f00000001c0)=""/253, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:06:11 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x4, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x48], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:06:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x5}, @func_proto]}, {0x0, [0x61]}}, &(0x7f0000000380)=""/194, 0x37, 0xc2, 0x1}, 0x20) 06:06:11 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x3, 0x3, &(0x7f0000000140)=@framed={{}, [], {0x95, 0x0, 0x0, 0x61020000}}, &(0x7f0000000180)='syzkaller\x00', 0x6, 0xfd, &(0x7f00000001c0)=""/253, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:06:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001200)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd={0x0, 0x0, 0x0, 0x7, 0x2}]}}, &(0x7f0000000200)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 06:06:11 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000500)={&(0x7f00000001c0)=@id={0x1e, 0x3, 0x0, {0x0, 0x3}}, 0x10, 0x0}, 0x0) 06:06:11 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x6, 0x3, &(0x7f0000000140)=@framed={{0x18, 0xf}}, &(0x7f0000000180)='syzkaller\x00', 0x6, 0xfd, &(0x7f00000001c0)=""/253, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:06:11 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:06:11 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x6, 0xfd, &(0x7f00000001c0)=""/253, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:06:11 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f00000001c0)=""/251, 0x26, 0xfb, 0x8}, 0x20) bpf$BPF_GET_BTF_INFO(0x17, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x10) 06:06:11 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x18, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:06:11 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x48], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:06:11 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000003480)={0x2, 0x0, 0x0, 0x0, 0x4}, 0x40) 06:06:11 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x6, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x6, 0xfd, &(0x7f00000001c0)=""/253, 0x0, 0x10, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:06:11 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x6, 0x3, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x4}}, &(0x7f0000000180)='syzkaller\x00', 0x6, 0xfd, &(0x7f00000001c0)=""/253, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:06:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xffffff1f}]}]}}, &(0x7f00000001c0)=""/251, 0x2e, 0xfb, 0x1}, 0x20) 06:06:11 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x6, 0x200001cd, &(0x7f0000000140)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x0, 0xfd, &(0x7f00000001c0)=""/253, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:06:11 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000000)=""/251, 0x26, 0xfb, 0x8}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x6, 0xfd, &(0x7f00000001c0)=""/253, 0x0, 0x0, [], 0x0, 0x1b, r0, 0x8, &(0x7f0000000300), 0x8, 0x10, 0x0}, 0x78) 06:06:11 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x6, &(0x7f0000000400)=@framed={{}, [@initr0, @alu={0x4, 0x0, 0xb}]}, &(0x7f0000000440)='syzkaller\x00', 0x2, 0xb4, &(0x7f0000000140)=""/180, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:06:11 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x1c, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:06:11 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000380)=@bpf_lsm={0x6, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x2, 0xfd, &(0x7f00000001c0)=""/253, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:06:11 executing program 2: 06:06:11 executing program 3: 06:06:11 executing program 1: 06:06:11 executing program 5: 06:06:11 executing program 2: 06:06:11 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x4, &(0x7f0000000400)=@framed={{}, [@alu={0x4}]}, &(0x7f0000000440)='syzkaller\x00', 0x2, 0xb4, &(0x7f0000000140)=""/180, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:06:11 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcs\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, 0x0, 0x0) 06:06:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x4008000) 06:06:11 executing program 1: 06:06:11 executing program 5: 06:06:11 executing program 2: 06:06:11 executing program 5: 06:06:11 executing program 1: 06:06:11 executing program 3: 06:06:11 executing program 0: 06:06:11 executing program 4: 06:06:11 executing program 2: 06:06:11 executing program 5: 06:06:11 executing program 3: 06:06:11 executing program 1: 06:06:11 executing program 4: 06:06:11 executing program 0: 06:06:12 executing program 3: 06:06:12 executing program 1: 06:06:12 executing program 4: 06:06:12 executing program 2: 06:06:12 executing program 0: 06:06:12 executing program 5: 06:06:12 executing program 3: 06:06:12 executing program 4: 06:06:12 executing program 1: 06:06:12 executing program 2: 06:06:12 executing program 0: 06:06:12 executing program 4: 06:06:12 executing program 5: 06:06:12 executing program 1: 06:06:12 executing program 2: 06:06:12 executing program 0: 06:06:12 executing program 3: 06:06:12 executing program 4: 06:06:12 executing program 1: 06:06:12 executing program 2: 06:06:12 executing program 3: 06:06:12 executing program 4: 06:06:12 executing program 5: 06:06:12 executing program 0: 06:06:12 executing program 1: 06:06:12 executing program 2: 06:06:12 executing program 3: 06:06:12 executing program 4: 06:06:12 executing program 0: 06:06:12 executing program 5: 06:06:12 executing program 1: 06:06:12 executing program 2: 06:06:12 executing program 3: 06:06:12 executing program 4: 06:06:12 executing program 0: 06:06:12 executing program 5: 06:06:12 executing program 3: 06:06:12 executing program 2: 06:06:12 executing program 1: 06:06:12 executing program 4: 06:06:12 executing program 5: 06:06:12 executing program 0: 06:06:12 executing program 2: 06:06:12 executing program 3: 06:06:12 executing program 4: 06:06:12 executing program 5: 06:06:12 executing program 2: 06:06:12 executing program 1: 06:06:12 executing program 0: 06:06:12 executing program 5: 06:06:12 executing program 4: 06:06:12 executing program 1: 06:06:12 executing program 3: 06:06:12 executing program 0: 06:06:12 executing program 2: 06:06:12 executing program 4: 06:06:12 executing program 5: 06:06:12 executing program 3: 06:06:12 executing program 0: 06:06:12 executing program 1: 06:06:12 executing program 5: 06:06:12 executing program 3: 06:06:12 executing program 4: 06:06:12 executing program 2: 06:06:12 executing program 0: 06:06:12 executing program 1: 06:06:12 executing program 3: 06:06:12 executing program 0: 06:06:12 executing program 5: 06:06:12 executing program 4: 06:06:12 executing program 2: 06:06:12 executing program 1: 06:06:12 executing program 3: 06:06:12 executing program 0: 06:06:12 executing program 4: 06:06:12 executing program 2: 06:06:12 executing program 5: 06:06:12 executing program 1: 06:06:12 executing program 3: 06:06:12 executing program 0: 06:06:12 executing program 4: 06:06:12 executing program 1: 06:06:12 executing program 2: 06:06:12 executing program 5: 06:06:12 executing program 4: 06:06:12 executing program 3: 06:06:12 executing program 0: 06:06:12 executing program 2: 06:06:12 executing program 1: 06:06:12 executing program 5: 06:06:12 executing program 4: 06:06:12 executing program 0: 06:06:12 executing program 3: 06:06:13 executing program 5: 06:06:13 executing program 3: 06:06:13 executing program 2: 06:06:13 executing program 4: 06:06:13 executing program 5: 06:06:13 executing program 1: 06:06:13 executing program 0: 06:06:13 executing program 3: 06:06:13 executing program 2: 06:06:13 executing program 4: 06:06:13 executing program 1: 06:06:13 executing program 5: 06:06:13 executing program 2: 06:06:13 executing program 0: 06:06:13 executing program 5: 06:06:13 executing program 3: 06:06:13 executing program 4: 06:06:13 executing program 1: 06:06:13 executing program 0: 06:06:13 executing program 2: 06:06:13 executing program 3: 06:06:13 executing program 2: 06:06:13 executing program 1: 06:06:13 executing program 3: 06:06:13 executing program 4: 06:06:13 executing program 5: 06:06:13 executing program 0: 06:06:13 executing program 3: 06:06:13 executing program 1: 06:06:13 executing program 2: 06:06:13 executing program 3: 06:06:13 executing program 4: 06:06:13 executing program 5: 06:06:13 executing program 1: 06:06:13 executing program 0: 06:06:13 executing program 2: 06:06:13 executing program 4: 06:06:13 executing program 0: 06:06:13 executing program 2: 06:06:13 executing program 3: 06:06:13 executing program 4: 06:06:13 executing program 5: 06:06:13 executing program 1: 06:06:13 executing program 0: 06:06:13 executing program 2: 06:06:13 executing program 3: 06:06:13 executing program 1: 06:06:13 executing program 4: 06:06:13 executing program 5: 06:06:13 executing program 2: 06:06:13 executing program 3: 06:06:13 executing program 1: 06:06:13 executing program 0: 06:06:13 executing program 4: 06:06:13 executing program 5: 06:06:13 executing program 2: 06:06:13 executing program 0: 06:06:13 executing program 5: 06:06:13 executing program 4: 06:06:13 executing program 3: 06:06:13 executing program 2: 06:06:13 executing program 1: 06:06:13 executing program 4: 06:06:13 executing program 0: 06:06:13 executing program 3: 06:06:13 executing program 1: 06:06:13 executing program 5: 06:06:13 executing program 3: 06:06:13 executing program 2: 06:06:13 executing program 1: 06:06:13 executing program 5: 06:06:13 executing program 4: 06:06:13 executing program 0: 06:06:13 executing program 2: 06:06:13 executing program 3: 06:06:13 executing program 1: 06:06:13 executing program 0: 06:06:13 executing program 4: 06:06:13 executing program 5: 06:06:13 executing program 2: 06:06:13 executing program 4: 06:06:13 executing program 5: 06:06:13 executing program 3: 06:06:13 executing program 2: 06:06:13 executing program 0: 06:06:13 executing program 4: 06:06:13 executing program 5: 06:06:13 executing program 1: 06:06:13 executing program 0: 06:06:13 executing program 3: 06:06:13 executing program 2: 06:06:14 executing program 4: 06:06:14 executing program 5: 06:06:14 executing program 1: 06:06:14 executing program 0: 06:06:14 executing program 2: 06:06:14 executing program 5: 06:06:14 executing program 4: 06:06:14 executing program 3: 06:06:14 executing program 2: 06:06:14 executing program 1: 06:06:14 executing program 5: 06:06:14 executing program 3: 06:06:14 executing program 0: 06:06:14 executing program 4: 06:06:14 executing program 1: 06:06:14 executing program 2: 06:06:14 executing program 3: 06:06:14 executing program 5: 06:06:14 executing program 0: 06:06:14 executing program 4: 06:06:14 executing program 2: 06:06:14 executing program 3: 06:06:14 executing program 1: 06:06:14 executing program 0: 06:06:14 executing program 4: 06:06:14 executing program 2: 06:06:14 executing program 3: 06:06:14 executing program 5: 06:06:14 executing program 4: 06:06:14 executing program 0: 06:06:14 executing program 2: 06:06:14 executing program 1: 06:06:14 executing program 5: 06:06:14 executing program 0: 06:06:14 executing program 3: 06:06:14 executing program 4: 06:06:14 executing program 1: 06:06:14 executing program 2: 06:06:14 executing program 4: 06:06:14 executing program 0: 06:06:14 executing program 3: 06:06:14 executing program 5: 06:06:14 executing program 4: 06:06:14 executing program 2: 06:06:14 executing program 1: 06:06:14 executing program 0: 06:06:14 executing program 3: 06:06:14 executing program 4: 06:06:14 executing program 5: 06:06:14 executing program 0: 06:06:14 executing program 4: 06:06:14 executing program 2: 06:06:14 executing program 1: 06:06:14 executing program 3: 06:06:14 executing program 5: 06:06:14 executing program 0: 06:06:14 executing program 1: 06:06:14 executing program 4: 06:06:14 executing program 2: 06:06:14 executing program 0: 06:06:14 executing program 3: 06:06:14 executing program 1: 06:06:14 executing program 4: 06:06:14 executing program 2: 06:06:14 executing program 5: 06:06:14 executing program 4: 06:06:14 executing program 0: 06:06:14 executing program 2: 06:06:14 executing program 3: 06:06:14 executing program 1: 06:06:14 executing program 4: 06:06:14 executing program 0: 06:06:14 executing program 5: 06:06:14 executing program 3: 06:06:14 executing program 4: 06:06:14 executing program 2: 06:06:14 executing program 1: 06:06:14 executing program 0: 06:06:14 executing program 3: 06:06:14 executing program 5: 06:06:14 executing program 1: 06:06:14 executing program 4: 06:06:14 executing program 2: 06:06:14 executing program 0: 06:06:14 executing program 5: 06:06:14 executing program 3: 06:06:14 executing program 1: 06:06:14 executing program 4: 06:06:14 executing program 2: 06:06:14 executing program 5: 06:06:14 executing program 1: 06:06:14 executing program 3: 06:06:15 executing program 0: 06:06:15 executing program 5: 06:06:15 executing program 4: 06:06:15 executing program 2: 06:06:15 executing program 1: 06:06:15 executing program 5: 06:06:15 executing program 3: 06:06:15 executing program 0: 06:06:15 executing program 4: 06:06:15 executing program 2: 06:06:15 executing program 5: 06:06:15 executing program 1: 06:06:15 executing program 2: 06:06:15 executing program 3: 06:06:15 executing program 1: 06:06:15 executing program 5: 06:06:15 executing program 0: 06:06:15 executing program 4: 06:06:15 executing program 2: 06:06:15 executing program 3: 06:06:15 executing program 1: 06:06:15 executing program 5: 06:06:15 executing program 0: 06:06:15 executing program 4: 06:06:15 executing program 2: 06:06:15 executing program 5: 06:06:15 executing program 1: 06:06:15 executing program 0: 06:06:15 executing program 3: 06:06:15 executing program 4: 06:06:15 executing program 5: 06:06:15 executing program 4: 06:06:15 executing program 1: 06:06:15 executing program 5: 06:06:15 executing program 2: 06:06:15 executing program 4: 06:06:15 executing program 3: 06:06:15 executing program 0: 06:06:15 executing program 1: 06:06:15 executing program 2: 06:06:15 executing program 5: 06:06:15 executing program 1: 06:06:15 executing program 4: 06:06:15 executing program 2: 06:06:15 executing program 0: 06:06:15 executing program 3: 06:06:15 executing program 4: 06:06:15 executing program 2: 06:06:15 executing program 0: 06:06:15 executing program 3: 06:06:15 executing program 5: 06:06:15 executing program 4: 06:06:15 executing program 1: 06:06:15 executing program 2: 06:06:15 executing program 0: 06:06:15 executing program 3: 06:06:15 executing program 4: 06:06:15 executing program 5: 06:06:15 executing program 0: 06:06:15 executing program 1: 06:06:15 executing program 3: 06:06:15 executing program 4: 06:06:15 executing program 2: 06:06:15 executing program 5: 06:06:15 executing program 0: 06:06:15 executing program 1: 06:06:15 executing program 4: 06:06:15 executing program 3: 06:06:15 executing program 2: 06:06:15 executing program 1: 06:06:15 executing program 3: 06:06:15 executing program 4: 06:06:15 executing program 2: 06:06:15 executing program 1: 06:06:15 executing program 5: 06:06:15 executing program 2: 06:06:15 executing program 0: 06:06:15 executing program 4: 06:06:15 executing program 3: 06:06:15 executing program 5: 06:06:15 executing program 0: 06:06:15 executing program 4: 06:06:15 executing program 3: 06:06:15 executing program 5: 06:06:15 executing program 1: 06:06:15 executing program 2: 06:06:15 executing program 4: 06:06:15 executing program 0: 06:06:15 executing program 3: 06:06:16 executing program 1: 06:06:16 executing program 4: 06:06:16 executing program 2: 06:06:16 executing program 0: 06:06:16 executing program 3: 06:06:16 executing program 5: 06:06:16 executing program 1: 06:06:16 executing program 2: 06:06:16 executing program 0: 06:06:16 executing program 4: 06:06:16 executing program 3: 06:06:16 executing program 5: 06:06:16 executing program 0: 06:06:16 executing program 1: 06:06:16 executing program 4: 06:06:16 executing program 3: 06:06:16 executing program 2: 06:06:16 executing program 5: 06:06:16 executing program 3: 06:06:16 executing program 4: 06:06:16 executing program 0: 06:06:16 executing program 1: 06:06:16 executing program 0: 06:06:16 executing program 3: 06:06:16 executing program 5: 06:06:16 executing program 2: 06:06:16 executing program 4: 06:06:16 executing program 0: 06:06:16 executing program 2: 06:06:16 executing program 1: 06:06:16 executing program 4: 06:06:16 executing program 5: 06:06:16 executing program 3: 06:06:16 executing program 2: 06:06:16 executing program 0: 06:06:16 executing program 4: 06:06:16 executing program 1: 06:06:16 executing program 5: 06:06:16 executing program 4: 06:06:16 executing program 3: 06:06:16 executing program 2: 06:06:16 executing program 0: 06:06:16 executing program 1: 06:06:16 executing program 5: 06:06:16 executing program 4: 06:06:16 executing program 3: 06:06:16 executing program 2: 06:06:16 executing program 0: 06:06:16 executing program 1: 06:06:16 executing program 3: 06:06:16 executing program 2: 06:06:16 executing program 0: 06:06:16 executing program 4: 06:06:16 executing program 3: 06:06:16 executing program 5: 06:06:16 executing program 2: 06:06:16 executing program 1: 06:06:16 executing program 4: 06:06:16 executing program 5: 06:06:16 executing program 3: 06:06:16 executing program 0: 06:06:16 executing program 5: 06:06:16 executing program 2: 06:06:16 executing program 4: 06:06:16 executing program 3: 06:06:16 executing program 1: 06:06:16 executing program 0: 06:06:16 executing program 3: 06:06:16 executing program 5: 06:06:16 executing program 4: 06:06:16 executing program 0: 06:06:16 executing program 2: 06:06:16 executing program 1: 06:06:16 executing program 5: 06:06:16 executing program 4: 06:06:16 executing program 2: 06:06:16 executing program 3: 06:06:16 executing program 0: 06:06:16 executing program 1: 06:06:16 executing program 3: 06:06:16 executing program 0: 06:06:16 executing program 4: 06:06:16 executing program 5: 06:06:16 executing program 2: 06:06:16 executing program 1: 06:06:16 executing program 3: 06:06:17 executing program 0: 06:06:17 executing program 4: 06:06:17 executing program 5: 06:06:17 executing program 2: 06:06:17 executing program 1: 06:06:17 executing program 3: 06:06:17 executing program 5: 06:06:17 executing program 4: 06:06:17 executing program 0: 06:06:17 executing program 2: 06:06:17 executing program 4: 06:06:17 executing program 3: 06:06:17 executing program 5: 06:06:17 executing program 1: 06:06:17 executing program 3: 06:06:17 executing program 5: 06:06:17 executing program 0: 06:06:17 executing program 2: 06:06:17 executing program 4: 06:06:17 executing program 1: 06:06:17 executing program 3: 06:06:17 executing program 5: 06:06:17 executing program 0: 06:06:17 executing program 2: 06:06:17 executing program 1: 06:06:17 executing program 4: 06:06:17 executing program 3: 06:06:17 executing program 5: 06:06:17 executing program 4: 06:06:17 executing program 1: 06:06:17 executing program 0: 06:06:17 executing program 2: 06:06:17 executing program 3: 06:06:17 executing program 5: 06:06:17 executing program 4: 06:06:17 executing program 1: 06:06:17 executing program 0: 06:06:17 executing program 3: 06:06:17 executing program 2: 06:06:17 executing program 5: 06:06:17 executing program 4: 06:06:17 executing program 1: 06:06:17 executing program 0: 06:06:17 executing program 3: 06:06:17 executing program 2: 06:06:17 executing program 5: 06:06:17 executing program 1: 06:06:17 executing program 4: 06:06:17 executing program 0: 06:06:17 executing program 3: 06:06:17 executing program 1: 06:06:17 executing program 2: 06:06:17 executing program 5: 06:06:17 executing program 4: 06:06:17 executing program 3: 06:06:17 executing program 0: 06:06:17 executing program 2: 06:06:17 executing program 1: 06:06:17 executing program 4: 06:06:17 executing program 0: 06:06:17 executing program 5: 06:06:17 executing program 4: 06:06:17 executing program 3: 06:06:17 executing program 1: 06:06:17 executing program 4: 06:06:17 executing program 5: 06:06:17 executing program 2: 06:06:17 executing program 0: 06:06:17 executing program 3: 06:06:17 executing program 4: 06:06:17 executing program 1: 06:06:17 executing program 2: 06:06:17 executing program 5: 06:06:17 executing program 1: 06:06:17 executing program 4: 06:06:17 executing program 2: 06:06:17 executing program 3: 06:06:17 executing program 0: 06:06:17 executing program 4: 06:06:17 executing program 1: 06:06:17 executing program 5: 06:06:17 executing program 3: 06:06:17 executing program 2: 06:06:17 executing program 0: 06:06:17 executing program 4: 06:06:17 executing program 3: 06:06:18 executing program 1: 06:06:18 executing program 5: 06:06:18 executing program 2: 06:06:18 executing program 0: 06:06:18 executing program 4: 06:06:18 executing program 3: 06:06:18 executing program 5: 06:06:18 executing program 2: 06:06:18 executing program 1: 06:06:18 executing program 0: 06:06:18 executing program 4: 06:06:18 executing program 5: 06:06:18 executing program 3: 06:06:18 executing program 2: 06:06:18 executing program 1: 06:06:18 executing program 0: 06:06:18 executing program 4: 06:06:18 executing program 3: 06:06:18 executing program 5: 06:06:18 executing program 2: 06:06:18 executing program 1: 06:06:18 executing program 4: 06:06:18 executing program 3: 06:06:18 executing program 2: 06:06:18 executing program 0: 06:06:18 executing program 1: 06:06:18 executing program 5: 06:06:18 executing program 4: 06:06:18 executing program 3: 06:06:18 executing program 2: 06:06:18 executing program 0: 06:06:18 executing program 1: 06:06:18 executing program 5: 06:06:18 executing program 4: 06:06:18 executing program 3: 06:06:18 executing program 2: 06:06:18 executing program 0: 06:06:18 executing program 5: 06:06:18 executing program 1: 06:06:18 executing program 4: 06:06:18 executing program 3: 06:06:18 executing program 2: 06:06:18 executing program 0: 06:06:18 executing program 5: 06:06:18 executing program 1: 06:06:18 executing program 4: 06:06:18 executing program 2: 06:06:18 executing program 0: 06:06:18 executing program 3: 06:06:18 executing program 4: 06:06:18 executing program 5: 06:06:18 executing program 1: 06:06:18 executing program 2: 06:06:18 executing program 0: 06:06:18 executing program 3: 06:06:18 executing program 4: 06:06:18 executing program 5: 06:06:18 executing program 1: 06:06:18 executing program 2: 06:06:18 executing program 5: 06:06:18 executing program 4: 06:06:18 executing program 0: 06:06:18 executing program 3: 06:06:18 executing program 2: 06:06:18 executing program 5: 06:06:18 executing program 4: 06:06:18 executing program 1: 06:06:18 executing program 0: 06:06:18 executing program 2: 06:06:18 executing program 5: 06:06:18 executing program 3: 06:06:18 executing program 2: 06:06:18 executing program 5: 06:06:18 executing program 0: 06:06:18 executing program 1: 06:06:18 executing program 4: 06:06:18 executing program 5: 06:06:18 executing program 4: 06:06:18 executing program 2: 06:06:18 executing program 3: 06:06:18 executing program 1: 06:06:18 executing program 0: clock_gettime(0x0, &(0x7f0000000080)={0x0}) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x1}, 0x0, &(0x7f00000000c0)={r0}) 06:06:18 executing program 2: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) 06:06:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:18 executing program 5 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:18 executing program 4 (fault-call:7 fault-nth:0): r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:18 executing program 0: [ 389.754795] FAULT_INJECTION: forcing a failure. [ 389.754795] name failslab, interval 1, probability 0, space 0, times 1 [ 389.785238] CPU: 0 PID: 2426 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 389.793104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 389.802463] Call Trace: 06:06:19 executing program 2: [ 389.805195] dump_stack+0x1b2/0x283 [ 389.809020] should_fail.cold+0x10a/0x154 [ 389.813281] should_failslab+0xd6/0x130 [ 389.817317] __kmalloc+0x2c1/0x400 [ 389.820983] ? SyS_memfd_create+0xbc/0x3c0 [ 389.825659] SyS_memfd_create+0xbc/0x3c0 [ 389.829722] ? shmem_fcntl+0x120/0x120 [ 389.833672] ? SyS_clock_settime+0x1a0/0x1a0 [ 389.838132] ? do_syscall_64+0x4c/0x640 [ 389.842105] ? shmem_fcntl+0x120/0x120 [ 389.845993] do_syscall_64+0x1d5/0x640 [ 389.849951] entry_SYSCALL_64_after_hwframe+0x46/0xbb 06:06:19 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x42, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, 0x0, 0x600, 0x0) unshare(0x8020000) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') setns(r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000040)='./file1\x00', 0x6, 0x9, &(0x7f0000001700)=[{&(0x7f00000003c0)="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", 0x1000, 0xfffffffffffffffc}, {&(0x7f00000001c0)="23aa1b576446313bea59fb7e8a06b5bf379172a8de0380bee7689f961817db1aaf85aa04757c01537695", 0x2a, 0xfff}, {&(0x7f0000000280)="72c118dcd8ccf3d027420435afc7a054536f81c38626c29a0cf948c5d9dee94f9638c25c9814a1234e5e121138910a5749c327de5e8eafad42c1104acce1e2925c7c4ff6893aefe7812ff4d49b37d9cb7914ad8bf0fd0226e8d71329b0217141c3d1e63dad572a773e243a5621db41135cd8d497eab2db5e23b8a9798edb832808da5d2211c98a7bbe7a25112c828b4ea479c162e35ad1e3eacfb77ded505116970b19da0515a6f8110fe465b4ba968977f9e357413286413a235036f905a597792bcaebdba3c4df34b7be17819e2b", 0xcf, 0x2}, {&(0x7f00000013c0)="99bf677cb3a079ddd7a6579f2397a961ef422a15f829b75003db12739584bdf7d9e40af26595fd164e5614353d407d4416bf72b837d00b0920c1990a7e2dbd8e19fb9dc3592ad2348375779ec2c13b3693d136456d2ab762b35d3232ec2097932461e6fd68de16a2efa016fb0febed3545e461", 0x73, 0x4}, {&(0x7f0000000200)="bbf8c9781a02a742e2256ebb14780f2b5877b7c67277bfcb11", 0x19, 0x52}, {&(0x7f0000001440)="e636c430d6480f38d54d0b68356cd0ef158e25d92327721f939c6bb26ff74bec7aae92a0071d9dfc833ec4a19ee14035b696e670c0abe165feaa61f9ecfd3cd1d7011fde6be99256992e4e390b63b007e11bdb82e5b197361c18b5ef9dc5626866f60ce74a6c4847070cf07d6d6535cc0252a3d4def37981e9cb831eca1350cac8f18b810ab83f8a56d3e17909e08015cb9649e0e4cd6dbf34a2b99ec1286021a84370c3ed854bfd7b3be86f2a8b839344a95e922a45356f9a844d7c4fdbd9becffdac9431115b3cfa2c6248d55b3b35b3aa080032bb79fe", 0xd8, 0xfffffffffffffc75}, {&(0x7f0000001540)="61316b063b77f06daecedbd4d4a1440ed2cf84e75a1d83b4cd629ada3b3dec3512cbc55aa3e0b54152e39257357e4b655325a621490ede15bf7e2ff8cd731cd48666e88269607d4e45cb739ae303e88187884d92d11e769d6d17f5eec1a693e896a883f58fafcbd23ab0cf230e84584956aa0dccacba0a904d683b849ecbceb7e009", 0x82, 0x29ad56e5}, {&(0x7f0000001600)="77c0966209e76e58338f7bcb11dff72fe5ad75b7c8c330ffd61cd535621e6aa5cd06317a1cc823f00b8e780281d9636d0dc8cf211ef1bef52da75f363a542b0d84e634a3223c0a15fcda1456f97aef79351cf75291c2e90f13612523a77bfc56795f9bd65c275466b27d6624e7cfd1ba70a2e1e43daddf94d699dcf1602953d37aa77842d3eaa2d7478110", 0x8b, 0x5}, {&(0x7f00000016c0)="5e097092de112d51072945015d9c76748006481032855a43689e84157e77cc1270c63a230e005fb0ceb6d5793fe3baa8", 0x30, 0x9}], 0x0, &(0x7f0000001800)={[{'+@/(!%]]+{%Y'}, {'!'}, {'ns/mnt\x00'}, {'\\(/#[%'}, {'ns/mnt\x00'}, {'ns/mnt\x00'}, {}], [{@dont_appraise='dont_appraise'}, {@subj_user={'subj_user', 0x3d, 'msdos\x00'}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}]}) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ppoll(&(0x7f0000001880)=[{r0, 0xa080}, {r0, 0x4000}, {r2, 0x8028}, {r0, 0x1000}, {r3}, {r0, 0x400}], 0x6, &(0x7f00000018c0)={0x0, 0x3938700}, &(0x7f0000001900)={[0x100]}, 0x8) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f0000000240)='./file1\x00', 0xffbfffff, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="2216050900000000666174000404090a0200027400f801", 0x17}], 0x0, &(0x7f0000000140)=ANY=[]) umount2(&(0x7f0000000380)='./file1\x00', 0x0) ftruncate(0xffffffffffffffff, 0x0) 06:06:19 executing program 1: 06:06:19 executing program 0: [ 389.855136] RIP: 0033:0x45deb9 [ 389.858327] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 389.866032] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045deb9 [ 389.873303] RDX: 0000000020000260 RSI: 0000000000000000 RDI: 00000000004c2927 [ 389.880573] RBP: 0000000000021640 R08: 0000000020000260 R09: 0000000000000000 [ 389.887852] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000004 [ 389.895121] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:19 executing program 2: [ 390.016042] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop3 06:06:19 executing program 1: 06:06:19 executing program 0: 06:06:19 executing program 5 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r2}, 0x8) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00') sendmsg$GTP_CMD_NEWPDP(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, r5, 0x1}, 0x14}}, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r8 = dup(r7) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r8}, 0x2c, {[{@access_user='access=user'}], [], 0x6b}}) sendmsg$GTP_CMD_NEWPDP(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r5, 0x2, 0x70bd2c, 0x25dfdbfb, {}, [@GTPA_NET_NS_FD={0x8, 0x7, r8}, @GTPA_VERSION={0x8}, @GTPA_I_TEI={0x8, 0x8, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20040800}, 0x805) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) [ 390.128194] squashfs: SQUASHFS error: Can't find a SQUASHFS superblock on loop3 06:06:19 executing program 3: 06:06:19 executing program 0: 06:06:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) sched_getparam(0xffffffffffffffff, &(0x7f00000000c0)) mknod(&(0x7f0000000100)='./file0\x00', 0x100, 0x3f) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:19 executing program 1: 06:06:19 executing program 0: 06:06:19 executing program 2: [ 390.202231] FAULT_INJECTION: forcing a failure. [ 390.202231] name failslab, interval 1, probability 0, space 0, times 0 06:06:19 executing program 0: [ 390.267430] CPU: 1 PID: 2467 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 390.275259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 390.284615] Call Trace: [ 390.287211] dump_stack+0x1b2/0x283 [ 390.290843] should_fail.cold+0x10a/0x154 [ 390.294996] should_failslab+0xd6/0x130 [ 390.298972] kmem_cache_alloc+0x28e/0x3c0 [ 390.303162] __d_alloc+0x2a/0xa20 [ 390.306683] ? lock_downgrade+0x740/0x740 [ 390.310845] __shmem_file_setup.part.0+0xcb/0x3c0 06:06:19 executing program 0: [ 390.315691] ? shmem_create+0x30/0x30 [ 390.319566] ? __alloc_fd+0x1be/0x490 [ 390.323378] SyS_memfd_create+0x1fc/0x3c0 [ 390.327786] ? shmem_fcntl+0x120/0x120 [ 390.331672] ? SyS_clock_settime+0x1a0/0x1a0 [ 390.336087] ? do_syscall_64+0x4c/0x640 [ 390.340058] ? shmem_fcntl+0x120/0x120 [ 390.343943] do_syscall_64+0x1d5/0x640 [ 390.347839] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 390.353023] RIP: 0033:0x45deb9 [ 390.356208] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 06:06:19 executing program 0: 06:06:19 executing program 0: 06:06:19 executing program 3: [ 390.363919] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045deb9 [ 390.371190] RDX: 0000000020000260 RSI: 0000000000000000 RDI: 00000000004c2927 [ 390.378459] RBP: 0000000000021640 R08: 0000000020000260 R09: 0000000000000000 [ 390.385727] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000004 [ 390.392994] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:19 executing program 5 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:19 executing program 1: 06:06:19 executing program 2: 06:06:19 executing program 3: 06:06:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYRES32=r0, @ANYRES64=r0], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:19 executing program 0: 06:06:19 executing program 1: 06:06:19 executing program 3: 06:06:19 executing program 0: 06:06:19 executing program 2: [ 390.504840] FAULT_INJECTION: forcing a failure. [ 390.504840] name failslab, interval 1, probability 0, space 0, times 0 06:06:19 executing program 1: 06:06:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) [ 390.579470] CPU: 1 PID: 2501 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 390.587298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 390.596652] Call Trace: [ 390.599242] dump_stack+0x1b2/0x283 [ 390.602885] should_fail.cold+0x10a/0x154 [ 390.607039] should_failslab+0xd6/0x130 [ 390.611015] kmem_cache_alloc+0x28e/0x3c0 [ 390.615162] ? shmem_destroy_callback+0xa0/0xa0 [ 390.620612] shmem_alloc_inode+0x18/0x40 [ 390.624672] ? shmem_destroy_callback+0xa0/0xa0 [ 390.629338] alloc_inode+0x5d/0x170 [ 390.632974] new_inode+0x1d/0xf0 [ 390.636337] shmem_get_inode+0x8b/0x890 [ 390.640312] __shmem_file_setup.part.0+0x104/0x3c0 [ 390.645241] ? shmem_create+0x30/0x30 [ 390.649041] ? __alloc_fd+0x1be/0x490 [ 390.653019] SyS_memfd_create+0x1fc/0x3c0 [ 390.657168] ? shmem_fcntl+0x120/0x120 [ 390.661053] ? SyS_clock_settime+0x1a0/0x1a0 [ 390.665459] ? do_syscall_64+0x4c/0x640 [ 390.669430] ? shmem_fcntl+0x120/0x120 [ 390.673316] do_syscall_64+0x1d5/0x640 [ 390.677209] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 390.682394] RIP: 0033:0x45deb9 [ 390.685578] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 390.693641] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045deb9 [ 390.700911] RDX: 0000000020000260 RSI: 0000000000000000 RDI: 00000000004c2927 [ 390.708269] RBP: 0000000000021640 R08: 0000000020000260 R09: 0000000000000000 [ 390.715547] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000004 06:06:19 executing program 5 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:19 executing program 2: 06:06:19 executing program 1: 06:06:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x1d, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000000000000000000ff01", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0xc00, 0x42) openat$ion(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ion\x00', 0x8a300, 0x0) r5 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) ioctl$BLKROGET(r5, 0x125e, &(0x7f00000000c0)) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:19 executing program 0: 06:06:19 executing program 3: [ 390.722817] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:20 executing program 2: 06:06:20 executing program 3: 06:06:20 executing program 0: 06:06:20 executing program 1: 06:06:20 executing program 2: 06:06:20 executing program 3: [ 390.808331] can: request_module (can-proto-0) failed. [ 390.816238] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 390.828724] FAULT_INJECTION: forcing a failure. [ 390.828724] name failslab, interval 1, probability 0, space 0, times 0 [ 390.876556] CPU: 1 PID: 2531 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 390.884384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 390.893736] Call Trace: [ 390.896330] dump_stack+0x1b2/0x283 [ 390.899963] should_fail.cold+0x10a/0x154 [ 390.904114] should_failslab+0xd6/0x130 [ 390.908619] kmem_cache_alloc+0x28e/0x3c0 [ 390.912966] get_empty_filp+0x86/0x3e0 [ 390.917644] alloc_file+0x23/0x440 [ 390.921281] __shmem_file_setup.part.0+0x198/0x3c0 [ 390.926219] ? shmem_create+0x30/0x30 [ 390.930018] ? __alloc_fd+0x1be/0x490 [ 390.933826] SyS_memfd_create+0x1fc/0x3c0 [ 390.937995] ? shmem_fcntl+0x120/0x120 [ 390.941896] ? SyS_clock_settime+0x1a0/0x1a0 [ 390.946308] ? do_syscall_64+0x4c/0x640 [ 390.950287] ? shmem_fcntl+0x120/0x120 [ 390.954190] do_syscall_64+0x1d5/0x640 [ 390.958212] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 390.963401] RIP: 0033:0x45deb9 [ 390.966584] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 390.974427] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045deb9 [ 390.981711] RDX: 0000000020000260 RSI: 0000000000000000 RDI: 00000000004c2927 [ 390.988988] RBP: 0000000000021640 R08: 0000000020000260 R09: 0000000000000000 [ 390.996245] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000004 [ 391.003679] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:20 executing program 5 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:20 executing program 2: 06:06:20 executing program 3: [ 391.022531] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 391.042271] can: request_module (can-proto-0) failed. 06:06:20 executing program 1: 06:06:20 executing program 0: 06:06:20 executing program 2: 06:06:20 executing program 3: 06:06:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @multicast1}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x4) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[], 0x48}}, 0x50) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=ANY=[@ANYBLOB="3000000024001d008000"/20, @ANYRES32=r4, @ANYBLOB="00000000f1ffffff000000000b000100636c736163740000"], 0x30}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@delchain={0x24, 0x2e, 0xf31, 0xfffffffd, 0x25dfdbff, {0x0, 0x0, 0x0, r4, {0xe, 0x2}, {0xfff2, 0xffff}, {0xe, 0xe}}}, 0x24}}, 0x40) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r6 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x24102, 0x0) ioctl$VT_DISALLOCATE(r7, 0x5608) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) [ 391.089898] FAULT_INJECTION: forcing a failure. [ 391.089898] name failslab, interval 1, probability 0, space 0, times 0 [ 391.164982] CPU: 1 PID: 2559 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 391.172816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 391.182173] Call Trace: [ 391.184768] dump_stack+0x1b2/0x283 [ 391.188410] should_fail.cold+0x10a/0x154 [ 391.192566] should_failslab+0xd6/0x130 [ 391.196632] kmem_cache_alloc_trace+0x29a/0x3d0 [ 391.201383] apparmor_file_alloc_security+0x129/0x800 [ 391.206684] security_file_alloc+0x66/0xa0 [ 391.210980] ? selinux_is_enabled+0x5/0x50 06:06:20 executing program 2: 06:06:20 executing program 0: [ 391.215308] get_empty_filp+0x15c/0x3e0 [ 391.219283] alloc_file+0x23/0x440 [ 391.222825] __shmem_file_setup.part.0+0x198/0x3c0 [ 391.227760] ? shmem_create+0x30/0x30 [ 391.231558] ? __alloc_fd+0x1be/0x490 [ 391.235369] SyS_memfd_create+0x1fc/0x3c0 [ 391.239516] ? shmem_fcntl+0x120/0x120 [ 391.243411] ? SyS_clock_settime+0x1a0/0x1a0 [ 391.247837] ? do_syscall_64+0x4c/0x640 [ 391.251813] ? shmem_fcntl+0x120/0x120 [ 391.255703] do_syscall_64+0x1d5/0x640 [ 391.259600] entry_SYSCALL_64_after_hwframe+0x46/0xbb 06:06:20 executing program 0: 06:06:20 executing program 2: [ 391.264795] RIP: 0033:0x45deb9 [ 391.268240] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 391.275948] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045deb9 [ 391.283218] RDX: 0000000020000260 RSI: 0000000000000000 RDI: 00000000004c2927 [ 391.290659] RBP: 0000000000021640 R08: 0000000020000260 R09: 0000000000000000 [ 391.297924] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000004 [ 391.305226] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:20 executing program 5 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:20 executing program 3: 06:06:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f00000000c0)=0x3f, 0x4) 06:06:20 executing program 1: 06:06:20 executing program 0: 06:06:20 executing program 2: 06:06:20 executing program 3: 06:06:20 executing program 0: 06:06:20 executing program 1: 06:06:20 executing program 2: [ 391.396596] FAULT_INJECTION: forcing a failure. [ 391.396596] name fail_page_alloc, interval 1, probability 0, space 0, times 1 06:06:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$IPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x43, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r6 = dup(r5) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB="ac771717d71b116f73e501c50c8935b78d66646e6f3d", @ANYRESHEX=r6, @ANYBLOB=',access=user,k']) ioctl$KVM_ASSIGN_SET_INTX_MASK(r6, 0x4040aea4, &(0x7f0000000240)={0x7fff, 0x4, 0x1, 0x5, 0xffffff01}) r7 = dup2(r2, r2) ioctl$sock_ax25_SIOCADDRT(r7, 0x890b, &(0x7f00000000c0)={@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x4, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @default, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) r8 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nvram\x00', 0x10003, 0x0) ioctl$BTRFS_IOC_SET_FEATURES(r8, 0x40309439, &(0x7f0000000340)={0x0, 0x1, 0x1c}) [ 391.472404] CPU: 1 PID: 2589 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 391.480232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 391.489588] Call Trace: [ 391.492179] dump_stack+0x1b2/0x283 [ 391.495816] should_fail.cold+0x10a/0x154 [ 391.499978] __alloc_pages_nodemask+0x22c/0x2720 [ 391.504739] ? __lock_acquire+0x5fc/0x3f20 [ 391.508989] ? static_obj+0x50/0x50 [ 391.512744] ? trace_hardirqs_on+0x10/0x10 [ 391.517007] ? gfp_pfmemalloc_allowed+0x150/0x150 06:06:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0x6b, "87a12e1b345ba15cd11d8565bdeac9e06ed0f7ff864cec586f062cae2973900dde6955c5193fb9b91f6fc45d71a6c4e06d9beefb380706b06808fdd09fb55d69c3f22ebb684b230473d3b21270622d5df6d1a0f6d3a4f48c4715180d2f43fd3279f02a68cc214a89f6d8b1"}, &(0x7f0000000180)=0x73) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f00000000c0)=0x800) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) [ 391.521858] ? __lock_acquire+0x5fc/0x3f20 [ 391.526109] ? __lock_acquire+0x5fc/0x3f20 [ 391.530993] ? __lock_acquire+0x5fc/0x3f20 [ 391.535764] alloc_pages_vma+0xd2/0x6d0 [ 391.540211] shmem_alloc_page+0xe0/0x180 [ 391.544277] ? shmem_swapin+0x180/0x180 [ 391.548271] ? __radix_tree_lookup+0x1b5/0x2e0 [ 391.552936] ? find_get_entry+0x312/0x630 [ 391.557217] ? check_preemption_disabled+0x35/0x240 [ 391.562422] ? __vm_enough_memory+0x261/0x520 [ 391.566928] shmem_alloc_and_acct_page+0x126/0x620 [ 391.572037] ? simple_xattr_get+0xe5/0x160 [ 391.576304] shmem_getpage_gfp+0x302/0x2810 [ 391.580641] ? simple_xattr_get+0xe5/0x160 [ 391.585484] ? shmem_alloc_and_acct_page+0x620/0x620 [ 391.590600] shmem_write_begin+0xeb/0x190 [ 391.594754] generic_perform_write+0x1c9/0x420 [ 391.599788] ? filemap_page_mkwrite+0x2d0/0x2d0 [ 391.604472] ? current_time+0xb0/0xb0 [ 391.608277] ? lock_acquire+0x170/0x3f0 [ 391.612257] __generic_file_write_iter+0x227/0x590 [ 391.617191] generic_file_write_iter+0x36f/0x650 [ 391.621953] __vfs_write+0x44c/0x630 [ 391.625667] ? do_truncate+0x129/0x1a0 [ 391.629554] ? kernel_read+0x110/0x110 [ 391.633520] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 391.638540] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 391.643302] vfs_write+0x17f/0x4d0 [ 391.646847] SyS_pwrite64+0x116/0x140 [ 391.650649] ? SyS_pread64+0x140/0x140 [ 391.654536] ? fput+0xb/0x140 [ 391.657640] ? do_syscall_64+0x4c/0x640 [ 391.661605] ? SyS_pread64+0x140/0x140 [ 391.665490] do_syscall_64+0x1d5/0x640 [ 391.669546] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 391.674833] RIP: 0033:0x417a17 [ 391.678035] RSP: 002b:00007fde1c26ca20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 391.685884] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000417a17 [ 391.693272] RDX: 000000000000012b RSI: 0000000020010000 RDI: 0000000000000004 [ 391.700537] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 391.707788] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 391.715036] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000210 06:06:21 executing program 5 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x3, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[@ANYRES32=r3], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:21 executing program 1: 06:06:21 executing program 3: 06:06:21 executing program 2: 06:06:21 executing program 0: [ 391.775380] print_req_error: I/O error, dev loop5, sector 0 06:06:21 executing program 1: [ 391.851124] FAULT_INJECTION: forcing a failure. [ 391.851124] name failslab, interval 1, probability 0, space 0, times 0 [ 391.862591] CPU: 1 PID: 2630 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 391.870391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 391.879743] Call Trace: [ 391.882332] dump_stack+0x1b2/0x283 [ 391.885972] should_fail.cold+0x10a/0x154 [ 391.890129] should_failslab+0xd6/0x130 [ 391.894109] kmem_cache_alloc+0x40/0x3c0 [ 391.898168] radix_tree_node_alloc.constprop.0+0x1b0/0x2f0 [ 391.903773] __radix_tree_create+0x323/0x4b0 [ 391.908161] __radix_tree_insert+0x98/0x4f0 [ 391.912608] ? __radix_tree_create+0x4b0/0x4b0 [ 391.917169] ? shmem_add_to_page_cache+0x1e7/0x730 [ 391.922079] shmem_add_to_page_cache+0x503/0x730 [ 391.926815] ? shmem_recalc_inode+0x2f0/0x2f0 [ 391.931288] ? __radix_tree_preload+0x1c3/0x250 [ 391.935938] shmem_getpage_gfp+0x115b/0x2810 [ 391.940330] ? simple_xattr_get+0xe5/0x160 [ 391.944543] ? shmem_alloc_and_acct_page+0x620/0x620 [ 391.949669] shmem_write_begin+0xeb/0x190 [ 391.953805] generic_perform_write+0x1c9/0x420 [ 391.958606] ? filemap_page_mkwrite+0x2d0/0x2d0 [ 391.963259] ? current_time+0xb0/0xb0 [ 391.967215] ? lock_acquire+0x170/0x3f0 [ 391.971187] __generic_file_write_iter+0x227/0x590 [ 391.976107] generic_file_write_iter+0x36f/0x650 [ 391.980857] __vfs_write+0x44c/0x630 [ 391.984547] ? do_truncate+0x129/0x1a0 [ 391.988418] ? kernel_read+0x110/0x110 [ 391.992296] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 391.997563] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 392.002312] vfs_write+0x17f/0x4d0 [ 392.006044] SyS_pwrite64+0x116/0x140 [ 392.009828] ? SyS_pread64+0x140/0x140 [ 392.013697] ? fput+0xb/0x140 [ 392.016811] ? do_syscall_64+0x4c/0x640 [ 392.020803] ? SyS_pread64+0x140/0x140 [ 392.024804] do_syscall_64+0x1d5/0x640 [ 392.028684] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 392.034120] RIP: 0033:0x417a17 [ 392.037295] RSP: 002b:00007fde1c26ca20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 392.044995] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000417a17 [ 392.052250] RDX: 000000000000012b RSI: 0000000020010000 RDI: 0000000000000004 [ 392.059523] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 392.066788] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 392.074037] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000210 [ 392.090110] BTRFS info (device loop5): turning off barriers 06:06:21 executing program 1: 06:06:21 executing program 2: 06:06:21 executing program 0: 06:06:21 executing program 3: 06:06:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000000000000000000ff01", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) sendmsg$RDMA_NLDEV_CMD_GET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x1401, 0x1, 0x70bd28, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x4000040) r6 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) [ 392.102980] BTRFS info (device loop5): unrecognized mount option 'fragment=all' [ 392.144530] BTRFS error (device loop5): open_ctree failed 06:06:21 executing program 5 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:21 executing program 2: 06:06:21 executing program 0: 06:06:21 executing program 3: 06:06:21 executing program 1: [ 392.191811] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 392.205364] print_req_error: I/O error, dev loop5, sector 0 [ 392.223347] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 06:06:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, 0x1411, 0x20, 0x70bd2c, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8, 0x4f, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_STAT_MODE={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x20080020}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:21 executing program 0: 06:06:21 executing program 1: 06:06:21 executing program 3: 06:06:21 executing program 2: [ 392.309085] FAULT_INJECTION: forcing a failure. [ 392.309085] name failslab, interval 1, probability 0, space 0, times 0 06:06:21 executing program 0: [ 392.375350] CPU: 1 PID: 2664 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 392.383183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 392.392535] Call Trace: [ 392.395125] dump_stack+0x1b2/0x283 [ 392.398757] should_fail.cold+0x10a/0x154 [ 392.402946] should_failslab+0xd6/0x130 [ 392.406921] kmem_cache_alloc+0x28e/0x3c0 [ 392.411067] getname_flags+0xc8/0x550 [ 392.414871] do_sys_open+0x1ce/0x410 [ 392.418589] ? filp_open+0x60/0x60 06:06:21 executing program 0: [ 392.422130] ? SyS_pwrite64+0xca/0x140 [ 392.426012] ? fput+0xb/0x140 [ 392.429118] ? do_syscall_64+0x4c/0x640 [ 392.433091] ? do_sys_open+0x410/0x410 [ 392.436973] do_syscall_64+0x1d5/0x640 [ 392.440866] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 392.446053] RIP: 0033:0x4179b1 [ 392.449586] RSP: 002b:00007fde1c26ca20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 392.457381] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004179b1 [ 392.464741] RDX: 0000000000000274 RSI: 0000000000000002 RDI: 00007fde1c26cae0 06:06:21 executing program 5 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) fstat(r3, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@uid={'uid', 0x3d, r4}}]}) socket(0x10, 0x2, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0x17) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r7, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r7, @ANYBLOB="100006000000000020"], 0x34, 0x0) setresgid(0x0, r7, 0x0) fchownat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', r4, r7, 0x400) 06:06:21 executing program 0: 06:06:21 executing program 1: 06:06:21 executing program 2: 06:06:21 executing program 3: [ 392.472041] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 392.479311] R10: 0000000000010b20 R11: 0000000000000293 R12: 0000000000000004 [ 392.486579] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 06:06:21 executing program 0: 06:06:21 executing program 1: 06:06:21 executing program 3: 06:06:21 executing program 2: 06:06:21 executing program 0: 06:06:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001640)='/dev/vcs\x00', 0x80402, 0x0) ioctl$SIOCPNGETOBJECT(r4, 0x89e0, &(0x7f0000001680)=0x2) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x10000004}, 0x840) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000000000000000000ff01", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000017c0)={&(0x7f0000001700)=@gettclass={0x24, 0x2a, 0x4, 0x70bd2b, 0x25dfdbfb, {0x0, 0x0, 0x0, r5, {0x7, 0xf}, {0xfff2, 0xfff3}, {0xf, 0xfff3}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x20044042}, 0x40c85) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000054c0)=@delchain={0x24, 0x2e, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xfff2, 0xffff}}}, 0x24}}, 0x0) writev(r2, &(0x7f00000015c0)=[{&(0x7f0000000100)="fdc37f9b597cd7219086d8ffd97e339702762c951fea8a9e8bae49c9550024f064b1f32164fababbd70fd116fda4acd9124dea74831bd47dc1ca70d076202276892d63d027486e03274a2e9195dd76b0c95f66d4524b7ac97997b82c419614030d94b4a783cfedd6fe27937d1d42f5cc26d1f8e769d0b83a2d30d6c0d2b82c87238d5a3f772f4a29b3398d1b2aeef16521a4fb2a9a3f7dd3e695dfbab45be20b6ad8529fed33e3a6ffb8230bed18e1cad3d50009ba2f2ec064d5cce0d177450722c7539a830773", 0xc7}, {&(0x7f0000000200)="a895252254f4a8b8b8e4f9330a7d31c7a8d10c11f5c2c299b39d021d3f588e21b652e9ce8dd4e4af8c41da68dc24ff404c0a32be4a34d5857baec2c3a1acdbec91cd1c424eb9b3267ed818a8d9c7c69e043f140dd408a3d37269c992d439564b09075012fe77706fb0cde5dd1dcf2429f3f323b655ac684efcb805295bbb1dd790ac7385b258bed8ebf8d971ac2255f5296f502259983e4a9aa46c3d02a0780f53c5a1f48ea96f0b517c97f75e87ed42a2560fc1a0d272af9fe83fb5691c5d4a8fd6c8a27b4fedb9f7c70d7e8cd528ec946453cacae5fcce7a03bdeb138e670955ff1f42dabbe9becfb68dfab88b", 0xee}, {&(0x7f0000000300)="62affec9201fd274796c9926e43f9bef80100dedd12c7dd79169b9fb977dec0eff46784f80793fb1f46487a0cd59cafcc67b5840b96c738c4a1d3553cebf1cf2b2cb2d614857d9aa612e968a3ba0061c30f3f2665db8bc64eef05b55007879cf28d4b050b29a02f62b7741c4cedf3b66e70b8a9cb1626423958eeac718402a4ca87916e9abfb6d74562db394bcad6233682645f8b1d3960407983f02c0b602a1eb40d54cb01b3d734474b0923c", 0xad}, {&(0x7f00000003c0)="02ee83ba5c0f6adfb98ff7dc8e4ec1d8a9c6c5e4f25b622db57751b33596bf59a0fabb9bb3205d24220314332ae7cd1a06f6ea18047d508a1e0f7c82b320567e2a41ca7b944463a2cc4e37b58c25203596953445e7509e6652857ad1b6b2a112caa4a5cbf0f117b9dd4925d45314165bc1393c95115f86bd4fc1b3e3aed00b0738ed38de702475694b34e25b87633985b1215e64ab91be13797d01dc5287e328dfcbacf8341d58e364915c57ef116de7eea839fa88250b56e7f663a667ee210ef54a29a4f86b52e6ef5e82bff596870c72f9014c5f4a160125b2cd43553af77d367606ebce5a87ae4fbf09d893fcf96c6527717a", 0xf4}, {&(0x7f00000004c0)="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", 0x1000}, {&(0x7f0000000080)="01", 0x1}, {&(0x7f00000014c0)="5ee0683337cf643abea30d9bfa9ec33dd4858cdc1f73361bd79947c5e6", 0x1d}, {&(0x7f0000001500)="916ae0f0980318acb5a2ad80f186b56ca42b80ea421e1970d68fe656b8ccc3f6a4eeb6d40505b3ac8268324df4a41dfa99f2901e5a429bd9fb489cf032519aa81f6490923528db131b3d9ede8fa16eb4c4bd5b028055a9536fae406b131cffb2a279d84b06b36987177bea2c2b7128d3d3b7813ab731824b57cf508f74bcc48cd53495e31306b249f702b2", 0x8b}], 0x8) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_open_dev$audion(&(0x7f00000016c0)='/dev/audio#\x00', 0x10000, 0x10080) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) [ 392.649606] FAULT_INJECTION: forcing a failure. [ 392.649606] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 392.661438] CPU: 1 PID: 2694 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 392.669234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 392.678587] Call Trace: [ 392.681188] dump_stack+0x1b2/0x283 [ 392.684856] should_fail.cold+0x10a/0x154 [ 392.689318] __alloc_pages_nodemask+0x22c/0x2720 [ 392.694873] ? __lock_acquire+0x5fc/0x3f20 [ 392.699116] ? generic_file_write_iter+0x37a/0x650 [ 392.704139] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 392.708986] ? trace_hardirqs_on+0x10/0x10 [ 392.713916] ? lock_downgrade+0x740/0x740 [ 392.718065] ? up_write+0x17/0x60 [ 392.721519] ? generic_file_write_iter+0x2f8/0x650 [ 392.726891] cache_grow_begin+0x8f/0x420 [ 392.730956] cache_alloc_refill+0x273/0x350 [ 392.735285] kmem_cache_alloc+0x333/0x3c0 [ 392.739430] getname_flags+0xc8/0x550 [ 392.743232] do_sys_open+0x1ce/0x410 [ 392.746966] ? filp_open+0x60/0x60 [ 392.750503] ? SyS_pwrite64+0xca/0x140 [ 392.754388] ? fput+0xb/0x140 [ 392.757525] ? do_syscall_64+0x4c/0x640 [ 392.761497] ? do_sys_open+0x410/0x410 [ 392.765927] do_syscall_64+0x1d5/0x640 [ 392.769813] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 392.774986] RIP: 0033:0x4179b1 [ 392.778161] RSP: 002b:00007fde1c26ca20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 392.785847] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004179b1 [ 392.793096] RDX: 0000000000000274 RSI: 0000000000000002 RDI: 00007fde1c26cae0 [ 392.800345] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 392.807609] R10: 0000000000010b20 R11: 0000000000000293 R12: 0000000000000004 [ 392.814868] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 392.832574] BTRFS info (device loop5): turning off barriers [ 392.838845] BTRFS info (device loop5): unrecognized mount option 'fragment=all' 06:06:22 executing program 5 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:22 executing program 2: 06:06:22 executing program 0: 06:06:22 executing program 1: 06:06:22 executing program 3: [ 392.884329] BTRFS error (device loop5): open_ctree failed [ 392.890396] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 392.941470] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 06:06:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0xffff, @private=0xa010101}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000000000000000000ff01", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {0x4}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000054c0)=@delchain={0x24, 0x2e, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xfff2, 0xffff}}}, 0x24}}, 0x0) write$binfmt_script(r4, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:22 executing program 2: 06:06:22 executing program 1: [ 392.994552] FAULT_INJECTION: forcing a failure. [ 392.994552] name failslab, interval 1, probability 0, space 0, times 0 [ 393.011552] CPU: 1 PID: 2733 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 393.019372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 393.028749] Call Trace: [ 393.031343] dump_stack+0x1b2/0x283 [ 393.035239] should_fail.cold+0x10a/0x154 [ 393.039396] should_failslab+0xd6/0x130 06:06:22 executing program 0: [ 393.043463] kmem_cache_alloc_trace+0x29a/0x3d0 [ 393.048141] apparmor_file_alloc_security+0x129/0x800 [ 393.053522] security_file_alloc+0x66/0xa0 [ 393.057790] ? selinux_is_enabled+0x5/0x50 [ 393.062033] get_empty_filp+0x15c/0x3e0 [ 393.066009] path_openat+0x84/0x2970 [ 393.069824] ? generic_file_write_iter+0x37a/0x650 [ 393.074760] ? path_lookupat+0x780/0x780 [ 393.078834] ? trace_hardirqs_on+0x10/0x10 [ 393.083072] ? __generic_file_write_iter+0x194/0x590 [ 393.088186] do_filp_open+0x179/0x3c0 06:06:22 executing program 0: 06:06:22 executing program 0: [ 393.091987] ? may_open_dev+0xe0/0xe0 [ 393.095788] ? __alloc_fd+0x1be/0x490 [ 393.099598] ? lock_downgrade+0x740/0x740 [ 393.104100] ? do_raw_spin_unlock+0x164/0x220 [ 393.108600] ? _raw_spin_unlock+0x29/0x40 [ 393.112746] ? __alloc_fd+0x1be/0x490 [ 393.116553] do_sys_open+0x296/0x410 [ 393.120268] ? filp_open+0x60/0x60 [ 393.123818] ? SyS_pwrite64+0xca/0x140 [ 393.127705] ? fput+0xb/0x140 [ 393.130807] ? do_syscall_64+0x4c/0x640 [ 393.134779] ? do_sys_open+0x410/0x410 [ 393.138670] do_syscall_64+0x1d5/0x640 06:06:22 executing program 0: [ 393.142563] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 393.147759] RIP: 0033:0x4179b1 [ 393.150943] RSP: 002b:00007fde1c26ca20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 393.158677] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004179b1 [ 393.165946] RDX: 0000000000000274 RSI: 0000000000000002 RDI: 00007fde1c26cae0 [ 393.173241] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 393.180516] R10: 0000000000010b20 R11: 0000000000000293 R12: 0000000000000004 06:06:22 executing program 5 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:22 executing program 0: 06:06:22 executing program 2: 06:06:22 executing program 3: [ 393.182198] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 393.187805] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 06:06:22 executing program 0: [ 393.280056] FAULT_INJECTION: forcing a failure. [ 393.280056] name failslab, interval 1, probability 0, space 0, times 0 [ 393.332778] CPU: 1 PID: 2754 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 393.340608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 393.349963] Call Trace: [ 393.352558] dump_stack+0x1b2/0x283 [ 393.356194] should_fail.cold+0x10a/0x154 [ 393.360361] should_failslab+0xd6/0x130 [ 393.364361] kmem_cache_alloc_trace+0x29a/0x3d0 [ 393.369039] apparmor_file_alloc_security+0x129/0x800 [ 393.374238] security_file_alloc+0x66/0xa0 [ 393.378602] ? selinux_is_enabled+0x5/0x50 [ 393.382824] get_empty_filp+0x15c/0x3e0 [ 393.386820] path_openat+0x84/0x2970 [ 393.390518] ? generic_file_write_iter+0x37a/0x650 [ 393.395442] ? path_lookupat+0x780/0x780 [ 393.399742] ? trace_hardirqs_on+0x10/0x10 [ 393.403958] do_filp_open+0x179/0x3c0 [ 393.407737] ? may_open_dev+0xe0/0xe0 [ 393.411528] ? __alloc_fd+0x1be/0x490 [ 393.415321] ? lock_downgrade+0x740/0x740 [ 393.419453] ? do_raw_spin_unlock+0x164/0x220 [ 393.424107] ? _raw_spin_unlock+0x29/0x40 [ 393.428245] ? __alloc_fd+0x1be/0x490 [ 393.432030] do_sys_open+0x296/0x410 [ 393.435727] ? filp_open+0x60/0x60 [ 393.439254] ? SyS_pwrite64+0xca/0x140 [ 393.443119] ? fput+0xb/0x140 [ 393.446207] ? do_syscall_64+0x4c/0x640 [ 393.450163] ? do_sys_open+0x410/0x410 [ 393.454040] do_syscall_64+0x1d5/0x640 [ 393.457911] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 393.463442] RIP: 0033:0x4179b1 [ 393.466664] RSP: 002b:00007fde1c26ca20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 393.474377] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004179b1 [ 393.481663] RDX: 0000000000000274 RSI: 0000000000000002 RDI: 00007fde1c26cae0 [ 393.488912] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 393.496160] R10: 0000000000010b20 R11: 0000000000000293 R12: 0000000000000004 [ 393.503422] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 393.522104] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 06:06:22 executing program 2: 06:06:22 executing program 1: 06:06:22 executing program 3: 06:06:22 executing program 0: 06:06:22 executing program 5 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$inet(r3, &(0x7f0000000080)={0x2, 0x1000, @broadcast}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendto$unix(r4, &(0x7f0000000100)="7debe21d23e198046d5c0882ed537fad9c7b0273c5e567750e06109344042d814c9ad41db8e0cc0a15018dfba755cb6e7a76ae333732cbe6912ddb23e4e5a0ca8897bda3b6f8fbfe9afbd55d6b9593e9f671b554eddfd042d9179cee4fceff95ad48755e3b2a346eaeb0bcecd076317b7d3b7eb8f574df2d0f42c7deed2b00032bf72f920fbeff1c5fa7f9c0564648e551d6cf4cbe22fd67925323c1b03dae60e56e07622e6f85f0bf9ddc9cf009c654af507276e7f3783e3f9c45e84589fda618b69025696a3c6975811b6f3c99d662722953cd225e7cc521b0883bcec76d8702c89f32ddd9f1687f053a92206a2d7424f6", 0xf2, 0x84810, &(0x7f0000000200)=@abs={0x0, 0x0, 0x4e24}, 0x6e) 06:06:22 executing program 0: 06:06:22 executing program 1: 06:06:22 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) socket$caif_stream(0x25, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00') sendmsg$NL80211_CMD_GET_SURVEY(r3, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20080200}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, r4, 0x4, 0x70bd27, 0x25dfdbfc, {{}, {@void, @void}}, ["", "", "", "", "", "", "", "", ""]}, 0x14}}, 0x40000c0) getsockname$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000100)=0x1c) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:22 executing program 2: 06:06:22 executing program 3: [ 393.621717] FAULT_INJECTION: forcing a failure. [ 393.621717] name failslab, interval 1, probability 0, space 0, times 0 06:06:22 executing program 0: [ 393.703736] CPU: 1 PID: 2778 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 393.711561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 393.720919] Call Trace: [ 393.723519] dump_stack+0x1b2/0x283 [ 393.727158] should_fail.cold+0x10a/0x154 [ 393.731414] should_failslab+0xd6/0x130 [ 393.735390] kmem_cache_alloc_trace+0x29a/0x3d0 [ 393.740141] ? loop_get_status64+0x100/0x100 [ 393.744618] __kthread_create_on_node+0xbe/0x3a0 [ 393.744637] ? kthread_park+0x130/0x130 06:06:22 executing program 0: 06:06:23 executing program 0: 06:06:23 executing program 0: [ 393.753760] ? __fget+0x1fe/0x360 [ 393.757212] ? loop_get_status64+0x100/0x100 [ 393.761623] kthread_create_on_node+0xa8/0xd0 [ 393.766117] ? __kthread_create_on_node+0x3a0/0x3a0 [ 393.771134] ? __lockdep_init_map+0x100/0x560 [ 393.775640] ? __lockdep_init_map+0x100/0x560 [ 393.780178] lo_ioctl+0xcd9/0x1cd0 [ 393.783807] ? loop_set_status64+0xe0/0xe0 [ 393.788135] blkdev_ioctl+0x540/0x1830 [ 393.792985] ? blkpg_ioctl+0x8d0/0x8d0 [ 393.796994] ? trace_hardirqs_on+0x10/0x10 06:06:23 executing program 0: [ 393.801245] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 393.806349] ? debug_check_no_obj_freed+0x2c0/0x674 [ 393.811453] block_ioctl+0xd9/0x120 [ 393.815091] ? blkdev_fallocate+0x3a0/0x3a0 [ 393.819413] do_vfs_ioctl+0x75a/0xff0 [ 393.823215] ? ioctl_preallocate+0x1a0/0x1a0 [ 393.827619] ? lock_downgrade+0x740/0x740 [ 393.831772] ? __fget+0x225/0x360 [ 393.835224] ? do_vfs_ioctl+0xff0/0xff0 [ 393.839198] ? security_file_ioctl+0x83/0xb0 [ 393.844389] SyS_ioctl+0x7f/0xb0 [ 393.847756] ? do_vfs_ioctl+0xff0/0xff0 [ 393.851734] do_syscall_64+0x1d5/0x640 [ 393.855625] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 393.860924] RIP: 0033:0x45dd27 [ 393.864125] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 393.871945] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 393.879208] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 393.886573] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 393.893843] R10: 0000000000010b20 R11: 0000000000000246 R12: 0000000000000004 [ 393.901118] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 06:06:23 executing program 5 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:23 executing program 2: 06:06:23 executing program 1: 06:06:23 executing program 3: 06:06:23 executing program 0: 06:06:23 executing program 3: 06:06:23 executing program 0: 06:06:23 executing program 1: 06:06:23 executing program 2: [ 394.003671] FAULT_INJECTION: forcing a failure. [ 394.003671] name failslab, interval 1, probability 0, space 0, times 0 [ 394.059136] CPU: 0 PID: 2807 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 394.066991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 394.076347] Call Trace: [ 394.078950] dump_stack+0x1b2/0x283 [ 394.082581] should_fail.cold+0x10a/0x154 [ 394.086731] should_failslab+0xd6/0x130 [ 394.090976] kmem_cache_alloc+0x28e/0x3c0 [ 394.095188] __kernfs_new_node+0x6f/0x470 [ 394.099356] kernfs_create_dir_ns+0x8c/0x200 [ 394.103770] internal_create_group+0xe9/0x710 06:06:23 executing program 2: 06:06:23 executing program 1: [ 394.108266] lo_ioctl+0x1137/0x1cd0 [ 394.111901] ? loop_set_status64+0xe0/0xe0 [ 394.116144] blkdev_ioctl+0x540/0x1830 [ 394.120031] ? blkpg_ioctl+0x8d0/0x8d0 [ 394.123943] ? trace_hardirqs_on+0x10/0x10 [ 394.128179] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 394.133279] ? debug_check_no_obj_freed+0x2c0/0x674 [ 394.138557] block_ioctl+0xd9/0x120 [ 394.142183] ? blkdev_fallocate+0x3a0/0x3a0 [ 394.146507] do_vfs_ioctl+0x75a/0xff0 [ 394.150308] ? ioctl_preallocate+0x1a0/0x1a0 [ 394.154712] ? lock_downgrade+0x740/0x740 06:06:23 executing program 2: [ 394.158919] ? __fget+0x225/0x360 [ 394.162372] ? do_vfs_ioctl+0xff0/0xff0 [ 394.166349] ? security_file_ioctl+0x83/0xb0 [ 394.170784] SyS_ioctl+0x7f/0xb0 [ 394.174159] ? do_vfs_ioctl+0xff0/0xff0 [ 394.178157] do_syscall_64+0x1d5/0x640 [ 394.182143] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 394.187346] RIP: 0033:0x45dd27 [ 394.190533] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 394.198242] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 394.205596] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 394.212862] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 394.220131] R10: 0000000000010b20 R11: 0000000000000246 R12: 0000000000000004 [ 394.227399] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 394.267691] BTRFS info (device loop5): turning off barriers [ 394.281292] BTRFS info (device loop5): unrecognized mount option 'fragment=all' [ 394.346909] BTRFS error (device loop5): open_ctree failed 06:06:23 executing program 5 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:23 executing program 2: 06:06:23 executing program 3: 06:06:23 executing program 0: 06:06:23 executing program 1: 06:06:23 executing program 1: 06:06:23 executing program 2: 06:06:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x208000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000140)='ethtool\x00') sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r3, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@ETHTOOL_A_FEATURES_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x72ac145c86e58117) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r3, 0x2, 0x70bd26, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x10) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x111400, 0x0) bind$inet(r4, &(0x7f0000000040)={0x2, 0xfffd, @multicast1}, 0x10) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001a40)='/dev/sequencer\x00', 0x602, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(r7, 0x40089416, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000380)={0x0, @in6={{0xa, 0x4e24, 0x37cd, @loopback, 0x80000001}}, 0xd14a, 0x8, 0x4, 0xb7f, 0x60, 0x1000, 0x7}, &(0x7f0000000440)=0x9c) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r6, 0x84, 0x72, &(0x7f0000000480)={r8, 0x3, 0x20}, &(0x7f00000004c0)=0xc) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) ioctl$CHAR_RAW_BSZSET(r6, 0x40081271, &(0x7f00000002c0)=0x2) rmdir(&(0x7f0000000280)='./file0\x00') 06:06:23 executing program 1: 06:06:23 executing program 3: 06:06:23 executing program 0: [ 394.506303] FAULT_INJECTION: forcing a failure. [ 394.506303] name failslab, interval 1, probability 0, space 0, times 0 06:06:23 executing program 1: [ 394.585201] CPU: 0 PID: 2843 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 394.593034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 394.602389] Call Trace: [ 394.604994] dump_stack+0x1b2/0x283 [ 394.608628] should_fail.cold+0x10a/0x154 [ 394.612782] should_failslab+0xd6/0x130 [ 394.616759] kmem_cache_alloc+0x28e/0x3c0 [ 394.620908] __kernfs_new_node+0x6f/0x470 [ 394.625059] kernfs_new_node+0x7b/0xe0 [ 394.628954] __kernfs_create_file+0x3d/0x320 [ 394.633365] sysfs_add_file_mode_ns+0x1e1/0x450 [ 394.638034] ? kernfs_create_dir_ns+0x171/0x200 [ 394.642705] internal_create_group+0x22b/0x710 [ 394.647289] lo_ioctl+0x1137/0x1cd0 [ 394.650918] ? loop_set_status64+0xe0/0xe0 [ 394.655153] blkdev_ioctl+0x540/0x1830 [ 394.659042] ? blkpg_ioctl+0x8d0/0x8d0 [ 394.662928] ? trace_hardirqs_on+0x10/0x10 [ 394.667167] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 394.672270] ? debug_check_no_obj_freed+0x2c0/0x674 [ 394.677291] block_ioctl+0xd9/0x120 [ 394.680915] ? blkdev_fallocate+0x3a0/0x3a0 [ 394.685235] do_vfs_ioctl+0x75a/0xff0 [ 394.689033] ? ioctl_preallocate+0x1a0/0x1a0 [ 394.693457] ? lock_downgrade+0x740/0x740 [ 394.697615] ? __fget+0x225/0x360 [ 394.701062] ? do_vfs_ioctl+0xff0/0xff0 [ 394.705039] ? security_file_ioctl+0x83/0xb0 [ 394.709443] SyS_ioctl+0x7f/0xb0 [ 394.712801] ? do_vfs_ioctl+0xff0/0xff0 [ 394.716961] do_syscall_64+0x1d5/0x640 [ 394.720856] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 394.726646] RIP: 0033:0x45dd27 [ 394.730203] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 394.737889] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 394.745141] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 394.752487] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 394.759827] R10: 0000000000010b20 R11: 0000000000000246 R12: 0000000000000004 [ 394.767342] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 394.803654] BTRFS info (device loop5): turning off barriers [ 394.814149] BTRFS info (device loop5): unrecognized mount option 'fragment=all' 06:06:24 executing program 5 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:24 executing program 2: 06:06:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @rand_addr=0x64010100}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:24 executing program 3: 06:06:24 executing program 1: 06:06:24 executing program 0: [ 394.874133] BTRFS error (device loop5): open_ctree failed 06:06:24 executing program 1: 06:06:24 executing program 0: 06:06:24 executing program 3: 06:06:24 executing program 2: 06:06:24 executing program 0: 06:06:24 executing program 3: [ 395.009015] FAULT_INJECTION: forcing a failure. [ 395.009015] name failslab, interval 1, probability 0, space 0, times 0 [ 395.083020] CPU: 0 PID: 2890 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 395.090847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.100493] Call Trace: [ 395.103525] dump_stack+0x1b2/0x283 [ 395.107601] should_fail.cold+0x10a/0x154 [ 395.111760] should_failslab+0xd6/0x130 [ 395.115743] kmem_cache_alloc+0x28e/0x3c0 [ 395.119903] __kernfs_new_node+0x6f/0x470 [ 395.124149] kernfs_new_node+0x7b/0xe0 [ 395.128042] __kernfs_create_file+0x3d/0x320 [ 395.132454] sysfs_add_file_mode_ns+0x1e1/0x450 [ 395.137136] ? kernfs_create_dir_ns+0x171/0x200 [ 395.141810] internal_create_group+0x22b/0x710 [ 395.146406] lo_ioctl+0x1137/0x1cd0 [ 395.150036] ? loop_set_status64+0xe0/0xe0 [ 395.154272] blkdev_ioctl+0x540/0x1830 [ 395.158159] ? blkpg_ioctl+0x8d0/0x8d0 [ 395.162051] ? trace_hardirqs_on+0x10/0x10 [ 395.166287] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 395.171399] ? debug_check_no_obj_freed+0x2c0/0x674 [ 395.176562] block_ioctl+0xd9/0x120 [ 395.180449] ? blkdev_fallocate+0x3a0/0x3a0 [ 395.184775] do_vfs_ioctl+0x75a/0xff0 [ 395.188579] ? ioctl_preallocate+0x1a0/0x1a0 [ 395.192989] ? lock_downgrade+0x740/0x740 [ 395.197138] ? __fget+0x225/0x360 [ 395.200593] ? do_vfs_ioctl+0xff0/0xff0 [ 395.204569] ? security_file_ioctl+0x83/0xb0 [ 395.208978] SyS_ioctl+0x7f/0xb0 [ 395.212343] ? do_vfs_ioctl+0xff0/0xff0 [ 395.216318] do_syscall_64+0x1d5/0x640 [ 395.220209] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 395.225393] RIP: 0033:0x45dd27 [ 395.232136] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 395.239924] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 395.247299] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 395.254561] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 395.261824] R10: 0000000000010b20 R11: 0000000000000246 R12: 0000000000000004 [ 395.269079] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 395.303808] BTRFS info (device loop5): turning off barriers [ 395.309739] BTRFS info (device loop5): unrecognized mount option 'fragment=all' 06:06:24 executing program 5 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:24 executing program 1: 06:06:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_user='access=user'}], [], 0x6b}}) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_SURVEY(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x1c, 0x0, 0x100, 0x40000000, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_COALESCE(r5, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="2800fc00", @ANYRES16=0x0, @ANYBLOB="000828bd7000fcdbdf256400000008000100370000000c009900b4c4ba7736000000"], 0x28}, 0x1, 0x0, 0x0, 0x8000891}, 0x20000051) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') sendmsg$NL80211_CMD_GET_SURVEY(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0xfffffffffffffd2c, r8, 0x309, 0x0, 0x0, {{}, {@void, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x4004080}, 0x0) sendmsg$NL80211_CMD_SET_TID_CONFIG(r4, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x74, 0x0, 0x1, 0x70bd28, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x24, 0x11d, 0x0, 0x1, [{0x20, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x3}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xc9}]}]}, @NL80211_ATTR_TID_CONFIG={0x34, 0x11d, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}]}, {0x18, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_NOACK={0x5, 0x6, 0x1}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x3}]}]}]}, 0x74}}, 0x4864) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, 0xffffffffffffffff) dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xfffffffffffff3c6) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:24 executing program 3: 06:06:24 executing program 2: 06:06:24 executing program 0: [ 395.354065] BTRFS error (device loop5): open_ctree failed 06:06:24 executing program 1: 06:06:24 executing program 2: 06:06:24 executing program 0: 06:06:24 executing program 3: 06:06:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) r3 = accept4$tipc(r2, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x80800) sendmmsg(r3, &(0x7f0000007e00)=[{{&(0x7f0000000140)=@hci={0x1f, 0x1, 0x1}, 0x80, &(0x7f0000000440)=[{&(0x7f00000001c0)="4393fc082d52685085bf096a2e1a93f4387ea1bb09c0bb1fd58cfcfb6793e9e3d8294d98ba100515af5df34b7c6a8bb8b7625d8a251a87e7d634e5daa2af0b7ff96dbc3786b35e51efb64817e536478567402cd20bb75c28fb552a16fb9203aa75d00d9770b36f5fabc8ead835d46a9c463e3a856d8fbc647b1e58453d0153d89461be0d0680f9f07c7e7641dab505960c628fc1dbefe938b1391a3881a9670d09a2394b85906e91f7aba131117944b56b01edc5eaa77daff8a66f7d51282256c7df7bdb7a177ecde7ae97f09d0ee1e34249ba3e57395d281340fc3695e0bb7128bbadfeb5c29f10cfb17acea2eb45bfec4abfe96c559d7f", 0xf8}, {&(0x7f00000002c0)="f708f2e60be55c9c441ef21b20545a4092c2ca44e8a11bc03cbbcac715b6b7f046157e9c0e3fdef5e55231f7b33bc1c974eea1c9d65f9e66e56210ad55acf3a97ffaf7b8f30aea6da46a167dd27cbc5238848db3dab55f13606a968c9b57fbde4ef8da4fa4371d9753f977cf48eb83539ea3e1bab3938f6b61cd859f88f140a3f3e6ddaaf0260b46a77512b4f4308463bcf8bc4b6a31f1e851a871c792cca26941e316168d0cb9bd78c551b8e6c277e5623f619dd15ea2dd84fd1a06b7f7b9dd40db5353f38a7aef2ae17afb9e60a74f7df066d6449fd515d0a0e0f0d5e97996e5717beeaee8e6e717e4330ea82f23edfc4e0b341d589a", 0xf7}, {&(0x7f00000003c0)="8dbb51b210a88a08f8e79606550a7366ad5bb6b264b73387da02a5c1360dd6ddec25d6edd39c4a755ecbf0bd3c681deb053285ce1c6e8535db65721838d4d7e59c5e8c6e9404736e15f5728f48d2bf3734b1d49ab1befd285bd02adcdc5985d061946555359f3183b185f76eb2", 0x6d}], 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x15a8}}, {{&(0x7f0000001a40)=@in={0x2, 0x4e24, @loopback}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000001ac0)="645a477de921dfc8326035d6bf2e66759c1c67e978cee4b3c10949d57d1575dbe954e1b5ba2badb6bce233d6810f23fb0e089822579a803507c0688403e21cdb0d42121faa23a49ce9620a9ff5c85cf1c9ae74c04f4c1d52b9b32d1831d9896b91ed7b357497e529a57a50704af10a545a16d97cb7e4c38323c07800b28ccda54e6c794e969b4930a645fb74485a98443f69aa2612bde3f92926437a614cd052", 0xa0}, {&(0x7f0000001b80)="4ac04a8d7d1ad0dfd64bb1f66c3c2d5f7cecdb01f8b5134b1e3c1c97b6032a781f5137be6e9423b399978adc1879d1b39ade3146dee804c6f0643875637d7d0ce4068f20d771c03953310d4368afcd02c3e9c2eaaddce58d7cebf94b96fddb8b4036f599d9708d08b50d6cab5030732e7741ba63", 0x74}, {&(0x7f0000001c00)="b0030d620e58cb7fc65053a434ee896b53796186aa4c2eb839528e7475bc34efb0cd4eec6d03d5da72dee666d4b311ec5190afaf1746d0922336c23ac60759fe93d8dd9806e76f2a5d", 0x49}, {&(0x7f0000001c80)="fe6a4fa3db954cc22265329f28a7de5846bd14c507b6874ac4beed9e99a4c6f1ca4ad8ab23228e", 0x27}], 0x4}}, {{&(0x7f0000001d00)=@vsock={0x28, 0x0, 0xffffffff, @hyper}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001d80)="c4dc5dad9d60a958f75d8f7f607e98900237279a897833cd450b7cf0bbcf06c74958e2e93f5c18462977d5e2e8ddc154d4e9540f1f4383d3f441630dc9b2758fad04621759242e29d8a3708aa42a6f4045849dddfa8bcb884ee5f57453cbff70d992430c58f89625", 0x68}], 0x1, &(0x7f0000001e40)=[{0x110, 0x103, 0x2, "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"}, {0xd8, 0xff, 0x3, "2b5fd682531ed694a81a02dd43e0eb222a88d69d4b91c390356bf6817447a80804bc8e6b7940a674a9e422d3b5b74ae613d3af413b647be1f474c12d5110d9e1e951df8a44002c32389dcb0775597280eed09050c7bccec9421992e2b5159bd922ca27667a7084642cc712dadf540ecdc4f366e457484843f25015ea7533af1cad3864a75712f938be5cd1dfd71bf117aff311d3390ed0c414995d8bf79320bea1a8421ccf43e631dcef40fd84fe26c5cb9f9c469a24aeb95c3dd6ff5cff2124e3f0d95b"}, {0x80, 0x111, 0x0, "45c04fe0e2f637bb2e0ec27773c635b53908001cc7b3cb15e6e84b5a6f21c92cdf689a884521c4892f4296ecf42e9d75c80c61cc818be62fa686e0a350c7c54d68ed48fe5318e560e8890a37c806405a3a105154607a0ed535ee0075b07b1f514134d48d0a7360ee94727419beb417c1"}, {0xc0, 0x84, 0x2, "a1299672211110bf981a6e3ff24384939b7e56cfd91eb347bcadeada366fed73cf5f556427419d4b8286b547367e593033ce6f86bc159bdfb81c6be0b25d572e8835a7da2d594175bc0187cbfa19bd8e4db76580012797932fbe0069753c063853e9ec64cf04362594b57e7db2aa035aca5548ebbf220ae0d921826fd2a9274e01f8c69caaa3d2e7aaa4e018a216ab9072e1f37cfaba8d159b60df2bbfa2d0349471d601ff842d85dd6ac30b"}, {0x68, 0x88, 0x7ff, "5c02cb23126a2065620dfe2f91d3b91f41f6c990c640364edba1aab17fbfabf4aa1b67e2a37914f738f40fd0a3e8b1fedfa690f6007889ff5ce91742d10eb9fc33ead5a3e6d37db81d4ad54a3dc70b959a904a9129"}, {0xe8, 0x107, 0x4, "3b1e6f9dc15ec8d82cae9d5c99b0c541ded0934b356bfaff22dfc5e1c9acd049a10810f22e87dcf3031555a2243d06fbaeb3675da6442d3f4ba34962f9ea063b2bc69c8bcccb274cf62b18bedad974a78663bf0fc72544054851e6cba1796bdd58f0bc1cf9ee370e2f21dc2f2740cdefcfd33f05dab81aed199e17e23bcf59c080200e4c382b9c4e69ed44c0ca98ebd13c09ac3418398f66e5cdf2fccd952042cf2d1f86924e14df2aead5f9a04a092124f5f8496547c0247ca2380c5b2eb2f89c0f1b52b9694c71e71a53f11d22c47ffad58c119f"}, {0xf0, 0x10d, 0x8, "f0b21aa7595b0ce761d45acb0be06eb0775485790c9a2c151513a4117872bf06d36c611c1b30c1cf20a2907947602222b81d3a718782224752e26376a49cf3ebd59232300d590aa1e8ff979041001bed041e2f1284521c1c4e671dd309bae64d4978e7f8d34e4ae3d9e17439bb830bfac6d44535dc7d0f4fbbe77581e898f98dbc63344e9a453612b8d4a8a74af3e216b660dfa5035277476841fd9162eb3cdbada8eb3f1fb7380f49754e46f10f9411ce7c81a8da4651e82a9c2152c4c2f12f7e01fb0915a95440c8b9ceb956ccd2cb45d784ac9d393c516fa98032c0"}, {0xc8, 0x112, 0xfffff501, "fe0199a241f033f4cf14dce4c80dcfebd7b0d91b5bb4b7d0426f051c4846adbac9b362ce1ddeb288095be2f5d17617ee3cc706d357509c1e044c7a7721a3410946792515632bace271f71dfc443b2bc61fce176238a1542afc363e8bd673464885a5eab438c3270ed293a144e9aed2120ed5ea370804b56b269ad56cb1f21e4782f1e3e4083189fce80dd002610f0e764ee036e443e2f63a46e87c6985d21b995d3a6b8cf77f83063f3634979a8971f7c32cb8bf71d1d3"}], 0x630}}, {{0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000002480)="a0b6a0f2388a601049e663e4775becbfb13fdb16d03c95190d74a56e9edf56b4e02d9e3799b5e2c10bd13bed5a89199f9a5ad037b0243593a1a58b714b819086af590186b323bd394b522036fc88ac3d56a4a410bf81bab18d285e901d7eca2989d767d7a9ede3c78fccf160a854d20e451442da0b8390eea471019de986cccbcb1661f75debfbcca0b6e3df28c81db02efe6fbb3f16", 0x96}, {&(0x7f0000002540)="e4162ee2df374f36584d8b9fc9edee4a41f2fb850eae3790b9cc257558055c921e34f63368fb10f58f41c2852970b1159ee2803bae797d2a65dd4e565e440124624bcc08b0617ba96f319907fe7056cb65198299cae0df296f0f8432cd9dbd04d98ea72836cc27db898de5c74ae7d1f624f0a87ed26751a05a9ced3cb07158e4983047be58d0267b354ad6dca482caf58b84f5298555d79d79262bf3fde9305b51084ea52f32c1ea8e3de7ee1103db97f41dd3d98c7e", 0xb6}, {&(0x7f0000002600)="96dc345c0ffc59028a308072d7f32e6639b6de3c03628bd47a47bbb99f1cee4bc99756aae9eddd3921322862228b6511e60d20e3073c8bddae530c9306fe8c84d9b5e057317335bcc552ee4f3c8585e5fd7155e1572563aab42a0bc7a8451f2130fe65ba24a1a61b836101a156f4e44b8280884375e40f1a288fd8293a7128e3cb08c95980c14d33a22efbb3d01cbe33ac57746bc270ae07d343e9", 0x9b}, {&(0x7f00000026c0)="a66f8f00b1693712abf56250c124a1532571f4b46fe70660e412ac22486d207bfaee9862cfff53ec87614b8b7dea845a6fe8dd8ed121b9a3e2e0803e17c0b9df35f1842b0dc1e764c130d26c71920a27f236d6609780f469b461913e833dc9bb32e251699fad82d5ae2323881d56231fd8898ece66956c58e2bde7028b6d3288320a7c09f2745510d731421827116e80498d82624c396bf4be18267c", 0x9c}], 0x4, &(0x7f00000027c0)=[{0xf8, 0x3a, 0x3, "174ff9d49d19b6588d0b8dd99d917cc655f3c2da9b8c932a2af6bcf30f92e44ec23bd2a8d5f1311c87f9d9eb4881b46e987b2bb5d3b09c0926258e031832195510b71216a5f4058789da28f3c42621773113cbf71863fe1b2eefeb6da99c7855c435b62221542af5f4fb2ec99e5882539ef1e75e6f5b320df297690d7444987f1909df8b437e150a3bb01e8c40b0688a6ae18639f767aebf4d3633ec1523de052eac89ee793c634f668a8b2a7d17b3cadab26b375172349601bb092e343df8434209ba754f64a545bfc719b4877f78fa9fcba15b85a8c47a7577cb7fd8ee50f01304"}, {0xc0, 0x10a, 0x9, "743e4a9b5c266b9e7ce90cf96fb9765f366ac746c667ccabee03ed4b241c36a835310e9dffeb288653bf0252ee693fe9e99aeb7e51857435b28ebbfa63e0d5f8f6721eb8c809f68b48f2df7ce61e5084d4355fee90caa48ed85f16adef3446720b55bdf70463c3a61ca48089613fbb8024385bde3d84011b339ee8e418a044ccc4ceff2309ef417eca66734c25f260e9ee40ff9ed7fff289b5643f7d90731fad835853b2a8a9e108c5b5a6f9d5"}, {0xf0, 0x109, 0x9, "39091426e26ca4aa9fae86d1e5d971968ee316e2d3de663cf46290c3a82c2a738fd8a597a58ab62af13495220bf065522795ca5f93dd219618077307da452a498be0e017ac570348ec397bd13171521c66153ac99f42a8ee1a95d9ff7b6dc898fea8a4db42d0d050f654a01e28d705ea0975a935cf9d8dbce32b0be032c088097faa72988ce1bdd0d555427da8665310e2673ac0c5776cd2494d064a4ffae13007fac83b6dff486b89efc9f478140c86e69096464bf686669ce9b437d546fd3860bfd3fc0d95ee195912a0feb1d1005f9ca7c7c812dad493545fa91dc1"}, {0xc0, 0x113, 0x8000, "6aa2ae971a02b5c639516d66a21f7638df9cae636abbbf87fdca3d30d4fe373e9e2e7930aff990f59d082f55d15711533b27db951b9093b8e20e0bd6ce0d30da4de4e3619a1489e3eb0ab28a3df4c49f35cc153b14cff096a5abd59a44fbadd7c96ffe71bccc6440f38f9f64e28af05e101781ffdefa4095a2788a2f2acdd26b3248a4da2dd900e970dc3addfed9ff85334ce46132917b396e1aeff496b6414463a30680fe62e48e27"}, {0x1010, 0x10d, 0x7, "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"}, {0x60, 0x109, 0xec, "27e34a4b1743a03da7c2d3544589ae376881ffb03c5537602d5c52bc3069d1a7b5aaecf2164aa303324c1fcb061406ccb1d872b19275edaae2feca02576fea3537b8c5f6df7214a16fe4"}, {0x100, 0x6, 0x1, "4d0aa4445ae62b3beb946cd7f27609a8b7075eba3ad485e7824e52ac831c0096ceaf9344be310ccde9223c2a9623e2874f7341eeb5ab34971e117248ebedcb1e24b81f7695d77f47eec059b098cb3b4553293d586ebe8e606c8d6878d49afdc5a2cce98850273e5d5c6b5e05d18f24177f5785716d9f87b907f9d9c939506e4a18dc3c1b5a336548becf4dda788fab2d7f28030f6a13d5711fa7459751443edf6075443323373e484e52538517931bc8f11e16ce056d51edbc187d2c63ad9fea3ab124db834bf00014576b0707598c1372a3ac93cdab99bd311fe34f56df241c3ab43b23c4da12e73273dccdf2ee"}], 0x14d8}}, {{0x0, 0x0, &(0x7f0000005200)=[{&(0x7f0000003cc0)="4f556cac39d3444d6a2c8367e10acc079c14cc3c1a579bc2da1a459ff1d114380511d1945e2960956225c8189e2a0f340fcc7ccbfcda51daabd501840a9f45eb6c10afc2268a86b2cb5d85d79ab97690b6bd28f549686c90c3c4dcf0fdf832e7c052c387560ffd80bf2f57d13c1c4de0cad0c8e3b73dcbd6e8f1924c69c51ff0ad1da23076160e044ad60dfdd8452ad04e3ce87a", 0x94}, {&(0x7f0000003d80)}, {&(0x7f0000003dc0)="c903f8cd16ff811d7fc366256318d2161b152cf5e5171c1a27ff2192a29eb895421952766d85f78b85320608b8af28ae4ddbebb775ce05f52d7a4ef00c262f1f33a0be4f8b91404d7acfb10f4ccc38c308714267b40861a9ffbd739b68719ec59916eb1d61bc432a786c1b4ca47df799157f88fdfb1450c4263526051e6c30b4789bab824774ca706911c6c88f0444d9ca81f42932429457ce02fd30d1163f4e17df62422d42812f9783e003a603b21d8793f9f74a27ea3712073111bfbe6b9054654aae5be674b5a3216d68cea3d36bb229fba23c8cceec8daf1cc2e7f0f7c8d70ed9", 0xe3}, {&(0x7f0000003ec0)="b44fb74b310ae94ef2e98860fcfd09dd22b9eb8c52b340a5272d5e5d711a33df7b82d4068b3a6bef8f7402edbb1843acd601646e84c0d6fce40e5b6e3e694e53d5ab7b938c890b7738b65be4e63cffbead35e8e29e640d893e4cc5cc337029e26d8caf347428b945779e6a4b7cfa6ae6c4a595389efee9c45ce3f1889946771f1c371a1f64b832b9", 0x88}, {&(0x7f0000003f80)="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", 0x1000}, {&(0x7f0000004f80)="7ade1a6e47e0adf062b9d21cdd729d209c4aaecf3e40a9d9a83617e2669b30d6d12071d1409bef4d57f3e2718dd47539a5265ac6ef664830e70bf6f13adfe80a25596e19a0fac09a25b4b21695f391d6c81814b912ac864bc30e5806b44636c061c623c790695d70c6", 0x69}, {&(0x7f0000005000)="d492dddc65a37cc9bcaebdb2646116326f13bb2a6254eec77bbf639cffe136b11148e5122b77164a086a70c8d3457bbc8075b2a3130e302ad0de848c239e492b1cb6ed0bd0a00573251120fb95c5667926680523b17b9056", 0x58}, {&(0x7f0000005080)="69f7d070cc39290520638d4ea05255641acf5496645fdc41b467ffbcc7cdc97d960a4a328ae1805305338562fb832af9d2ede0236bf73076252357763db9b2f321f1cafa3a23d230fa7d0ea4ef7332f54871598449362d3cf7bc31cc79f95445bc2f8312d30bf72debe154b6673d3079c248cac035da3b6b9074820c1646305db3110eb2e36eb2e6f134a651557df3f2f1ff8a499dc564291befa0d2f505575304", 0xa1}, {&(0x7f0000005140)="3b4b7fa34310075041b5585c924bb185e92e4336ba03a4a0b111e37d07a2d6d743ebe4a5d4d4e735bcaefa5fe302b7f9d1c64dd91b50c22aea7e3fe8ed301321de372e564e980b6a85bf657f0ecfea636fdab741a5374e26553f375296c1a1e9379e069debb54e7f3809ecc36e9f427064e2ce236eb29ebd564e41a91ab64e1f68f590cd01fa449e716dc300323cdb6aabb2af77e3d9736b9da62e7b44b1c14ec44c448d61198fc7", 0xa8}], 0x9, &(0x7f00000052c0)=ANY=[@ANYBLOB="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"], 0x1f8}}, {{&(0x7f00000054c0)=@sco, 0x80, &(0x7f0000005840)=[{&(0x7f0000005540)="86e331120fb36705a9ad3a90811042cd34f6ccec7ab02ed4ce011f0e33f4e13ea344f296a93426c8015debb2f34fd97bca3e1c8d5ce2f0d5dfbb70627730761c4f33081339229ea50b26fd2fe1f3f275e0895bda4bc6d96442febae954cfa984dd6c4551b4880105bede274d71bd4caddd6b42e8dc54865a26f70a2c1ba8609279bdae487f80e6b5dc9a66ed3466628982faf2e5cbaa6650691b5ecd73322e70b0c8ee971d328aba5f993b82f165f50083e62a909737433d35b2b98cad5c196be06a95728618cfa8adfe0c67b509", 0xce}, {&(0x7f0000005640)="b5d9b1b1179131c4e644bfc5b39ce0ac3e148198f5da2bfaff354e1a20fd16f81453f6b57a7d83dae5182555e23f942cba5b48e74c17348bdbe93f47d86c12f22817968e4c4a6c9054a9c3aa5835afbdec0b88bf759f4baa148976516af79ad24a8da5ae8c3823b3b955c4854c9a33acca7ec0a357d95d5e", 0x78}, {&(0x7f00000056c0)="56f8dd3dfd9f19d1fcffe35eae89862f3a81d09aa9c19a8649ba16cbb466ce3ff0db31483f25f024374537c830cfe83f88e6ea9e141c47eccec570d32b47fed6bf69d425e8ed3a", 0x47}, {&(0x7f0000005740)="e2f2fcbc5cf1ea1a7aebea18a747516cec32ce760682c54897b7dd8e10d8f2f4762530ebbc34825ab5ff29dcfb966c893404eb9aba5f2c0bc4e79c7ada0ab00fe3fb1a02ad3b83915ead4fb9ad0cc91a7d0c9d246591b8cfb9a247e3072e6aafb63092e97d7bb1176f264aea72406b663cf291ff57dfa28ba7485a4f2adbe16516c19520eacb91dacb5b86056b1ef110e03476291c4d880eaefe60bcab708546c9eafacb0b96b5c3e62f0c6a95760ad852b9283f4725e0458a8a62b1b1f421684d30afe91c55ef11c763202eb1298464048c0be919083f7c4e049176ae1437778ee5cc", 0xe3}], 0x4, &(0x7f0000005880)=[{0x20, 0x116, 0xfffffffe, "38261c81db8e6161b5dc31aaa4ce"}, {0x100, 0x9a, 0x7, "19faeb3ee4dd905b7546f2f30e2ad02e3088605a526ecd742322dfc561f3fa350357392df1ce07926a6bc4d8eaf3e45bfcf5c6d6088c9e3ea54ac35a8b97c4bf9581efe1a2e61be1a7429f78b72f6be628fcf2d8c3e7406a6b367a2561f56915c9ce6c6fe1a717f30d747b0978aea371a54b8c053bbcf788b3f0c1b1f3b10ec4c0a1879fd5f3d044105fb61c368242a51abae9e20025ee5b3c743e44655f72c3e9301925b7b3d9de4360604bf1885b2c9e40659c071fd9b644bdfa9941399cd80b9828642d5b23b98c38c43f75ced094e1b5acc460752c0cf19dfe6d8ad6c339f95549c66c2b6ceb1f1ad76b2690"}, {0x20, 0x105, 0x1, "7f5bf24efba81cf9f39ae2006e"}, {0x88, 0x29, 0x3ff, "a02926bfb577391d0fcd3bae25f58495ffc7503684b70c9a1447170b98bc2a04ec97c213dc6d1cafb258929d5bc70fa2fbcb863fddb1872cdfc45b3d6d89c17cf272dafb1dd105f94f8af0e5a462395d2f7eb7205b9f1df87b0f6d1ad71a9a018502eec996a640cf080ae893adb38f0b5fabb81000a393"}, {0x1010, 0x6, 0x7, "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"}, {0xb0, 0x10d, 0x8, "bf5561ad7d25f839ece50d9a35545e396b77cf2ba675699bbbe2675ffda4e2508075baed3641701701389a354a4df9a65ff23091bd06f5d093d5d8e413288fb0a300bfa315cb8be6c4ebcefb4da42a11473327ba48aeb7df9dedc208abd14889fcb949199900c3c43c5af219224c84acd37947ca262855a01e6060586573dcaafeeffec93f9239206136ebd6160a2ff2e11214c12a61613c02"}], 0x1288}}, {{&(0x7f0000006b40)=@nfc={0x27, 0x0, 0x0, 0x4}, 0x80, &(0x7f0000007dc0)=[{&(0x7f0000006bc0)="627335e04734fd498a74ef46a9576c692b47941fbedb40fb4acca0b0c1b2cfb3a4235cb342483bc65dff012fdfbb9631ac3e2f8337c7728b146da84692cafbb1ebdbc11cd1ffc4cb58f5354c320a1f95341eaaed06e4562fbc9b4e51d0494a0d49a6d90f7a1a93e4672b4b01f280d2a8c137c1214a9108bc1bd35d1e5a1f387421badc4e9e6cf9da6e2229031b4a2b38135f2b9928277402bbf83b2b4ab63156580d1283283db3d2de2f98966fc84e0fc0601ad962f0bbbe2e58fca7054efd0afe25b8fca620bb", 0xc7}, {&(0x7f0000006cc0)="b5983506726fc01c3d809dadae37a3b4fed2958e5b95aee89263c80f6e70b75f63ef5db2fa9df415a1f601219ae42e39399188ceb87cd75999fdfb414b5adef2086735f2ea6be4af2a58d818e1ff18bbd89fb340d5b3cc91c1cc2a7611ddf709eb0b7e837cc4b316e1dfa399deaa1fceb1ccc33e9ff5d9e1e9e807e1a7c31e0877a5e027872da158b24fccc747793178f2ff9ce51448e18dda7bae38082f099e2f4d97b8027a2b771ece6ebb5c944892830bb95c8a036ffcca1d81bf10b6b6097a249fa4c1452e38ced2d2bd128a09b30af08584", 0xd4}, {&(0x7f0000006dc0)="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", 0x1000}], 0x3}}], 0x7, 0x4008005) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) [ 395.499256] FAULT_INJECTION: forcing a failure. [ 395.499256] name failslab, interval 1, probability 0, space 0, times 0 06:06:24 executing program 2: [ 395.547361] CPU: 1 PID: 2929 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 395.555192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.564548] Call Trace: [ 395.567136] dump_stack+0x1b2/0x283 [ 395.570769] should_fail.cold+0x10a/0x154 [ 395.574920] should_failslab+0xd6/0x130 [ 395.578895] kmem_cache_alloc+0x28e/0x3c0 [ 395.583043] __kernfs_new_node+0x6f/0x470 [ 395.587288] kernfs_new_node+0x7b/0xe0 [ 395.591188] __kernfs_create_file+0x3d/0x320 [ 395.595599] sysfs_add_file_mode_ns+0x1e1/0x450 [ 395.600266] ? kernfs_create_dir_ns+0x171/0x200 [ 395.604935] internal_create_group+0x22b/0x710 [ 395.609520] lo_ioctl+0x1137/0x1cd0 [ 395.613160] ? loop_set_status64+0xe0/0xe0 [ 395.617399] blkdev_ioctl+0x540/0x1830 [ 395.621299] ? blkpg_ioctl+0x8d0/0x8d0 [ 395.625186] ? trace_hardirqs_on+0x10/0x10 [ 395.629426] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 395.634531] ? debug_check_no_obj_freed+0x2c0/0x674 [ 395.639550] block_ioctl+0xd9/0x120 [ 395.643178] ? blkdev_fallocate+0x3a0/0x3a0 [ 395.647497] do_vfs_ioctl+0x75a/0xff0 [ 395.651734] ? ioctl_preallocate+0x1a0/0x1a0 [ 395.656139] ? lock_downgrade+0x740/0x740 [ 395.660315] ? __fget+0x225/0x360 [ 395.663768] ? do_vfs_ioctl+0xff0/0xff0 [ 395.667744] ? security_file_ioctl+0x83/0xb0 [ 395.672156] SyS_ioctl+0x7f/0xb0 [ 395.675537] ? do_vfs_ioctl+0xff0/0xff0 [ 395.679599] do_syscall_64+0x1d5/0x640 [ 395.683494] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 395.688671] RIP: 0033:0x45dd27 [ 395.691836] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 395.699520] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 395.706767] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 395.714188] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 395.721433] R10: 0000000000010b20 R11: 0000000000000246 R12: 0000000000000004 [ 395.728678] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 395.744436] BTRFS info (device loop5): turning off barriers [ 395.750424] BTRFS info (device loop5): unrecognized mount option 'fragment=all' [ 395.784331] BTRFS error (device loop5): open_ctree failed 06:06:25 executing program 5 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:25 executing program 1: 06:06:25 executing program 3: 06:06:25 executing program 2: 06:06:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:25 executing program 0: 06:06:25 executing program 1: 06:06:25 executing program 3: 06:06:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) sendmsg$inet6(r2, &(0x7f0000001600)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f00000000c0)="852d813f6eb83533ea9511bd24545638dd322d5de6410c752478a40051a4c52b8fe1e46015de96f9b15d8c6c0e005298dc4985805cce8e68074210511c8f30c95eed7007140eecee8bdab1b594394f87fa342742b17aec", 0x57}, {&(0x7f0000000140)="03ceafc7c6ecd25bd87e5c0ceef3d03201eab7ee334a274e083e8be7d4590956eff3a838b907d4c9d7be333e91d0371cdd3030e54f93663131", 0x39}, {&(0x7f0000000180)="a9a52444ddc5fc1447827547df3299e2b237bb581d13ec8afa4a8119c12cbc2902394f434deaed29993fdc7b59c67e1fb1c41c7c0ef46d5ee142c74cbcc34efb12cb45fa4546", 0x46}, {&(0x7f0000000200)="be2cc967c361ff5012459f888e712695a3cc5135bc44d6ffeadcc37021f7edc226a88cdacfebb2c8ae2b5eaea32a35ba2f7c9d55719b4c139dfe17246d5fa34351b7a8fb48ae7d400d1b36a5dbf490f4323c3b4f47e02b66f069ec6ae92912b6ef26f970a698cfc3f0420349978f8e8d04cd324342cc20af1592d1a9dd7eed78a1043e438eed96782c4602aae3ed6839353e9191b508ae68b640f379c6555b703e945a7246bd1443e05aaf73f7fc68b24c047a382027683bb6ec595cefc07ef31d95f063cc9259", 0xc7}, {&(0x7f0000000300)="35df6d23753b73f00ff1c73bd4d464d1b7c86c84d63d427e3df46291487fa4abf325b62fffd86d34a978ec569978d13534776fb65f8c2cd746a0a15cde2d33829ae00e7d07b88eb65c95363fb00fd9f2b9829817b8f4e4135780bc66a830360d9bee0fe09961be90c0538dfce14578a6e5abe91032b10fd6de36349fe5fcde07c278db0f5d9620560a25f8cd7d988771c1a5b8d6f8843707d6943abe8547eb4809f70dcb15b326c1f3ad5b1d81c2d228a5968a940de613324f72b1fa025399aba48ece32d52555d3319b2ad0fa0c9da4eb02fb87b394c81722f1a6949fa81a13cd5f88c6a8f34c881adace154b7d4b236b", 0xf1}, {&(0x7f0000000400)="2c32103975814d2e1457c7919d0ff0291006ed51bc3214467ed729aaf4038f34ea610dcfc88d4ed429c8a496d2a1805ab7216591877c7f4965a289fa9be7ceeee806ad370c68ac2ae869afed1265a75506f3f25e084185e7058351785f60dd23c4892dd5968f2f19f2e8ca3210cc6f22120376fed4843ce669e17f7a5b86dc397ad93d39e987d2", 0x87}, {&(0x7f00000004c0)="62f4b5d91947f175785b92a28530b2b041d94d09e500d71cc3e9bdce86f81e90dd26f95016df6b9c50883c93d911bd6f23afb82beefb8d3c5cb29cc2980ee52fed30d648c0bf4e3d62b087c10dfe0da051b0d012ee717527ddfdce7a4aa8100728d34ac7f78c7ce6d1046669d1d2fa8f12067db6899b7c981946f9c0729ed83cc04e6c02901e153100437cb74e6dde29e9993b7a8edda2b10a2c954b20aabfab1e2b54d8f1", 0xa5}, {&(0x7f0000000580)="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", 0x1000}], 0x8}, 0x1) 06:06:25 executing program 0: 06:06:25 executing program 2: [ 395.912565] FAULT_INJECTION: forcing a failure. [ 395.912565] name failslab, interval 1, probability 0, space 0, times 0 [ 395.934767] CPU: 1 PID: 2968 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 395.942589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.951943] Call Trace: [ 395.954535] dump_stack+0x1b2/0x283 [ 395.958174] should_fail.cold+0x10a/0x154 06:06:25 executing program 1: [ 395.962326] should_failslab+0xd6/0x130 [ 395.966301] kmem_cache_alloc+0x28e/0x3c0 [ 395.970469] __kernfs_new_node+0x6f/0x470 [ 395.974628] kernfs_new_node+0x7b/0xe0 [ 395.978562] __kernfs_create_file+0x3d/0x320 [ 395.982980] sysfs_add_file_mode_ns+0x1e1/0x450 [ 395.987658] ? kernfs_create_dir_ns+0x171/0x200 [ 395.992335] internal_create_group+0x22b/0x710 [ 395.997032] lo_ioctl+0x1137/0x1cd0 [ 396.000672] ? loop_set_status64+0xe0/0xe0 [ 396.004914] blkdev_ioctl+0x540/0x1830 [ 396.008810] ? blkpg_ioctl+0x8d0/0x8d0 [ 396.012700] ? trace_hardirqs_on+0x10/0x10 [ 396.016940] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 396.022047] ? debug_check_no_obj_freed+0x2c0/0x674 [ 396.027069] block_ioctl+0xd9/0x120 [ 396.030700] ? blkdev_fallocate+0x3a0/0x3a0 [ 396.035025] do_vfs_ioctl+0x75a/0xff0 [ 396.038832] ? ioctl_preallocate+0x1a0/0x1a0 [ 396.043238] ? lock_downgrade+0x740/0x740 [ 396.047389] ? __fget+0x225/0x360 [ 396.050844] ? do_vfs_ioctl+0xff0/0xff0 [ 396.054817] ? security_file_ioctl+0x83/0xb0 [ 396.059252] SyS_ioctl+0x7f/0xb0 [ 396.062615] ? do_vfs_ioctl+0xff0/0xff0 [ 396.066589] do_syscall_64+0x1d5/0x640 [ 396.070487] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 396.076014] RIP: 0033:0x45dd27 [ 396.079197] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 396.086908] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 396.094176] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 396.101442] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 396.108710] R10: 0000000000010b20 R11: 0000000000000246 R12: 0000000000000004 [ 396.115975] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 396.172767] BTRFS info (device loop5): turning off barriers [ 396.190152] BTRFS info (device loop5): unrecognized mount option 'fragment=all' 06:06:25 executing program 5 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:25 executing program 1: 06:06:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) r3 = syz_mount_image$hfsplus(&(0x7f00000000c0)='hfsplus\x00', &(0x7f0000000100)='./file0\x00', 0x854, 0x9, &(0x7f0000002580)=[{&(0x7f0000000140)="810892c43f36999b6b4665ac762f1eb4a162d12799f3712ccbe56257ead93d00d8a8d759fcacc6ed0182c91d949c946b5f75175b1a216d433d63da0b2a292121f7b4c6acc33c40f7a723dc996c8e01586a5bede1f4128025381ad24359a25c82c8fa2adbb729b1ab53e514a83e22353a8b84d59419221fadb4e54341f995a094063944293e6fa85e904ca59bb20d0111cd990e78e9e0ecc8dea25d7e2f897fad556043b5", 0xa4, 0x9}, {&(0x7f0000000200)="e1a64105dd6813e25af6004807940e6edc7225c67da39c060dfec7e1ecc5e8bc8811f5f510268a85c49f872501cadce5daeb58a31941aafc5411ab5972ce709e65fb0b385b7aad118a624808beb2b62fab028f657627e8c327e99a15a72258b13a791bfb67d0339581dde92df6ddcc0c63e834ff94c2f8b06e8b431a4b91c14375c9052bdd48b8b85b2224989ae626dff244268e8bb1ae1c9a171de7b88ed97be74815860ade9ba58a2596e4882c7befe5919cb297cb4b483d003156ab9c629a712b9963a0c2a25939e7455e7864b2f4e83bb4", 0xd3, 0x9df}, {&(0x7f0000000300)="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", 0x1000, 0x4}, {&(0x7f0000001300)="625079d87662218e9feff19c45c40aa0c553f83dfb84749a666010025b641baed3ce2a45438d2450b9653dfdb03a95755e53a4387993a1ef91914e53b9e7f45a04bb026dba718f998fa0f944de2b819ac64c24f88c79b95f4cc7568dcfaa0096678bef41f6f954ca2a676cc9ad0ec5a421a842910d18aadd8131ce1db3183b3a618010f8024465ec016ed711a28766f0795589b7fce70c27d84ccf82f7745bdef6b46e8564a98fa4517d44607a944aee8f982a87fa089d", 0xb7, 0x9}, {&(0x7f00000013c0)="87c4c2bb9a37cf2fabeee910e3299d93477932ac80e0b89cc058034b8fe136c19ed69ac7e151a719851109637bdd8123389482c80d0e88a69dfe6015dc4e27e779f99710b2f107a8eefd4ad591229b6043005004d9364ab181469b137615b5d8c4ceb1acf01e55d71fef1462c274fbc7acb9ea7aa0ae45cdb300287fa279e046dba3f0ed1eb2dbd5dc4b35d89d553fe91785a4208839", 0x96, 0x100000000}, {&(0x7f0000001480)="30c0c8b14ecead3c606123e8c5b9160d6e10940fdf76080a83da81e5c948e250cddd38c2e99c8ce7241fa65ae4954311909a7e2e231fe00a0e3e596928484560eb17f0eeeae885d14dde782fc8f227cd2130525f8f4464c848beefb12d679b3ef5ecf1909cef3abbeed7793746c026a1e7b3a8a0168cc84de26d", 0x7a, 0x3}, {&(0x7f0000001500)="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", 0x1000, 0x7}, {&(0x7f0000002500)="782cb8d9084748ea2a38dcd6181d30b24062605e7cfee2041a1adbc9d5039e3a442456d9f2e6768bed1fee331f0c57", 0x2f, 0xffffffffffffffff}, {&(0x7f0000002540)="995b2d5238475f210f9ce47af23fd6c9bbc5958e969868647cf145f804c2789d32d7826b8078", 0x26, 0x5}], 0xa1, &(0x7f0000002680)={[{@gid={'gid', 0x3d, 0xee00}}, {@session={'session'}}, {@part={'part', 0x3d, 0x4}}], [{@obj_role={'obj_role', 0x3d, '.\xc3!+*}@-@-.%&['}}, {@appraise_type='appraise_type=imasig'}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@smackfsdef={'smackfsdef', 0x3d, ':{'}}]}) fsetxattr$trusted_overlay_opaque(r3, &(0x7f0000002740)='trusted.overlay.opaque\x00', &(0x7f0000002780)='y\x00', 0x2, 0x4) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000002940)) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000000000000000000ff01", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000002800)='nl80211\x00') sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r4, &(0x7f0000002900)={&(0x7f00000027c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000028c0)={&(0x7f0000002840)={0x70, r8, 0x2, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}]}, 0x70}, 0x1, 0x0, 0x0, 0x4008000}, 0x10) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:25 executing program 2: 06:06:25 executing program 3: 06:06:25 executing program 0: [ 396.223943] BTRFS error (device loop5): open_ctree failed 06:06:25 executing program 0: 06:06:25 executing program 2: 06:06:25 executing program 1: 06:06:25 executing program 3: 06:06:25 executing program 2: 06:06:25 executing program 0: [ 396.379357] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 396.398592] FAULT_INJECTION: forcing a failure. [ 396.398592] name failslab, interval 1, probability 0, space 0, times 0 [ 396.445338] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 396.454977] CPU: 0 PID: 3015 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 396.454984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.454988] Call Trace: [ 396.455003] dump_stack+0x1b2/0x283 [ 396.455024] should_fail.cold+0x10a/0x154 [ 396.455043] should_failslab+0xd6/0x130 [ 396.455056] kmem_cache_alloc+0x28e/0x3c0 [ 396.455071] __kernfs_new_node+0x6f/0x470 [ 396.455085] kernfs_new_node+0x7b/0xe0 [ 396.455097] __kernfs_create_file+0x3d/0x320 [ 396.455111] sysfs_add_file_mode_ns+0x1e1/0x450 [ 396.455121] ? kernfs_create_dir_ns+0x171/0x200 [ 396.455134] internal_create_group+0x22b/0x710 [ 396.455149] lo_ioctl+0x1137/0x1cd0 [ 396.455163] ? loop_set_status64+0xe0/0xe0 [ 396.455175] blkdev_ioctl+0x540/0x1830 [ 396.455186] ? blkpg_ioctl+0x8d0/0x8d0 [ 396.455197] ? trace_hardirqs_on+0x10/0x10 [ 396.455209] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 396.455220] ? debug_check_no_obj_freed+0x2c0/0x674 [ 396.455235] block_ioctl+0xd9/0x120 [ 396.455245] ? blkdev_fallocate+0x3a0/0x3a0 [ 396.455256] do_vfs_ioctl+0x75a/0xff0 [ 396.455268] ? ioctl_preallocate+0x1a0/0x1a0 [ 396.455276] ? lock_downgrade+0x740/0x740 [ 396.455290] ? __fget+0x225/0x360 [ 396.455300] ? do_vfs_ioctl+0xff0/0xff0 [ 396.455310] ? security_file_ioctl+0x83/0xb0 [ 396.455326] SyS_ioctl+0x7f/0xb0 [ 396.455334] ? do_vfs_ioctl+0xff0/0xff0 [ 396.455347] do_syscall_64+0x1d5/0x640 [ 396.455362] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 396.455374] RIP: 0033:0x45dd27 [ 396.600603] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 396.608286] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 396.615565] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 396.623536] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 396.630788] R10: 0000000000010b20 R11: 0000000000000246 R12: 0000000000000004 [ 396.638044] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 396.661951] BTRFS info (device loop5): turning off barriers [ 396.668209] BTRFS info (device loop5): unrecognized mount option 'fragment=all' 06:06:25 executing program 5 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0xffff, @loopback}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$rose(r3, 0x104, 0x0, &(0x7f00000000c0)=0x5, 0x4) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:25 executing program 2: 06:06:25 executing program 3: 06:06:25 executing program 0: 06:06:25 executing program 1: [ 396.714581] BTRFS error (device loop5): open_ctree failed 06:06:26 executing program 1: 06:06:26 executing program 3: 06:06:26 executing program 2: 06:06:26 executing program 0: 06:06:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) r3 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ttyprintk\x00', 0x101440, 0x0) ioctl$TIOCCBRK(r3, 0x5428) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:26 executing program 3: [ 396.867454] FAULT_INJECTION: forcing a failure. [ 396.867454] name failslab, interval 1, probability 0, space 0, times 0 [ 396.922152] CPU: 0 PID: 3058 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 396.930005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.939360] Call Trace: [ 396.941950] dump_stack+0x1b2/0x283 [ 396.945582] should_fail.cold+0x10a/0x154 [ 396.949738] should_failslab+0xd6/0x130 [ 396.953727] kmem_cache_alloc+0x28e/0x3c0 [ 396.957886] __kernfs_new_node+0x6f/0x470 [ 396.962039] kernfs_new_node+0x7b/0xe0 [ 396.965928] __kernfs_create_file+0x3d/0x320 [ 396.970514] sysfs_add_file_mode_ns+0x1e1/0x450 [ 396.975183] ? kernfs_create_dir_ns+0x171/0x200 [ 396.979853] internal_create_group+0x22b/0x710 [ 396.984437] lo_ioctl+0x1137/0x1cd0 [ 396.988072] ? loop_set_status64+0xe0/0xe0 [ 396.992398] blkdev_ioctl+0x540/0x1830 [ 396.996287] ? blkpg_ioctl+0x8d0/0x8d0 [ 397.000175] ? retint_kernel+0x2d/0x2d [ 397.004060] ? trace_hardirqs_on+0x10/0x10 [ 397.008295] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 397.013309] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 397.018074] block_ioctl+0xd9/0x120 [ 397.021704] ? blkdev_fallocate+0x3a0/0x3a0 [ 397.026039] do_vfs_ioctl+0x75a/0xff0 [ 397.029932] ? ioctl_preallocate+0x1a0/0x1a0 [ 397.034321] ? lock_downgrade+0x740/0x740 [ 397.038453] ? __fget+0x225/0x360 [ 397.041886] ? do_vfs_ioctl+0xff0/0xff0 [ 397.045838] ? security_file_ioctl+0x83/0xb0 [ 397.050228] SyS_ioctl+0x7f/0xb0 [ 397.053577] ? do_vfs_ioctl+0xff0/0xff0 [ 397.057535] do_syscall_64+0x1d5/0x640 [ 397.061424] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 397.066622] RIP: 0033:0x45dd27 [ 397.069789] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 397.077474] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 397.084729] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 397.091984] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 397.099253] R10: 0000000000010b20 R11: 0000000000000246 R12: 0000000000000004 [ 397.106499] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 397.138691] BTRFS info (device loop5): turning off barriers [ 397.144576] BTRFS info (device loop5): unrecognized mount option 'fragment=all' [ 397.174209] BTRFS error (device loop5): open_ctree failed 06:06:26 executing program 5 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:26 executing program 1: 06:06:26 executing program 2: 06:06:26 executing program 0: 06:06:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:26 executing program 3: 06:06:26 executing program 2: 06:06:26 executing program 3: 06:06:26 executing program 2: [ 397.266322] FAULT_INJECTION: forcing a failure. [ 397.266322] name failslab, interval 1, probability 0, space 0, times 0 [ 397.285546] print_req_error: I/O error, dev loop5, sector 0 [ 397.291423] print_req_error: I/O error, dev loop5, sector 0 [ 397.297723] Buffer I/O error on dev loop5, logical block 0, async page read [ 397.306501] print_req_error: I/O error, dev loop5, sector 0 06:06:26 executing program 0: 06:06:26 executing program 1: [ 397.312249] Buffer I/O error on dev loop5, logical block 0, async page read [ 397.319842] print_req_error: I/O error, dev loop5, sector 0 [ 397.325657] Buffer I/O error on dev loop5, logical block 0, async page read [ 397.333138] print_req_error: I/O error, dev loop5, sector 0 [ 397.338961] Buffer I/O error on dev loop5, logical block 0, async page read [ 397.347922] print_req_error: I/O error, dev loop5, sector 0 [ 397.353670] Buffer I/O error on dev loop5, logical block 0, async page read 06:06:26 executing program 3: [ 397.362304] print_req_error: I/O error, dev loop5, sector 0 [ 397.368131] Buffer I/O error on dev loop5, logical block 0, async page read [ 397.375606] print_req_error: I/O error, dev loop5, sector 24 [ 397.381448] Buffer I/O error on dev loop5, logical block 3, async page read [ 397.391962] CPU: 0 PID: 3098 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 397.399872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 397.409226] Call Trace: [ 397.411821] dump_stack+0x1b2/0x283 [ 397.417441] should_fail.cold+0x10a/0x154 [ 397.421693] should_failslab+0xd6/0x130 [ 397.426049] kmem_cache_alloc_trace+0x29a/0x3d0 [ 397.430906] ? dev_uevent_filter+0xd0/0xd0 [ 397.435262] kobject_uevent_env+0x20c/0xf40 [ 397.439683] ? internal_create_group+0x48f/0x710 [ 397.444445] lo_ioctl+0x11a6/0x1cd0 [ 397.448082] ? loop_set_status64+0xe0/0xe0 [ 397.452498] blkdev_ioctl+0x540/0x1830 [ 397.456396] ? blkpg_ioctl+0x8d0/0x8d0 [ 397.460290] ? trace_hardirqs_on+0x10/0x10 [ 397.464546] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 397.469652] ? debug_check_no_obj_freed+0x2c0/0x674 [ 397.474767] block_ioctl+0xd9/0x120 [ 397.478394] ? blkdev_fallocate+0x3a0/0x3a0 [ 397.482719] do_vfs_ioctl+0x75a/0xff0 [ 397.486522] ? ioctl_preallocate+0x1a0/0x1a0 [ 397.490928] ? lock_downgrade+0x740/0x740 [ 397.495075] ? __fget+0x225/0x360 [ 397.498526] ? do_vfs_ioctl+0xff0/0xff0 [ 397.502503] ? security_file_ioctl+0x83/0xb0 [ 397.507175] SyS_ioctl+0x7f/0xb0 [ 397.510544] ? do_vfs_ioctl+0xff0/0xff0 [ 397.514518] do_syscall_64+0x1d5/0x640 [ 397.518414] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 397.523604] RIP: 0033:0x45dd27 [ 397.526792] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 397.534507] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 397.541776] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 397.549023] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 397.556271] R10: 0000000000010b20 R11: 0000000000000246 R12: 0000000000000004 [ 397.563529] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 397.596950] BTRFS info (device loop5): turning off barriers [ 397.602707] BTRFS info (device loop5): unrecognized mount option 'fragment=all' 06:06:26 executing program 5 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:26 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$tmpfs(&(0x7f0000000080)='tmpfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@uid={'uid', 0x3d, r1}}]}) quotactl(0x3, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000100)="c634e5e4895f8e465f3b97e6de3c12ef8bae39d65bd04137ba3fcd8ea06a4b232c535ea68550e3206c7ef97a5da7cce5912ec298dc6f8f2ff154ac49de5bcdafc37ca446dec5e870d6fa1ccda1cc9c033ebc12f63bc667ef4b4eecd4c95c9219ea64ae5a60a4acb7c617e070ecdb30582a3813455c02bc0fb37bea0775fe0ba0516773d7b5b9e406798ce1cd3ace6f9ad09fc47e6c4983224f1027d1eb71ec6bd3360203f440ae56ea772ccf56f87188a9c372b6410d3dd0ee7c4d2908266a19441555d6b6c9f24a4baa3eaa1ca7af065c558f6eb12801ee517af88e2566da130e0a23a42fbc7fdac37d3be7c60812df867cb1decdb6fbb302") r2 = socket$inet_tcp(0x2, 0x3, 0x6) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000340)={0x5, &(0x7f0000000300)=[{0x0, 0x9}, {0x0, 0x2}, {0x1, 0x3}, {0x6257, 0x81}, {0x4}]}) bind$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0x14) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ocfs2_control\x00', 0x301000, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:26 executing program 3: 06:06:26 executing program 2: 06:06:26 executing program 1: 06:06:26 executing program 0: [ 397.654455] BTRFS error (device loop5): open_ctree failed 06:06:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r5 = dup(r4) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_user='access=user'}], [], 0x6b}}) ioctl$BLKSECTGET(r5, 0x1267, &(0x7f00000000c0)) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:26 executing program 3: 06:06:26 executing program 2: [ 397.730780] FAULT_INJECTION: forcing a failure. [ 397.730780] name failslab, interval 1, probability 0, space 0, times 0 [ 397.743151] CPU: 0 PID: 3137 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 397.750971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 397.760850] Call Trace: [ 397.763444] dump_stack+0x1b2/0x283 [ 397.767104] should_fail.cold+0x10a/0x154 [ 397.771353] should_failslab+0xd6/0x130 [ 397.775336] __kmalloc+0x2c1/0x400 [ 397.778874] ? kobject_get_path+0xb5/0x230 [ 397.783194] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 397.788653] kobject_get_path+0xb5/0x230 [ 397.792982] kobject_uevent_env+0x230/0xf40 [ 397.797308] ? internal_create_group+0x48f/0x710 [ 397.802161] lo_ioctl+0x11a6/0x1cd0 [ 397.805883] ? loop_set_status64+0xe0/0xe0 [ 397.810120] blkdev_ioctl+0x540/0x1830 [ 397.814010] ? blkpg_ioctl+0x8d0/0x8d0 [ 397.817899] ? trace_hardirqs_on+0x10/0x10 [ 397.822135] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 397.827236] ? debug_check_no_obj_freed+0x2c0/0x674 [ 397.832262] block_ioctl+0xd9/0x120 [ 397.836070] ? blkdev_fallocate+0x3a0/0x3a0 [ 397.840393] do_vfs_ioctl+0x75a/0xff0 [ 397.844202] ? ioctl_preallocate+0x1a0/0x1a0 [ 397.848611] ? lock_downgrade+0x740/0x740 [ 397.852771] ? __fget+0x225/0x360 [ 397.856237] ? do_vfs_ioctl+0xff0/0xff0 [ 397.860220] ? security_file_ioctl+0x83/0xb0 [ 397.864981] SyS_ioctl+0x7f/0xb0 [ 397.868350] ? do_vfs_ioctl+0xff0/0xff0 [ 397.872447] do_syscall_64+0x1d5/0x640 [ 397.876344] entry_SYSCALL_64_after_hwframe+0x46/0xbb 06:06:27 executing program 0: 06:06:27 executing program 1: 06:06:27 executing program 0: [ 397.877520] print_req_error: I/O error, dev loop5, sector 0 [ 397.881585] RIP: 0033:0x45dd27 [ 397.890461] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 397.898173] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 397.905799] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 397.913070] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 397.920338] R10: 0000000000010b20 R11: 0000000000000246 R12: 0000000000000004 [ 397.922176] print_req_error: I/O error, dev loop5, sector 0 [ 397.927607] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 397.940921] Buffer I/O error on dev loop5, logical block 0, async page read [ 397.948875] Buffer I/O error on dev loop5, logical block 0, async page read [ 397.956502] Buffer I/O error on dev loop5, logical block 0, async page read [ 398.021484] BTRFS info (device loop5): turning off barriers [ 398.028354] BTRFS info (device loop5): unrecognized mount option 'fragment=all' 06:06:27 executing program 5 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:27 executing program 3: 06:06:27 executing program 0: 06:06:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:27 executing program 1: 06:06:27 executing program 2: [ 398.064362] BTRFS error (device loop5): open_ctree failed [ 398.152481] FAULT_INJECTION: forcing a failure. [ 398.152481] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 398.164312] CPU: 0 PID: 3171 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 398.172104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 398.181459] Call Trace: [ 398.184046] dump_stack+0x1b2/0x283 [ 398.187679] should_fail.cold+0x10a/0x154 [ 398.191824] ? __lock_acquire+0x5fc/0x3f20 [ 398.196058] __alloc_pages_nodemask+0x22c/0x2720 06:06:27 executing program 1: 06:06:27 executing program 0: [ 398.200814] ? __lock_acquire+0x5fc/0x3f20 [ 398.205051] ? kernfs_activate+0x2a/0x180 [ 398.209197] ? __mutex_lock+0x360/0x1310 [ 398.213237] ? kernfs_add_one+0x4c/0x3a0 [ 398.217287] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 398.222120] ? kernfs_add_one+0x2e5/0x3a0 [ 398.226265] ? trace_hardirqs_on+0x10/0x10 [ 398.230502] ? __ww_mutex_wakeup_for_backoff+0x210/0x210 [ 398.235953] ? __mutex_unlock_slowpath+0x75/0x770 [ 398.240884] cache_grow_begin+0x8f/0x420 [ 398.244942] cache_alloc_refill+0x273/0x350 06:06:27 executing program 0: 06:06:27 executing program 1: [ 398.249267] kmem_cache_alloc_trace+0x340/0x3d0 [ 398.253935] ? dev_uevent_filter+0xd0/0xd0 [ 398.258169] kobject_uevent_env+0x20c/0xf40 [ 398.262492] ? internal_create_group+0x48f/0x710 [ 398.267248] lo_ioctl+0x11a6/0x1cd0 [ 398.270874] ? loop_set_status64+0xe0/0xe0 [ 398.275976] blkdev_ioctl+0x540/0x1830 [ 398.279862] ? blkpg_ioctl+0x8d0/0x8d0 [ 398.283744] ? trace_hardirqs_on+0x10/0x10 [ 398.287980] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 398.293076] ? debug_check_no_obj_freed+0x2c0/0x674 [ 398.298102] block_ioctl+0xd9/0x120 06:06:27 executing program 0: 06:06:27 executing program 1: [ 398.301728] ? blkdev_fallocate+0x3a0/0x3a0 [ 398.306050] do_vfs_ioctl+0x75a/0xff0 [ 398.309854] ? ioctl_preallocate+0x1a0/0x1a0 [ 398.314261] ? lock_downgrade+0x740/0x740 [ 398.318409] ? __fget+0x225/0x360 [ 398.321855] ? do_vfs_ioctl+0xff0/0xff0 [ 398.325828] ? security_file_ioctl+0x83/0xb0 [ 398.330232] SyS_ioctl+0x7f/0xb0 [ 398.333589] ? do_vfs_ioctl+0xff0/0xff0 [ 398.337556] do_syscall_64+0x1d5/0x640 [ 398.341441] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 398.346621] RIP: 0033:0x45dd27 [ 398.349804] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 398.357507] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 398.364772] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 398.372035] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 398.379301] R10: 0000000000010b20 R11: 0000000000000246 R12: 0000000000000004 [ 398.386565] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 398.427597] BTRFS info (device loop5): turning off barriers [ 398.440294] BTRFS info (device loop5): unrecognized mount option 'fragment=all' 06:06:27 executing program 5 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:27 executing program 1: 06:06:27 executing program 0: 06:06:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:27 executing program 3: 06:06:27 executing program 2: [ 398.484021] BTRFS error (device loop5): open_ctree failed 06:06:27 executing program 3: 06:06:27 executing program 1: 06:06:27 executing program 0: 06:06:27 executing program 2: 06:06:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000000000000000000ff01", @ANYRES32=r6, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00veth'], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x63, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000054c0)=@delchain={0x24, 0x2e, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xfff2, 0xffff}}}, 0x24}}, 0x0) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x0) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:27 executing program 1: [ 398.577819] FAULT_INJECTION: forcing a failure. [ 398.577819] name failslab, interval 1, probability 0, space 0, times 0 [ 398.642921] CPU: 1 PID: 3209 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 398.650746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 398.660097] Call Trace: [ 398.662690] dump_stack+0x1b2/0x283 [ 398.666324] should_fail.cold+0x10a/0x154 [ 398.669644] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 398.670472] should_failslab+0xd6/0x130 [ 398.681792] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.4'. [ 398.683009] kmem_cache_alloc_node_trace+0x25a/0x400 [ 398.683025] __kmalloc_node_track_caller+0x38/0x70 [ 398.701652] __alloc_skb+0x96/0x510 [ 398.705275] kobject_uevent_env+0x882/0xf40 [ 398.709696] lo_ioctl+0x11a6/0x1cd0 [ 398.713479] ? loop_set_status64+0xe0/0xe0 [ 398.717762] blkdev_ioctl+0x540/0x1830 [ 398.721628] ? blkpg_ioctl+0x8d0/0x8d0 [ 398.725494] ? trace_hardirqs_on+0x10/0x10 [ 398.729710] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 398.734791] ? debug_check_no_obj_freed+0x2c0/0x674 [ 398.739785] block_ioctl+0xd9/0x120 [ 398.743387] ? blkdev_fallocate+0x3a0/0x3a0 [ 398.747743] do_vfs_ioctl+0x75a/0xff0 [ 398.751546] ? ioctl_preallocate+0x1a0/0x1a0 [ 398.755930] ? lock_downgrade+0x740/0x740 [ 398.760069] ? __fget+0x225/0x360 [ 398.763545] ? do_vfs_ioctl+0xff0/0xff0 [ 398.767498] ? security_file_ioctl+0x83/0xb0 [ 398.771883] SyS_ioctl+0x7f/0xb0 [ 398.775227] ? do_vfs_ioctl+0xff0/0xff0 [ 398.779182] do_syscall_64+0x1d5/0x640 [ 398.783052] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 398.788220] RIP: 0033:0x45dd27 [ 398.791391] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 398.799074] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 398.806326] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 398.813584] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 398.820851] R10: 0000000000010b20 R11: 0000000000000246 R12: 0000000000000004 [ 398.828119] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 398.859523] BTRFS info (device loop5): turning off barriers [ 398.876387] BTRFS info (device loop5): unrecognized mount option 'fragment=all' 06:06:28 executing program 5 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:28 executing program 1: 06:06:28 executing program 0: 06:06:28 executing program 2: 06:06:28 executing program 3: 06:06:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) socket$isdn_base(0x22, 0x3, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) pipe2$9p(&(0x7f0000000240), 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = dup(r3) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180)='ethtool\x00') pipe2$9p(&(0x7f0000000240), 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2002880, &(0x7f0000000340)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@access_user='access=user'}, {@noextend='noextend'}, {@mmap='mmap'}, {@access_uid={'access'}}, {@debug={'debug', 0x3d, 0x1}}], [{@subj_type={'subj_type', 0x3d, 't\x06\x00\x05\x00=f\x80,'}}], 0x6b}}) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r4, 0xc01064c7, &(0x7f0000000140)={0x2, 0x0, &(0x7f0000000100)=[0x0, 0x0]}) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$BTRFS_IOC_QGROUP_LIMIT(r5, 0x8030942b, &(0x7f00000000c0)={0x87, {0x18, 0xffffffffffff0001, 0x200, 0x7, 0x1}}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x40000, &(0x7f0000001480)=ANY=[@ANYBLOB='trans=fd,rfAno=', @ANYBLOB="a65a4eb3509b90b005da1ab0931a360777a11da836c0c0294e9b5a9ad08cf25c7332b0f1b75ba65ca6fcc8866926cf89a5a3731e2b88b6a570d17c0814faae6608d9702e7755a48cdf0dad0fc649cd9e756875f82a96c17d017adca8e4845342ca7919c75a8269d81de5a4314855b71a115e3564fc4eb61f55cc8f9c7244b86c993b7c19d7e7a92cb4d11d4abca89910f170eb7a2c4861df50c0b6ca2118a5a8d62e01acd7d518d70422dbea2eac97a94f1c954c553cc931f31be63f80f61d346c930e65942554b40e19a45d64314ddff855736be6ad29f561d98eb08f3aada6b217c2675dfee52ab898a13cab412b47b0c8b014da41d131a4f825259c50a6cf5b86736b19b32acd6b6b07a93b2e978999cf92618921ed1f6aae228b6c255eb526f83645e1d0fb7f97b944daaf4048c8cf467666ea5b2821b76d562f48715e2fc8580f59d8ca16dbba595844651ebb623cc21f76aa705e1e9ec3768af31e9a855c3e448a4dfad3c3d3614f13ecb37b0403e8b0de090c0a26d97d7e12577caca2c9d46851f69e5358bcd61b0d0d6c3ff342ba2dda543f5b78facc3c2178bb7ac6e991ac9405ee8255fbcecd36bb2007e9e85ef3cf5855765c1fbe27122e202a85298e381785709506df47940d8a6057de03a13257803f4b3dde1eccdefabebd016f8c90c452d1a221e972ad371e4a96241edda56e73782056d2b3553b72271cf5c389ac5a65acda83276ce24177d911701c6401c5e61ac0181cfb2e67a1168932bcfa6d02e52c42489e75b540301433dc9d475d9e1b6eb502621f5b9d5082b134640915f54b91ea8385b1be5bfbfd88e614686dfe935f4f4db1c0fde8e6129261bd8a7670113a2063f8b8740aa42a26122779e77a4b0d23215f2dfb209fdf0fee36b4da673aaf68b023a103e738260651463cf293daac43c42a38de2f07bbd347cdb3e9a530f9cb3a85a8db026a4559f02f5e8ad62bc76b83d0d776b2bb0f63d26301254d52c22e9442c3f07067e53b3be35ef235663b90ead36fe3075142cdf1197fba0a3e296bff0ffb68888694ceaf715b07bd0cb4b0f2e19f3ccf50c3f26d5220897c438b502579ad9e83e709d16c1259d502962fddce9e0dac6338940d7d042bc996ea3acfce32c0599299eef68288306553b00e21a4212c25457addbae5f460aeba9d01986e9b045c07de7bca61fc151ef0361dc38e7babd65baca2cce46c88d486b1bd2dbbb9b96a39167e9b2c314feb0091fe598b121b44e02f03df4c0b5dbfc94b478dbbdaa407ab60e8a8df35ad1ac4c363d1201e79d14b599756cfa95696cb5ef088fe1e827d434ec31e0f0aed2994158e176afefc32cf2105cbb62e74e9d7d0fe8a3ee51feb6365361366ba14e02e5a5ce90811c0d648ec148804104cb0e9d3ba944cc0ee7cf07491350fac46590f4999a266cc4c1ce044015bb8401eef0cab8e09abc1afd6f7ef57addbcb46efe2d2bae86fe4a0c0cda4128ffafb4a715b732b35bd15331b36c49072101e37824ad53578adecff9f535156f0650f19f4b82552300a16cf64448f1102d9c299ce2133bd576b22f03fce2ffb718eeba96f839c11a0eafa5eed4d34bd12e9496e4dbba171d549b6e7200b50a0b158279f52d02cd447f800c85b74f562e07d9368fcda370149f0db3641582d111c0ce94ba36656ade656d1ddd5cc49e27d6b371754292aae3e39bf1c6a6456e125db99805d3bcf36f210227306d7f94718f23016ef34e5f41fe96ce13f8a437525491a957b1adec20d0da915a70e6ff265ce4102df8a95177fbf859e1e84ac47d803c396ec8a0815d4270ea74f87259ef18b16cbf51ad31612da8338619106532910ddf09441a4014e2a33d41128b3df4d7359ee7fd8970315092df93b6d7891818b8fd941c174403588a9558825e8200661c016d6006dd54511aa529eb407827e54f94c1511ad83e2d018c07327d8006884e7c1ac06b37ae03ff8a7c125e1413b1614120438f67140080a107ab9f9462339888df302df4d786825260dd651b048d4dd422299dbcf70e4f4373d1fd3f7731922073bda84193c6102a739826e15c7e9f30c9d05e65869f7f2295581e2f10d572b8580ef3a28c2042b665335dbd8942350efdf3b7b72b0fa8e748c9f73eb555af7355a3f7dafe32c877a6101a6c5c10f25d8ce3d7b1e169d4102e26c48cb57e2f0ed2a0218207fd3234176708cf15420ffffa2c6195e55f7f96e9bc7c71ab9e425bd1fee9e8e0960ea0a1dfd3c3be45dbf0ad753922b4fd6f7aae9b0feaea12ed2e9e88b5b16a602d4c535cc2743d84780b023818f768006c1814a8e0cb45d499be82fe8cc95f3c671d88e183a67fb63ce581c1f31e837f57313dd86b553525a4d965dd96e6e1f2d07a963cb10eaab32537c4518550f588e38896a9ce754890b6eac645657333a92d434066d1b45855ec3918bd8eb250337c0eff56e3f81fe105841c73f77bca21fdf1234a622934935f67d56adc38121c2cc87da4998bb56288c4cc9163dc4628c30cfccb9b18ff83ea59a9cb0ec6306b4095c47aae32331f9267901f8ebb957d5baac66384d6da6f0634e28f9390a30a2472a1870b8a5e38536ef3488ba3848c2d839f9df3ced64d479a1d7feb1ac9bb27692198cefa20a26609e946d6a12ead474152f96f8d6b164c4be73f1a1303eb5a9234c5b6b18ceee1275caf698a151043e231251e136c53a3a2f2ad3e91bc0279b820041f788da55514e30b32247f164eeaf80551737dfe1338f58d11aa4f7c8828fcf4ceb164b6c48297db3ed9a2103e1d63e711f65a8835883be11d93a045353485cde6e83c96d206f983e53cb64fbde8214d6b07b9812225c7abdb1b8c5ac305acc2eec45ccd2c2ea7f35fb3bea46e9da5d2cf9e090336aaee6a5e5ada957c46eefa0b124a81a45e17420c928c5095c42deb6bfaa0d2405c47fe85155b04afe0f2e492a5bc5d176e43d6322fb0f5b089b5ff3494cc83374152ab0fa6b33d63664d86cca92475b09d3e054ae94d8222dd793bf52b1b12ffe2edc0f8b80b02cd7568277614fb9a252efc18b11200362f62094d94cc039ceeeb53be455ee994a72daeada6b9b1aeaf85a1ec862f27bab31b9803d7ddce59a5f28a2c3df721de90ed85f7e04b865b1ca1c1ab3e8c1a6cb8eb85cf68fc45dcc1c6bab0c2a6ea0e2852c644b267caf446c876c8aa7cd01752be16096466ae698c53c8fc9278ac1d80fbb08ca2a02d5e5a98036e82cd1e6cc569426dc189877204e0803d54554ca22d05377448083ecfedfcf043ed9203f7d8bcadc0ae537836bacd0ba6045cd5f85f851b01e38beba6566cc04f7a4f375905c33b551dc7390bc4fcc9100e444bedce2e3e4f7af9f7454803e2b68755df764a5021e8afbc2d0edf5a583ccb8b549e27f758177e284aad8a8ff27c8c9e3566ad93e8fcfe5073f1df07be9fa9641c34a8c0f914c7e30456fbd223df61c9db071846cb927c7cf6f938ccf58cf74fda5f23d4a466fdf87024639f4960cd5ca4792ff3e6e5755b61d2a703e0dbbe4267750efdb14c80f5db27041e76244ae7b73de06987d4681ebb7ea73965b55a567f49df82c23571e21bf38e7f6f0b21118efaf878f111f0209e309750252508d239a695c25e012f26404c049cbbbf16f6658acf90fc596aa290745829ee0de78dd7392c5e7a94a8eafa4a3db440f0d2baac93d070d28609ad0d1ddc1e08ab6af699fa5ea2862a296a94552a6ce028c3bcf8aa7b64010ded83fd3df0366e411151eb4bbd394a3d0aea4dd15cf6ac64df57dbea6255d2c4121efa9b09c28e7791d7a2d557a0887b92aaad9b6012dde0bf6a59dcce5eb02da994764b985e8d338615073e7d65cd883b90f2b79676c2407644d1fd3c9d109982190b600751603228d86f71fe981b5cfa60f586f1931ca1edce8886d7184b46188482ca1257ccbb73247c6e5b9f072e9e19bd6b044925fbd4721122656786aa03404bb1e6189bacf242f02fe88e60e15d768baae268fb63a1234ef2821b91b6fd65030212cf5d8e55f1049ddd85d5beb135a6d73ccee2888ac7a539f74257defb4754869e06a0e3698ed82d8f90fd8526370b67b5df8c9b6879636f53910057b3a0ec9945aa9a347e006f15bfb2d849162c43eb3ae08a5bd32559c4086af9f8907321089e68aca0b1b5502b6f7d57c64ffdc550f7da01f8c6c930a8a883059632dbb662882922ec34fb48280afcae3b27a0e9ce5f8b150489559b419eaf5e7d44689fd201feb39dcbcae2f9e494a48ec1dcc685f009ddecd05e3f0d15d78509ad7e62c49ea022c60609f33157c02d13391cdb8eac46272e855e3b84a5172183ab8502f627f9d62d3bbed1350709ce84927364bf412f796909a6cc1013cf63e63cbf4922aec334b9a618984df0336812bcd88c072088e398660d3ee507555a3dcd7cb44e1092843cdefa0174bcc977d9b1173ad2f60d01c1f4e879d0a680a2eda5b46792b7db04856d921ff931b1922f7e03ecf1360159a13ae38b2ea6bc0c42fba6909c0518fe71e9aa6e761272ff92e38abd6ebcdf598f5b6e4930ac41f361735d1b917ef0756cff60b38f5b3ebd2ef0d730d0cf7841f6992da5c38c0c0a8bbf24deda04cdcc366664a1587ae8dc59679239fcd8be5392f597a5454fc758c6adcc67c0587e816fc4732386bd9e4317b45b19c2d77c80e2206fd6b19007fdc6a7af6873ed2979ad438c9ca8fa72af5d24ae4ca97cea4a4c620dac0dc217a3509dade37c00a16192316928baa82f1c6e4722463ac5cb6522782eaf7f563b8970973f92ae5eed4466ccd26b8a740e83e8478ad7b887469e68bef02c76ec33638b29fcc920eb91aa0414f518625f17620064216f5a0bb33eb5b8bc94a214c3689f9481160fb0838fbfa23f8168a48c6abd78928dcd6af79179398ed455c87a51faea38015b656db2b30e339bc8c199c729a87eb4c170fb9bede652c017105b8660dfed60768b69bcc00708336576645510a8030009ca8f199f5bb028b9b364d16ccc889ac855855f154845c314b2a79da8c4631d5faa6a674828f51bcc19b32485e37abd91fc0a58b5ed7887e1be3e332567917db7fef23df302eece2b4848efe3c5c4805e98208816074507909276a6752d5433d375ee9e31e070763e823d38c9dca9f6e4eaf8816b3c7b5ff73f834eb28d72ce3ee4761bc9b4f86700a1a5922f7d5a810fb26d63ca2790253380bac8060e8eac1a5064faa3aad1052c21c2fdaecfbd541e1d306cd4ce40fa84d57ce6256820883688a41bf5bcd12488be0eca383a2cd0ae6fff2470734b03912f40540302251b0758673fb7ab8804325974876cde00117cac85810980065c01c8b28b0474ccde9677e51ae7b38226ea1172a740c738af1512b900f349ba364b2cb307b4f779e757a7bf04ba7381766f56b61900f5d0048c501fd756a8ec8466fad6e2155d145b8d1a4df0f1d3934c13edc8c9f24a467b7275bb28a467a437490424924785ffb1690cfbb37dbdbc8a4767fb3d443195249c52074e62b5140723ccd544fd24e67cce516beab1db133ce00f3d59f651f5e6ab685e236f5641a1517350f2b6ddb9f3fde9fca9c5d7c3adf74b241b55b3e20abccbc1f73c1cd38bbd5b4e2134d115f819d97262e5037db050b06eed8d550acee723dd0ae8d8186ba89731e711c301d567e4fe67e360afb1ffd492cb7e0fdb45f699026b44acb3fa5349cb84fb9e3d5a1d2fdb3b39b614a860c531421f858acc8f2a0794cd2744eacb668c301fd355061a0cb4323a722e1ffec57ebde1fd08d55cc", @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c6167636537733d757365f22c6b27137b202cd8ad6f6c71df7fa16f8b27832e971f55a4036018f5a8454905dfaade5816ed010c816ee5c10fbb370c14ceef593f1b74ee00006b94f7757c0d010d6e15b2867d28de59"]) mmap$snddsp_control(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8, 0x810, 0xffffffffffffffff, 0x83000000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) [ 398.933774] BTRFS error (device loop5): open_ctree failed 06:06:28 executing program 0: 06:06:28 executing program 0: 06:06:28 executing program 2: 06:06:28 executing program 3: 06:06:28 executing program 1: [ 399.039760] FAULT_INJECTION: forcing a failure. [ 399.039760] name failslab, interval 1, probability 0, space 0, times 0 [ 399.097426] CPU: 1 PID: 3243 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 399.105248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 399.114596] Call Trace: [ 399.117183] dump_stack+0x1b2/0x283 [ 399.120813] should_fail.cold+0x10a/0x154 [ 399.124952] should_failslab+0xd6/0x130 [ 399.128906] kmem_cache_alloc_node+0x263/0x410 [ 399.133469] __alloc_skb+0x5c/0x510 [ 399.137075] kobject_uevent_env+0x882/0xf40 [ 399.141384] lo_ioctl+0x11a6/0x1cd0 [ 399.144990] ? loop_set_status64+0xe0/0xe0 [ 399.149219] blkdev_ioctl+0x540/0x1830 [ 399.153086] ? blkpg_ioctl+0x8d0/0x8d0 [ 399.156968] ? trace_hardirqs_on+0x10/0x10 [ 399.161181] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 399.166284] ? debug_check_no_obj_freed+0x2c0/0x674 [ 399.171281] block_ioctl+0xd9/0x120 [ 399.174902] ? blkdev_fallocate+0x3a0/0x3a0 [ 399.179200] do_vfs_ioctl+0x75a/0xff0 [ 399.183002] ? ioctl_preallocate+0x1a0/0x1a0 [ 399.187389] ? lock_downgrade+0x740/0x740 [ 399.191525] ? __fget+0x225/0x360 [ 399.194970] ? do_vfs_ioctl+0xff0/0xff0 [ 399.198922] ? security_file_ioctl+0x83/0xb0 [ 399.203305] SyS_ioctl+0x7f/0xb0 [ 399.206649] ? do_vfs_ioctl+0xff0/0xff0 [ 399.210602] do_syscall_64+0x1d5/0x640 [ 399.214661] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 399.219827] RIP: 0033:0x45dd27 [ 399.222991] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 399.230680] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 399.237926] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 06:06:28 executing program 2: [ 399.245188] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 399.252434] R10: 0000000000010b20 R11: 0000000000000246 R12: 0000000000000004 [ 399.259706] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 399.287462] BTRFS info (device loop5): turning off barriers [ 399.302302] BTRFS info (device loop5): unrecognized mount option 'fragment=all' 06:06:28 executing program 5 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @remote}, 0xfffffffffffffc3c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4200, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000140)={'#! ', './file0', [{0x20, '#^$)T#.(\xcb/(.d}},\'('}, {}, {0x20, '#'}], 0xa, "19e4bcda8ca30b46a4cb40366093124a57585bf3f3f2981b01708002db3f5121d9ae241a3cc909aadc181274e0af8f58db4057adc575d75bc7ed16402cc01bec18a11011a351f83a0aa946f52ff0282a43e9adb8aadb59a78d8b7786fd5e316948d39e027f2f7f699d1bbcb44eece1ff863dc37cae7c906b84cc36f92b6c99c056b7666d2c3e834ad08034233a0c64ab8da856d711e4caacab83cb71597d1efc06d9516cc3bab35daddee741787e9bcb8fba3a6ced33f913ce46b964c4efd2cc8a2ad43743d3e057370e6ceb1f180aefd1182a0ac6"}, 0xf6) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:28 executing program 1: 06:06:28 executing program 3: 06:06:28 executing program 0: 06:06:28 executing program 2: [ 399.364061] BTRFS error (device loop5): open_ctree failed 06:06:28 executing program 1: 06:06:28 executing program 3: 06:06:28 executing program 2: 06:06:28 executing program 0: [ 399.474491] FAULT_INJECTION: forcing a failure. [ 399.474491] name failslab, interval 1, probability 0, space 0, times 0 06:06:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x400, @multicast1}, 0xfffffffffffffe76) setsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f0000000000)={@local, @loopback}, 0x8) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f00000000c0), 0x1, 0x0) 06:06:28 executing program 1: [ 399.528106] CPU: 0 PID: 3280 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 399.535933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 399.545280] Call Trace: [ 399.547868] dump_stack+0x1b2/0x283 [ 399.551563] should_fail.cold+0x10a/0x154 [ 399.555707] should_failslab+0xd6/0x130 [ 399.559683] kmem_cache_alloc_node+0x263/0x410 [ 399.564266] __alloc_skb+0x5c/0x510 [ 399.567897] kobject_uevent_env+0x882/0xf40 [ 399.572230] lo_ioctl+0x11a6/0x1cd0 [ 399.575862] ? loop_set_status64+0xe0/0xe0 [ 399.580092] blkdev_ioctl+0x540/0x1830 [ 399.583974] ? blkpg_ioctl+0x8d0/0x8d0 [ 399.587856] ? trace_hardirqs_on+0x10/0x10 [ 399.592091] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 399.597190] ? debug_check_no_obj_freed+0x2c0/0x674 [ 399.602216] block_ioctl+0xd9/0x120 [ 399.605830] ? blkdev_fallocate+0x3a0/0x3a0 [ 399.610130] do_vfs_ioctl+0x75a/0xff0 [ 399.613920] ? ioctl_preallocate+0x1a0/0x1a0 [ 399.618312] ? lock_downgrade+0x740/0x740 [ 399.622438] ? __fget+0x225/0x360 [ 399.625887] ? do_vfs_ioctl+0xff0/0xff0 [ 399.629844] ? security_file_ioctl+0x83/0xb0 [ 399.634242] SyS_ioctl+0x7f/0xb0 [ 399.637593] ? do_vfs_ioctl+0xff0/0xff0 [ 399.641546] do_syscall_64+0x1d5/0x640 [ 399.645416] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 399.650582] RIP: 0033:0x45dd27 [ 399.653752] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 399.661882] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 399.669128] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 399.676381] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 399.683651] R10: 0000000000010b20 R11: 0000000000000246 R12: 0000000000000004 [ 399.690905] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 399.711912] BTRFS info (device loop5): turning off barriers [ 399.722134] BTRFS info (device loop5): unrecognized mount option 'fragment=all' 06:06:29 executing program 5 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x80101, 0x0) ioctl$RTC_VL_CLR(r3, 0x7014) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r1, 0x8982, &(0x7f0000000100)={0x6, 'rose0\x00', {0x4}, 0x9}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYRESOCT=r2], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:29 executing program 1: 06:06:29 executing program 2: 06:06:29 executing program 0: 06:06:29 executing program 3: [ 399.783783] BTRFS error (device loop5): open_ctree failed 06:06:29 executing program 3: 06:06:29 executing program 0: 06:06:29 executing program 2: 06:06:29 executing program 4: userfaultfd(0x80000) r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:29 executing program 1: [ 399.900191] FAULT_INJECTION: forcing a failure. [ 399.900191] name failslab, interval 1, probability 0, space 0, times 0 [ 399.924508] CPU: 0 PID: 3318 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 399.932328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 399.941677] Call Trace: [ 399.944265] dump_stack+0x1b2/0x283 06:06:29 executing program 0: [ 399.947896] should_fail.cold+0x10a/0x154 [ 399.952051] should_failslab+0xd6/0x130 [ 399.956029] kmem_cache_alloc_node+0x263/0x410 [ 399.960610] __alloc_skb+0x5c/0x510 [ 399.964236] kobject_uevent_env+0x882/0xf40 [ 399.968563] lo_ioctl+0x11a6/0x1cd0 [ 399.972190] ? loop_set_status64+0xe0/0xe0 [ 399.976415] blkdev_ioctl+0x540/0x1830 [ 399.980437] ? blkpg_ioctl+0x8d0/0x8d0 [ 399.984310] ? trace_hardirqs_on+0x10/0x10 [ 399.988540] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 399.993631] ? debug_check_no_obj_freed+0x2c0/0x674 [ 399.998646] block_ioctl+0xd9/0x120 [ 400.002252] ? blkdev_fallocate+0x3a0/0x3a0 [ 400.006560] do_vfs_ioctl+0x75a/0xff0 [ 400.010386] ? ioctl_preallocate+0x1a0/0x1a0 [ 400.014894] ? lock_downgrade+0x740/0x740 [ 400.019081] ? __fget+0x225/0x360 [ 400.022519] ? do_vfs_ioctl+0xff0/0xff0 [ 400.026477] ? security_file_ioctl+0x83/0xb0 [ 400.030878] SyS_ioctl+0x7f/0xb0 [ 400.034250] ? do_vfs_ioctl+0xff0/0xff0 [ 400.038213] do_syscall_64+0x1d5/0x640 [ 400.042083] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 400.047281] RIP: 0033:0x45dd27 [ 400.050453] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 400.058147] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 400.065396] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 400.072659] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 400.079906] R10: 0000000000010b20 R11: 0000000000000246 R12: 0000000000000004 [ 400.087154] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 400.121422] BTRFS info (device loop5): turning off barriers [ 400.127684] BTRFS info (device loop5): unrecognized mount option 'fragment=all' [ 400.184163] BTRFS error (device loop5): open_ctree failed 06:06:29 executing program 5 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:29 executing program 0: 06:06:29 executing program 3: 06:06:29 executing program 2: 06:06:29 executing program 1: 06:06:29 executing program 2: 06:06:29 executing program 3: 06:06:29 executing program 2: 06:06:29 executing program 0: 06:06:29 executing program 1: [ 400.316151] FAULT_INJECTION: forcing a failure. [ 400.316151] name failslab, interval 1, probability 0, space 0, times 0 06:06:29 executing program 3: 06:06:29 executing program 3: [ 400.362933] CPU: 0 PID: 3348 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 400.370757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.380107] Call Trace: [ 400.382698] dump_stack+0x1b2/0x283 [ 400.386330] should_fail.cold+0x10a/0x154 [ 400.390484] should_failslab+0xd6/0x130 [ 400.394458] kmem_cache_alloc_node_trace+0x25a/0x400 [ 400.399562] __kmalloc_node_track_caller+0x38/0x70 [ 400.404540] __alloc_skb+0x96/0x510 [ 400.408167] kobject_uevent_env+0x882/0xf40 [ 400.412494] lo_ioctl+0x11a6/0x1cd0 [ 400.416133] ? loop_set_status64+0xe0/0xe0 [ 400.420369] blkdev_ioctl+0x540/0x1830 [ 400.424252] ? blkpg_ioctl+0x8d0/0x8d0 [ 400.428137] ? trace_hardirqs_on+0x10/0x10 [ 400.432370] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 400.437473] ? debug_check_no_obj_freed+0x2c0/0x674 [ 400.442492] block_ioctl+0xd9/0x120 [ 400.446114] ? blkdev_fallocate+0x3a0/0x3a0 [ 400.450434] do_vfs_ioctl+0x75a/0xff0 [ 400.454233] ? ioctl_preallocate+0x1a0/0x1a0 [ 400.458638] ? lock_downgrade+0x740/0x740 [ 400.462785] ? __fget+0x225/0x360 [ 400.466233] ? do_vfs_ioctl+0xff0/0xff0 [ 400.470211] ? security_file_ioctl+0x83/0xb0 [ 400.474614] SyS_ioctl+0x7f/0xb0 [ 400.477975] ? do_vfs_ioctl+0xff0/0xff0 [ 400.481944] do_syscall_64+0x1d5/0x640 [ 400.485835] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 400.491020] RIP: 0033:0x45dd27 [ 400.494202] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 400.501903] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 400.509166] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 400.516429] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 400.523690] R10: 0000000000010b20 R11: 0000000000000246 R12: 0000000000000004 [ 400.530952] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 400.563923] BTRFS info (device loop5): turning off barriers [ 400.570029] BTRFS info (device loop5): unrecognized mount option 'fragment=all' 06:06:29 executing program 5 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:29 executing program 0: 06:06:29 executing program 3: 06:06:29 executing program 2: 06:06:29 executing program 1: [ 400.637371] BTRFS error (device loop5): open_ctree failed 06:06:29 executing program 0: 06:06:29 executing program 2: 06:06:29 executing program 3: 06:06:30 executing program 1: 06:06:30 executing program 3: 06:06:30 executing program 1: 06:06:30 executing program 3: [ 400.768476] FAULT_INJECTION: forcing a failure. [ 400.768476] name failslab, interval 1, probability 0, space 0, times 0 [ 400.831857] CPU: 0 PID: 3377 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 400.839782] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.849132] Call Trace: [ 400.851720] dump_stack+0x1b2/0x283 [ 400.855452] should_fail.cold+0x10a/0x154 [ 400.860472] should_failslab+0xd6/0x130 [ 400.864449] kmem_cache_alloc_node_trace+0x25a/0x400 [ 400.869590] __kmalloc_node_track_caller+0x38/0x70 [ 400.874519] __alloc_skb+0x96/0x510 [ 400.878147] kobject_uevent_env+0x882/0xf40 [ 400.882471] lo_ioctl+0x11a6/0x1cd0 [ 400.886099] ? loop_set_status64+0xe0/0xe0 [ 400.890335] blkdev_ioctl+0x540/0x1830 [ 400.894236] ? blkpg_ioctl+0x8d0/0x8d0 [ 400.898379] ? trace_hardirqs_on+0x10/0x10 [ 400.902617] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 400.907728] ? debug_check_no_obj_freed+0x2c0/0x674 [ 400.912743] block_ioctl+0xd9/0x120 [ 400.916364] ? blkdev_fallocate+0x3a0/0x3a0 [ 400.920683] do_vfs_ioctl+0x75a/0xff0 [ 400.924482] ? ioctl_preallocate+0x1a0/0x1a0 [ 400.928925] ? lock_downgrade+0x740/0x740 [ 400.933075] ? __fget+0x225/0x360 [ 400.936521] ? do_vfs_ioctl+0xff0/0xff0 [ 400.940491] ? security_file_ioctl+0x83/0xb0 [ 400.944900] SyS_ioctl+0x7f/0xb0 [ 400.948260] ? do_vfs_ioctl+0xff0/0xff0 [ 400.952232] do_syscall_64+0x1d5/0x640 [ 400.956124] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 400.961309] RIP: 0033:0x45dd27 [ 400.964489] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 400.972194] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 400.979457] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 400.986721] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 400.994096] R10: 0000000000010b20 R11: 0000000000000246 R12: 0000000000000004 [ 401.001364] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 401.029201] BTRFS info (device loop5): turning off barriers [ 401.037145] BTRFS info (device loop5): unrecognized mount option 'fragment=all' [ 401.085849] BTRFS error (device loop5): open_ctree failed 06:06:30 executing program 5 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:30 executing program 3: 06:06:30 executing program 0: 06:06:30 executing program 1: 06:06:30 executing program 2: 06:06:30 executing program 2: 06:06:30 executing program 1: 06:06:30 executing program 0: 06:06:30 executing program 3: 06:06:30 executing program 1: 06:06:30 executing program 2: [ 401.235780] FAULT_INJECTION: forcing a failure. [ 401.235780] name failslab, interval 1, probability 0, space 0, times 0 06:06:30 executing program 0: [ 401.293638] CPU: 0 PID: 3408 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 401.301461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 401.310987] Call Trace: [ 401.313584] dump_stack+0x1b2/0x283 [ 401.317300] should_fail.cold+0x10a/0x154 [ 401.321450] should_failslab+0xd6/0x130 [ 401.325421] kmem_cache_alloc_node_trace+0x25a/0x400 [ 401.330528] __kmalloc_node_track_caller+0x38/0x70 [ 401.335459] __alloc_skb+0x96/0x510 [ 401.339087] kobject_uevent_env+0x882/0xf40 [ 401.343416] lo_ioctl+0x11a6/0x1cd0 [ 401.347047] ? loop_set_status64+0xe0/0xe0 [ 401.351280] blkdev_ioctl+0x540/0x1830 [ 401.355167] ? blkpg_ioctl+0x8d0/0x8d0 [ 401.359065] ? trace_hardirqs_on+0x10/0x10 [ 401.363315] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 401.368430] ? debug_check_no_obj_freed+0x2c0/0x674 [ 401.373453] block_ioctl+0xd9/0x120 [ 401.377085] ? blkdev_fallocate+0x3a0/0x3a0 [ 401.381408] do_vfs_ioctl+0x75a/0xff0 [ 401.385209] ? ioctl_preallocate+0x1a0/0x1a0 [ 401.389612] ? lock_downgrade+0x740/0x740 [ 401.393850] ? __fget+0x225/0x360 [ 401.397408] ? do_vfs_ioctl+0xff0/0xff0 [ 401.401383] ? security_file_ioctl+0x83/0xb0 [ 401.405805] SyS_ioctl+0x7f/0xb0 [ 401.409168] ? do_vfs_ioctl+0xff0/0xff0 [ 401.413143] do_syscall_64+0x1d5/0x640 [ 401.417035] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 401.422227] RIP: 0033:0x45dd27 [ 401.425843] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 401.433545] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 401.440810] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 401.448073] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 401.455338] R10: 0000000000010b20 R11: 0000000000000246 R12: 0000000000000004 [ 401.462600] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 401.494391] BTRFS info (device loop5): turning off barriers [ 401.505796] BTRFS info (device loop5): unrecognized mount option 'fragment=all' [ 401.556990] BTRFS error (device loop5): open_ctree failed 06:06:30 executing program 5 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:30 executing program 3: 06:06:30 executing program 0: 06:06:30 executing program 2: 06:06:30 executing program 1: 06:06:30 executing program 0: 06:06:30 executing program 3: 06:06:30 executing program 1: [ 401.697819] FAULT_INJECTION: forcing a failure. [ 401.697819] name failslab, interval 1, probability 0, space 0, times 0 [ 401.715548] CPU: 0 PID: 3435 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 401.723362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 401.732707] Call Trace: [ 401.735299] dump_stack+0x1b2/0x283 [ 401.738953] should_fail.cold+0x10a/0x154 [ 401.743101] should_failslab+0xd6/0x130 06:06:31 executing program 3: 06:06:31 executing program 0: [ 401.747072] kmem_cache_alloc_node_trace+0x25a/0x400 [ 401.752178] __kmalloc_node_track_caller+0x38/0x70 [ 401.757110] __alloc_skb+0x96/0x510 [ 401.760736] kobject_uevent_env+0x882/0xf40 [ 401.765059] lo_ioctl+0x11a6/0x1cd0 [ 401.768686] ? loop_set_status64+0xe0/0xe0 [ 401.772917] blkdev_ioctl+0x540/0x1830 [ 401.776799] ? blkpg_ioctl+0x8d0/0x8d0 [ 401.780682] ? trace_hardirqs_on+0x10/0x10 [ 401.784916] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 401.790016] ? debug_check_no_obj_freed+0x2c0/0x674 [ 401.795040] block_ioctl+0xd9/0x120 [ 401.798662] ? blkdev_fallocate+0x3a0/0x3a0 [ 401.802975] do_vfs_ioctl+0x75a/0xff0 [ 401.806777] ? ioctl_preallocate+0x1a0/0x1a0 [ 401.811179] ? lock_downgrade+0x740/0x740 [ 401.815325] ? __fget+0x225/0x360 [ 401.818778] ? do_vfs_ioctl+0xff0/0xff0 [ 401.822747] ? security_file_ioctl+0x83/0xb0 [ 401.827154] SyS_ioctl+0x7f/0xb0 [ 401.830510] ? do_vfs_ioctl+0xff0/0xff0 [ 401.834480] do_syscall_64+0x1d5/0x640 [ 401.838376] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 401.843561] RIP: 0033:0x45dd27 06:06:31 executing program 1: 06:06:31 executing program 2: [ 401.846742] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 401.854460] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 401.861722] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 401.868982] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 401.876241] R10: 0000000000010b20 R11: 0000000000000246 R12: 0000000000000004 [ 401.883504] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 401.966961] BTRFS info (device loop5): turning off barriers [ 401.989976] BTRFS info (device loop5): unrecognized mount option 'fragment=all' 06:06:31 executing program 5 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:31 executing program 0: [ 402.043743] BTRFS error (device loop5): open_ctree failed 06:06:31 executing program 1: 06:06:31 executing program 3: 06:06:31 executing program 2: 06:06:31 executing program 0: 06:06:31 executing program 3: 06:06:31 executing program 2: 06:06:31 executing program 1: [ 402.174249] FAULT_INJECTION: forcing a failure. [ 402.174249] name failslab, interval 1, probability 0, space 0, times 0 06:06:31 executing program 0: 06:06:31 executing program 3: [ 402.215508] CPU: 0 PID: 3465 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 402.223328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.232677] Call Trace: [ 402.235273] dump_stack+0x1b2/0x283 [ 402.238902] should_fail.cold+0x10a/0x154 [ 402.243055] should_failslab+0xd6/0x130 [ 402.247031] kmem_cache_alloc_node_trace+0x25a/0x400 [ 402.252137] __kmalloc_node_track_caller+0x38/0x70 [ 402.257062] __alloc_skb+0x96/0x510 [ 402.260691] kobject_uevent_env+0x882/0xf40 [ 402.265015] lo_ioctl+0x11a6/0x1cd0 [ 402.268646] ? loop_set_status64+0xe0/0xe0 [ 402.272882] blkdev_ioctl+0x540/0x1830 [ 402.276772] ? blkpg_ioctl+0x8d0/0x8d0 [ 402.280656] ? trace_hardirqs_on+0x10/0x10 [ 402.284892] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 402.289999] ? debug_check_no_obj_freed+0x2c0/0x674 [ 402.295015] block_ioctl+0xd9/0x120 [ 402.298638] ? blkdev_fallocate+0x3a0/0x3a0 [ 402.302955] do_vfs_ioctl+0x75a/0xff0 [ 402.306754] ? ioctl_preallocate+0x1a0/0x1a0 [ 402.311159] ? lock_downgrade+0x740/0x740 06:06:31 executing program 3: [ 402.315317] ? __fget+0x225/0x360 [ 402.318769] ? do_vfs_ioctl+0xff0/0xff0 [ 402.322744] ? security_file_ioctl+0x83/0xb0 [ 402.327212] SyS_ioctl+0x7f/0xb0 [ 402.330579] ? do_vfs_ioctl+0xff0/0xff0 [ 402.334553] do_syscall_64+0x1d5/0x640 [ 402.338444] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 402.343626] RIP: 0033:0x45dd27 [ 402.346805] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 402.354691] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 402.361955] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 402.369220] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 402.376490] R10: 0000000000010b20 R11: 0000000000000246 R12: 0000000000000004 [ 402.383764] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 402.404894] print_req_error: 36 callbacks suppressed [ 402.404900] print_req_error: I/O error, dev loop5, sector 0 [ 402.415811] buffer_io_error: 30 callbacks suppressed [ 402.415817] Buffer I/O error on dev loop5, logical block 0, async page read [ 402.428866] print_req_error: I/O error, dev loop5, sector 24 [ 402.435132] Buffer I/O error on dev loop5, logical block 3, async page read [ 402.465224] BTRFS info (device loop5): turning off barriers [ 402.473247] BTRFS info (device loop5): unrecognized mount option 'fragment=all' 06:06:31 executing program 5 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) [ 402.517453] BTRFS error (device loop5): open_ctree failed 06:06:31 executing program 0: 06:06:31 executing program 3: 06:06:31 executing program 2: 06:06:31 executing program 1: 06:06:31 executing program 3: 06:06:31 executing program 1: 06:06:31 executing program 0: 06:06:31 executing program 2: [ 402.628158] FAULT_INJECTION: forcing a failure. [ 402.628158] name failslab, interval 1, probability 0, space 0, times 0 [ 402.681977] CPU: 0 PID: 3493 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 402.689795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.699147] Call Trace: [ 402.701736] dump_stack+0x1b2/0x283 [ 402.705365] should_fail.cold+0x10a/0x154 [ 402.709536] should_failslab+0xd6/0x130 [ 402.713507] kmem_cache_alloc_node+0x263/0x410 [ 402.718090] __alloc_skb+0x5c/0x510 [ 402.721720] kobject_uevent_env+0x882/0xf40 [ 402.726044] lo_ioctl+0x11a6/0x1cd0 [ 402.729670] ? loop_set_status64+0xe0/0xe0 [ 402.733903] blkdev_ioctl+0x540/0x1830 [ 402.737785] ? blkpg_ioctl+0x8d0/0x8d0 [ 402.741667] ? trace_hardirqs_on+0x10/0x10 [ 402.745901] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 402.750999] ? debug_check_no_obj_freed+0x2c0/0x674 [ 402.756013] block_ioctl+0xd9/0x120 [ 402.759638] ? blkdev_fallocate+0x3a0/0x3a0 [ 402.763956] do_vfs_ioctl+0x75a/0xff0 [ 402.767751] ? ioctl_preallocate+0x1a0/0x1a0 [ 402.772150] ? lock_downgrade+0x740/0x740 [ 402.776296] ? __fget+0x225/0x360 [ 402.779742] ? do_vfs_ioctl+0xff0/0xff0 [ 402.783714] ? security_file_ioctl+0x83/0xb0 [ 402.788118] SyS_ioctl+0x7f/0xb0 [ 402.791477] ? do_vfs_ioctl+0xff0/0xff0 [ 402.795445] do_syscall_64+0x1d5/0x640 [ 402.799333] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 402.804515] RIP: 0033:0x45dd27 [ 402.807695] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 402.815398] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 402.822659] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 06:06:32 executing program 3: 06:06:32 executing program 1: 06:06:32 executing program 2: [ 402.829924] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 402.837216] R10: 0000000000010b20 R11: 0000000000000246 R12: 0000000000000004 [ 402.844479] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 402.898456] BTRFS info (device loop5): turning off barriers [ 402.927672] BTRFS info (device loop5): unrecognized mount option 'fragment=all' [ 403.008168] BTRFS error (device loop5): open_ctree failed 06:06:32 executing program 5 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:32 executing program 0: 06:06:32 executing program 3: 06:06:32 executing program 2: 06:06:32 executing program 1: [ 403.110766] FAULT_INJECTION: forcing a failure. [ 403.110766] name failslab, interval 1, probability 0, space 0, times 0 [ 403.152554] CPU: 1 PID: 3518 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 403.160368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 403.169716] Call Trace: [ 403.172301] dump_stack+0x1b2/0x283 [ 403.175953] should_fail.cold+0x10a/0x154 [ 403.180100] should_failslab+0xd6/0x130 [ 403.184071] kmem_cache_alloc_node_trace+0x25a/0x400 [ 403.189176] __kmalloc_node_track_caller+0x38/0x70 [ 403.194104] __alloc_skb+0x96/0x510 [ 403.197730] kobject_uevent_env+0x882/0xf40 [ 403.202059] lo_ioctl+0x11a6/0x1cd0 [ 403.205683] ? loop_set_status64+0xe0/0xe0 [ 403.209914] blkdev_ioctl+0x540/0x1830 [ 403.213801] ? blkpg_ioctl+0x8d0/0x8d0 [ 403.217686] ? trace_hardirqs_on+0x10/0x10 [ 403.221922] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 403.227042] ? debug_check_no_obj_freed+0x2c0/0x674 [ 403.232062] block_ioctl+0xd9/0x120 [ 403.235684] ? blkdev_fallocate+0x3a0/0x3a0 [ 403.240000] do_vfs_ioctl+0x75a/0xff0 [ 403.243797] ? ioctl_preallocate+0x1a0/0x1a0 [ 403.248199] ? lock_downgrade+0x740/0x740 06:06:32 executing program 1: 06:06:32 executing program 0: 06:06:32 executing program 3: 06:06:32 executing program 2: 06:06:32 executing program 3: 06:06:32 executing program 1: 06:06:32 executing program 2: [ 403.252349] ? __fget+0x225/0x360 [ 403.255798] ? do_vfs_ioctl+0xff0/0xff0 [ 403.259768] ? security_file_ioctl+0x83/0xb0 [ 403.264171] SyS_ioctl+0x7f/0xb0 [ 403.267532] ? do_vfs_ioctl+0xff0/0xff0 [ 403.271506] do_syscall_64+0x1d5/0x640 [ 403.275392] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 403.280573] RIP: 0033:0x45dd27 [ 403.283754] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 403.291463] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 403.298802] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 403.306090] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 403.313432] R10: 0000000000010b20 R11: 0000000000000246 R12: 0000000000000004 [ 403.320683] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 403.362859] print_req_error: I/O error, dev loop5, sector 0 [ 403.398572] BTRFS info (device loop5): turning off barriers [ 403.413109] BTRFS info (device loop5): unrecognized mount option 'fragment=all' 06:06:32 executing program 5 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:32 executing program 3: 06:06:32 executing program 1: 06:06:32 executing program 2: 06:06:32 executing program 0: [ 403.465998] BTRFS error (device loop5): open_ctree failed [ 403.504223] print_req_error: I/O error, dev loop5, sector 0 06:06:32 executing program 1: 06:06:32 executing program 2: 06:06:32 executing program 0: 06:06:32 executing program 2: 06:06:32 executing program 3: 06:06:32 executing program 0: 06:06:32 executing program 2: [ 403.641121] FAULT_INJECTION: forcing a failure. [ 403.641121] name failslab, interval 1, probability 0, space 0, times 0 [ 403.687193] CPU: 0 PID: 3554 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 403.695006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 403.704357] Call Trace: [ 403.706940] dump_stack+0x1b2/0x283 [ 403.710568] should_fail.cold+0x10a/0x154 [ 403.714721] should_failslab+0xd6/0x130 [ 403.718697] kmem_cache_alloc_node+0x263/0x410 [ 403.723279] __alloc_skb+0x5c/0x510 [ 403.726904] kobject_uevent_env+0x882/0xf40 [ 403.731230] lo_ioctl+0x11a6/0x1cd0 [ 403.734858] ? loop_set_status64+0xe0/0xe0 [ 403.739092] blkdev_ioctl+0x540/0x1830 [ 403.743012] ? blkpg_ioctl+0x8d0/0x8d0 [ 403.746896] ? trace_hardirqs_on+0x10/0x10 [ 403.751137] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 403.756239] ? debug_check_no_obj_freed+0x2c0/0x674 [ 403.761260] block_ioctl+0xd9/0x120 [ 403.764885] ? blkdev_fallocate+0x3a0/0x3a0 [ 403.769205] do_vfs_ioctl+0x75a/0xff0 [ 403.773006] ? ioctl_preallocate+0x1a0/0x1a0 [ 403.777412] ? lock_downgrade+0x740/0x740 [ 403.781562] ? __fget+0x225/0x360 [ 403.785014] ? do_vfs_ioctl+0xff0/0xff0 [ 403.788988] ? security_file_ioctl+0x83/0xb0 [ 403.793392] SyS_ioctl+0x7f/0xb0 [ 403.796750] ? do_vfs_ioctl+0xff0/0xff0 [ 403.800722] do_syscall_64+0x1d5/0x640 [ 403.804614] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 403.809800] RIP: 0033:0x45dd27 [ 403.812997] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 403.820710] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 403.828009] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 403.835274] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 403.842541] R10: 0000000000010b20 R11: 0000000000000246 R12: 0000000000000004 [ 403.849806] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 403.895610] BTRFS info (device loop5): turning off barriers [ 403.909228] BTRFS info (device loop5): unrecognized mount option 'fragment=all' [ 403.973549] BTRFS error (device loop5): open_ctree failed 06:06:33 executing program 5 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:33 executing program 1: 06:06:33 executing program 0: 06:06:33 executing program 3: 06:06:33 executing program 2: 06:06:33 executing program 0: 06:06:33 executing program 2: 06:06:33 executing program 1: 06:06:33 executing program 3: 06:06:33 executing program 0: 06:06:33 executing program 2: 06:06:33 executing program 1: [ 404.140961] FAULT_INJECTION: forcing a failure. [ 404.140961] name failslab, interval 1, probability 0, space 0, times 0 [ 404.209574] CPU: 0 PID: 3580 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 404.218376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 404.227726] Call Trace: [ 404.230333] dump_stack+0x1b2/0x283 [ 404.233959] should_fail.cold+0x10a/0x154 [ 404.238105] should_failslab+0xd6/0x130 [ 404.242086] kmem_cache_alloc_node_trace+0x25a/0x400 [ 404.247199] __kmalloc_node_track_caller+0x38/0x70 [ 404.252129] __alloc_skb+0x96/0x510 [ 404.255757] kobject_uevent_env+0x882/0xf40 [ 404.260094] lo_ioctl+0x11a6/0x1cd0 [ 404.263726] ? loop_set_status64+0xe0/0xe0 [ 404.267962] blkdev_ioctl+0x540/0x1830 [ 404.271848] ? blkpg_ioctl+0x8d0/0x8d0 [ 404.275734] ? trace_hardirqs_on+0x10/0x10 [ 404.279968] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 404.287237] ? debug_check_no_obj_freed+0x2c0/0x674 [ 404.292255] block_ioctl+0xd9/0x120 [ 404.295878] ? blkdev_fallocate+0x3a0/0x3a0 [ 404.300197] do_vfs_ioctl+0x75a/0xff0 [ 404.303995] ? ioctl_preallocate+0x1a0/0x1a0 [ 404.308400] ? lock_downgrade+0x740/0x740 [ 404.312545] ? __fget+0x225/0x360 [ 404.315995] ? do_vfs_ioctl+0xff0/0xff0 [ 404.319967] ? security_file_ioctl+0x83/0xb0 [ 404.324371] SyS_ioctl+0x7f/0xb0 [ 404.327734] ? do_vfs_ioctl+0xff0/0xff0 [ 404.331707] do_syscall_64+0x1d5/0x640 [ 404.335598] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 404.340775] RIP: 0033:0x45dd27 [ 404.343947] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 404.351641] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 404.358888] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 404.366135] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 404.373385] R10: 0000000000010b20 R11: 0000000000000246 R12: 0000000000000004 [ 404.381245] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 404.414015] print_req_error: I/O error, dev loop5, sector 0 [ 404.419855] print_req_error: I/O error, dev loop5, sector 0 [ 404.425643] Buffer I/O error on dev loop5, logical block 0, async page read [ 404.432847] print_req_error: I/O error, dev loop5, sector 0 [ 404.440018] Buffer I/O error on dev loop5, logical block 0, async page read [ 404.453302] BTRFS info (device loop5): turning off barriers [ 404.461859] BTRFS info (device loop5): unrecognized mount option 'fragment=all' 06:06:33 executing program 5 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:33 executing program 0: 06:06:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r2, 0xc00464c9, &(0x7f00000000c0)) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:33 executing program 2: 06:06:33 executing program 3: 06:06:33 executing program 1: [ 404.503524] BTRFS error (device loop5): open_ctree failed 06:06:33 executing program 0: 06:06:33 executing program 2: 06:06:33 executing program 3: 06:06:33 executing program 1: 06:06:33 executing program 0: [ 404.616308] FAULT_INJECTION: forcing a failure. [ 404.616308] name failslab, interval 1, probability 0, space 0, times 0 [ 404.652344] CPU: 1 PID: 3613 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 06:06:33 executing program 0: [ 404.660165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 404.669527] Call Trace: [ 404.672118] dump_stack+0x1b2/0x283 [ 404.675749] should_fail.cold+0x10a/0x154 [ 404.679901] should_failslab+0xd6/0x130 [ 404.683877] kmem_cache_alloc_node+0x263/0x410 [ 404.688462] __alloc_skb+0x5c/0x510 [ 404.692092] kobject_uevent_env+0x882/0xf40 [ 404.696415] lo_ioctl+0x11a6/0x1cd0 [ 404.700134] ? loop_set_status64+0xe0/0xe0 [ 404.704352] blkdev_ioctl+0x540/0x1830 [ 404.708215] ? blkpg_ioctl+0x8d0/0x8d0 [ 404.712086] ? trace_hardirqs_on+0x10/0x10 [ 404.716298] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 404.721384] ? debug_check_no_obj_freed+0x2c0/0x674 [ 404.726383] block_ioctl+0xd9/0x120 [ 404.729986] ? blkdev_fallocate+0x3a0/0x3a0 [ 404.734580] do_vfs_ioctl+0x75a/0xff0 [ 404.738359] ? ioctl_preallocate+0x1a0/0x1a0 [ 404.742742] ? lock_downgrade+0x740/0x740 [ 404.746868] ? __fget+0x225/0x360 [ 404.750298] ? do_vfs_ioctl+0xff0/0xff0 [ 404.754306] ? security_file_ioctl+0x83/0xb0 [ 404.758700] SyS_ioctl+0x7f/0xb0 [ 404.762077] ? do_vfs_ioctl+0xff0/0xff0 [ 404.766033] do_syscall_64+0x1d5/0x640 [ 404.769943] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 404.775109] RIP: 0033:0x45dd27 [ 404.778274] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 404.785966] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 404.793209] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 404.800455] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 404.807712] R10: 0000000000010b20 R11: 0000000000000246 R12: 0000000000000004 [ 404.814968] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 404.845000] BTRFS info (device loop5): turning off barriers [ 404.851928] BTRFS info (device loop5): unrecognized mount option 'fragment=all' 06:06:34 executing program 5 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:34 executing program 3: 06:06:34 executing program 0: 06:06:34 executing program 1: 06:06:34 executing program 2: 06:06:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = syz_mount_image$hfsplus(&(0x7f00000000c0)='hfsplus\x00', &(0x7f0000000100)='./file0\x00', 0xb41e, 0x3, &(0x7f0000000300)=[{&(0x7f0000000140)="aa7548999ee79add4053f686246bce1883ee6792c7927b728cb3a35210a77317d48cfd8d2d365aae1e029515a90bafed80d4bb77e5f4f377794d6820628041baba7f89c296936b77475e6998b1ba527ca702641825b5f599248e01faaacd1a124f45cb6b6d12c85cf82cbe", 0x6b, 0x2}, {&(0x7f00000001c0)="b0735ae2b32ab9349c24f0869c35895e594863f2928cb04c337b20958ce79d3eb5ffe8e6d8c3f1f6eee08d8d13a6a624b511383e31ec66aa9d1aba9a97f7e951cc3c05ade670a4f32bb1ea799a617aa95e8181a851117e40a7f4e16887e3f5518c2b9bf8a1a0b029dce0cd45ab8df702dd2e2125e422045deb947a684fdc82c21ae1b26c0656c234d38ef0e78afa", 0x8e, 0x7}, {&(0x7f0000000280)="6f8f97cd333173ad1bc91de37aae13563381b0ade60eac20b4caed60e6e842123f2895926ba26aeb4f881693b9d90e39990b3b0e9907269b168f8fde18d955ac7f3c4d1dcb831c566ea8b03cbcb57090044990c007b76be1f1db272419a5ea82687c68ac6c0e4d41ac818d", 0x6b, 0xc9}], 0xbeb6bea7972749da, &(0x7f0000000380)={[{@creator={'creator', 0x3d, "ce479376"}}, {@nls={'nls', 0x3d, 'iso8859-15'}}, {@umask={'umask', 0x3d, 0x100}}, {@nodecompose='nodecompose'}, {@barrier='barrier'}, {@creator={'creator', 0x3d, "f571b9a5"}}, {@barrier='barrier'}, {@nodecompose='nodecompose'}, {@force='force'}], [{@hash='hash'}, {@fsname={'fsname', 0x3d, '\']'}}]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000440)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000640)={0x4, [0x40, 0x1000, 0x0, 0x1]}, 0xc) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) [ 404.888214] BTRFS error (device loop5): open_ctree failed 06:06:34 executing program 2: 06:06:34 executing program 0: 06:06:34 executing program 1: 06:06:34 executing program 3: [ 404.995936] FAULT_INJECTION: forcing a failure. [ 404.995936] name failslab, interval 1, probability 0, space 0, times 0 [ 405.012115] print_req_error: I/O error, dev loop5, sector 0 [ 405.028520] CPU: 1 PID: 3645 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 405.036335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.043694] print_req_error: I/O error, dev loop5, sector 0 [ 405.045679] Call Trace: [ 405.045696] dump_stack+0x1b2/0x283 [ 405.045712] should_fail.cold+0x10a/0x154 [ 405.045724] should_failslab+0xd6/0x130 [ 405.045737] kmem_cache_alloc_node_trace+0x25a/0x400 [ 405.051438] Buffer I/O error on dev loop5, logical block 0, async page read [ 405.054009] __kmalloc_node_track_caller+0x38/0x70 [ 405.054021] __alloc_skb+0x96/0x510 [ 405.054034] kobject_uevent_env+0x882/0xf40 [ 405.054051] lo_ioctl+0x11a6/0x1cd0 [ 405.054066] ? loop_set_status64+0xe0/0xe0 [ 405.063629] print_req_error: I/O error, dev loop5, sector 0 [ 405.065782] blkdev_ioctl+0x540/0x1830 [ 405.065794] ? blkpg_ioctl+0x8d0/0x8d0 [ 405.065806] ? trace_hardirqs_on+0x10/0x10 [ 405.065822] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 405.070921] Buffer I/O error on dev loop5, logical block 0, async page read [ 405.077999] ? debug_check_no_obj_freed+0x2c0/0x674 [ 405.078014] block_ioctl+0xd9/0x120 [ 405.078023] ? blkdev_fallocate+0x3a0/0x3a0 [ 405.078033] do_vfs_ioctl+0x75a/0xff0 [ 405.078047] ? ioctl_preallocate+0x1a0/0x1a0 [ 405.085497] Buffer I/O error on dev loop5, logical block 0, async page read [ 405.086561] ? lock_downgrade+0x740/0x740 [ 405.086577] ? __fget+0x225/0x360 [ 405.086587] ? do_vfs_ioctl+0xff0/0xff0 [ 405.086597] ? security_file_ioctl+0x83/0xb0 [ 405.086606] SyS_ioctl+0x7f/0xb0 [ 405.086615] ? do_vfs_ioctl+0xff0/0xff0 [ 405.091080] Buffer I/O error on dev loop5, logical block 0, async page read [ 405.094611] do_syscall_64+0x1d5/0x640 [ 405.094629] entry_SYSCALL_64_after_hwframe+0x46/0xbb 06:06:34 executing program 1: 06:06:34 executing program 0: [ 405.094637] RIP: 0033:0x45dd27 [ 405.094642] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 405.094651] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 405.094656] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 405.094660] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 405.094666] R10: 0000000000010b20 R11: 0000000000000246 R12: 0000000000000004 [ 405.094673] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 405.099045] Buffer I/O error on dev loop5, logical block 0, async page read [ 405.261989] BTRFS info (device loop5): turning off barriers [ 405.268614] BTRFS info (device loop5): unrecognized mount option 'fragment=all' 06:06:34 executing program 5 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:34 executing program 2: 06:06:34 executing program 3: 06:06:34 executing program 0: 06:06:34 executing program 1: 06:06:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) ioctl$VIDIOC_ENCODER_CMD(0xffffffffffffffff, 0xc028564d, &(0x7f00000000c0)={0x0, 0x0, [0x7, 0xfffffffd, 0x9, 0x28000000, 0x800, 0x2df, 0x3, 0x6]}) ioctl$DRM_IOCTL_MODE_DIRTYFB(r2, 0xc01864b1, &(0x7f0000000140)={0x7ff, 0x5, 0xd59, 0x6, &(0x7f0000000100)=[{0x2, 0x7ff, 0xe2, 0x2}, {0x19, 0x2dca, 0x77e6, 0x5}, {0xeeaf, 0x6, 0x2, 0x1}, {0x40, 0x2, 0x0, 0x1}, {0x1, 0x21, 0x2, 0x4}, {0x4, 0x3, 0x7, 0x9}]}) [ 405.333565] BTRFS error (device loop5): open_ctree failed 06:06:34 executing program 1: 06:06:34 executing program 3: [ 405.432228] FAULT_INJECTION: forcing a failure. [ 405.432228] name failslab, interval 1, probability 0, space 0, times 0 [ 405.438950] Buffer I/O error on dev loop5, logical block 0, async page read [ 405.464587] CPU: 1 PID: 3686 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 405.472399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.481748] Call Trace: [ 405.484337] dump_stack+0x1b2/0x283 [ 405.487975] should_fail.cold+0x10a/0x154 [ 405.492125] should_failslab+0xd6/0x130 [ 405.496100] kmem_cache_alloc_trace+0x29a/0x3d0 [ 405.500766] ? kobject_create.cold+0x1f/0x1f [ 405.505240] call_usermodehelper_setup+0x73/0x2e0 [ 405.510088] kobject_uevent_env+0xc28/0xf40 [ 405.514419] lo_ioctl+0x11a6/0x1cd0 [ 405.518055] ? loop_set_status64+0xe0/0xe0 [ 405.522316] blkdev_ioctl+0x540/0x1830 [ 405.526202] ? blkpg_ioctl+0x8d0/0x8d0 [ 405.530085] ? trace_hardirqs_on+0x10/0x10 [ 405.534320] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 405.539419] ? debug_check_no_obj_freed+0x2c0/0x674 [ 405.544441] block_ioctl+0xd9/0x120 [ 405.548071] ? blkdev_fallocate+0x3a0/0x3a0 [ 405.552391] do_vfs_ioctl+0x75a/0xff0 [ 405.556195] ? ioctl_preallocate+0x1a0/0x1a0 [ 405.560612] ? lock_downgrade+0x740/0x740 [ 405.564741] ? __fget+0x225/0x360 [ 405.568170] ? do_vfs_ioctl+0xff0/0xff0 [ 405.572122] ? security_file_ioctl+0x83/0xb0 [ 405.576518] SyS_ioctl+0x7f/0xb0 [ 405.579870] ? do_vfs_ioctl+0xff0/0xff0 [ 405.583838] do_syscall_64+0x1d5/0x640 [ 405.587709] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 405.592876] RIP: 0033:0x45dd27 [ 405.596040] RSP: 002b:00007fde1c26ca28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 405.603810] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dd27 [ 405.611061] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 405.618309] RBP: 0000000000000000 R08: 0000000020000260 R09: 0000000000000000 [ 405.625555] R10: 0000000000010b20 R11: 0000000000000246 R12: 0000000000000004 06:06:34 executing program 0: 06:06:34 executing program 2: 06:06:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$rxrpc(0x21, 0x2, 0xa) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:34 executing program 3: [ 405.632820] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000270 [ 405.649223] BTRFS info (device loop5): turning off barriers [ 405.656367] BTRFS info (device loop5): unrecognized mount option 'fragment=all' [ 405.703680] BTRFS error (device loop5): open_ctree failed 06:06:35 executing program 5 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:35 executing program 1: 06:06:35 executing program 3: 06:06:35 executing program 0: 06:06:35 executing program 2: 06:06:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/time\x00') syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:35 executing program 0: 06:06:35 executing program 3: 06:06:35 executing program 1: 06:06:35 executing program 2: 06:06:35 executing program 0: 06:06:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000000000000000000ff01", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000054c0)=@delchain={0x24, 0x2e, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xfff2, 0xffff}}}, 0x24}}, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x20, 0x400}) [ 405.849475] FAULT_INJECTION: forcing a failure. [ 405.849475] name failslab, interval 1, probability 0, space 0, times 0 [ 405.929018] CPU: 0 PID: 3721 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 405.936839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 405.946189] Call Trace: [ 405.948779] dump_stack+0x1b2/0x283 [ 405.952410] should_fail.cold+0x10a/0x154 [ 405.956564] should_failslab+0xd6/0x130 [ 405.960539] kmem_cache_alloc+0x28e/0x3c0 [ 405.964686] getname_flags+0xc8/0x550 [ 405.968485] SyS_mkdirat+0x83/0x270 [ 405.972110] ? SyS_mknod+0x30/0x30 [ 405.975646] ? fput+0xb/0x140 [ 405.978746] ? do_syscall_64+0x4c/0x640 [ 405.982715] ? SyS_mkdirat+0x270/0x270 [ 405.982983] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 405.986602] do_syscall_64+0x1d5/0x640 [ 405.986621] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 405.986628] RIP: 0033:0x45d2d7 [ 405.986632] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 405.986641] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000045d2d7 06:06:35 executing program 5 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:35 executing program 1: 06:06:35 executing program 0: 06:06:35 executing program 2: 06:06:35 executing program 3: [ 405.986646] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 405.986651] RBP: 00007fde1c26cae0 R08: 0000000020000260 R09: 0000000000000000 [ 405.986656] R10: 0000000000010b20 R11: 0000000000000213 R12: 0000000020000000 [ 405.986661] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 406.089660] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 06:06:35 executing program 3: 06:06:35 executing program 2: 06:06:35 executing program 0: [ 406.139534] FAULT_INJECTION: forcing a failure. [ 406.139534] name failslab, interval 1, probability 0, space 0, times 0 [ 406.151467] CPU: 1 PID: 3761 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 406.159270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.168616] Call Trace: [ 406.171203] dump_stack+0x1b2/0x283 [ 406.174832] should_fail.cold+0x10a/0x154 [ 406.178983] should_failslab+0xd6/0x130 [ 406.182963] kmem_cache_alloc+0x28e/0x3c0 [ 406.187116] __d_alloc+0x2a/0xa20 [ 406.190572] ? d_lookup+0x172/0x220 [ 406.194202] d_alloc+0x46/0x240 [ 406.197487] __lookup_hash+0x101/0x270 [ 406.201392] filename_create+0x156/0x3f0 [ 406.205463] ? kern_path_mountpoint+0x40/0x40 [ 406.209964] SyS_mkdirat+0x95/0x270 [ 406.213589] ? SyS_mknod+0x30/0x30 [ 406.217126] ? do_syscall_64+0x4c/0x640 [ 406.221099] ? SyS_mkdirat+0x270/0x270 [ 406.224982] do_syscall_64+0x1d5/0x640 [ 406.228873] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 406.234055] RIP: 0033:0x45d2d7 06:06:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) ioctl$SOUND_MIXER_WRITE_RECSRC(r2, 0xc0044dff, &(0x7f00000000c0)=0x7) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:35 executing program 1: 06:06:35 executing program 2: 06:06:35 executing program 1: [ 406.237238] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 406.244941] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000045d2d7 [ 406.252203] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 406.259469] RBP: 00007fde1c26cae0 R08: 0000000020000260 R09: 0000000000000000 [ 406.266739] R10: 0000000000010b20 R11: 0000000000000213 R12: 0000000020000000 [ 406.274090] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:35 executing program 5 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:35 executing program 2: 06:06:35 executing program 3: 06:06:35 executing program 0: 06:06:35 executing program 1: 06:06:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f00000000c0)={@multicast1, @broadcast}, 0xc) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) ioctl$RTC_PIE_OFF(r2, 0x7006) 06:06:35 executing program 3: 06:06:35 executing program 1: 06:06:35 executing program 2: 06:06:35 executing program 1: 06:06:35 executing program 0: 06:06:35 executing program 3: [ 406.425979] FAULT_INJECTION: forcing a failure. [ 406.425979] name failslab, interval 1, probability 0, space 0, times 0 [ 406.485458] CPU: 0 PID: 3798 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 406.493282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.502635] Call Trace: [ 406.505224] dump_stack+0x1b2/0x283 [ 406.508857] should_fail.cold+0x10a/0x154 [ 406.513006] should_failslab+0xd6/0x130 [ 406.516978] kmem_cache_alloc+0x28e/0x3c0 [ 406.521125] __d_alloc+0x2a/0xa20 [ 406.524578] ? d_lookup+0x172/0x220 [ 406.528203] d_alloc+0x46/0x240 [ 406.531484] __lookup_hash+0x101/0x270 [ 406.535370] filename_create+0x156/0x3f0 [ 406.539426] ? kern_path_mountpoint+0x40/0x40 [ 406.544185] SyS_mkdirat+0x95/0x270 [ 406.547810] ? SyS_mknod+0x30/0x30 [ 406.551355] ? do_syscall_64+0x4c/0x640 [ 406.555329] ? SyS_mkdirat+0x270/0x270 [ 406.559240] do_syscall_64+0x1d5/0x640 [ 406.563226] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 406.568409] RIP: 0033:0x45d2d7 [ 406.571588] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 406.579300] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000045d2d7 [ 406.586561] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 406.593828] RBP: 00007fde1c26cae0 R08: 0000000020000260 R09: 0000000000000000 [ 406.601090] R10: 0000000000010b20 R11: 0000000000000213 R12: 0000000020000000 [ 406.608353] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:35 executing program 5 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:35 executing program 2: 06:06:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r2, 0xc01064c7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)}) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:35 executing program 0: 06:06:35 executing program 3: 06:06:35 executing program 1: 06:06:35 executing program 3: 06:06:36 executing program 1: 06:06:36 executing program 0: 06:06:36 executing program 2: 06:06:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) sendmsg$NL80211_CMD_SET_COALESCE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xdc, 0x0, 0x0, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x6, 0x5d}}}}, [@NL80211_ATTR_COALESCE_RULE_CONDITION={0x8, 0x2, 0x1}, @NL80211_ATTR_COALESCE_RULE_PKT_PATTERN={0xb4, 0x3, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, @NL80211_PKTPAT_OFFSET={0x8, 0x3, 0x2af7}}, {0x94, 0x0, 0x0, 0x1, @NL80211_PKTPAT_PATTERN={0x8f, 0x2, "5cbb9fe5910b2a0e41c39d36dd668e1300317e42c2a2a7cbb28dad69ddaf5f395747acf871a2569e8008b843ffda67054597c216ea66310a0774cbb5b109c517249a7bd3d7ac9583a1e5b73e7b4a00689b87d113d073c7c3c693cfb1c2bfbc497a96c4872047885a344e6cecea95f018e5f2b9c30d59c8018cd5d9f947ba8627b54ad1f1332310c72fc30f"}}, {0x10, 0x0, 0x0, 0x1, @NL80211_PKTPAT_MASK={0xa, 0x1, "4f289ff62c3b"}}]}]}, 0xdc}}, 0x10) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:36 executing program 3: [ 406.800656] FAULT_INJECTION: forcing a failure. [ 406.800656] name failslab, interval 1, probability 0, space 0, times 0 [ 406.882992] CPU: 1 PID: 3843 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 406.890822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 406.900173] Call Trace: [ 406.902764] dump_stack+0x1b2/0x283 [ 406.906411] should_fail.cold+0x10a/0x154 [ 406.910561] should_failslab+0xd6/0x130 [ 406.914537] __kmalloc+0x2c1/0x400 [ 406.918137] ? ext4_find_extent+0x879/0xbc0 [ 406.922460] ext4_find_extent+0x879/0xbc0 [ 406.926608] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 406.932057] ext4_ext_map_blocks+0x19a/0x6b10 [ 406.936558] ? __lock_acquire+0x5fc/0x3f20 [ 406.940800] ? __lock_acquire+0x5fc/0x3f20 [ 406.945035] ? mark_buffer_dirty+0x95/0x480 [ 406.949354] ? trace_hardirqs_on+0x10/0x10 [ 406.953578] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 406.959009] ? ext4_find_delalloc_cluster+0x180/0x180 [ 406.964179] ? trace_hardirqs_on+0x10/0x10 [ 406.968491] ? ext4_mark_iloc_dirty+0x1617/0x2700 [ 406.973312] ? ext4_es_lookup_extent+0x321/0xac0 [ 406.978047] ? lock_acquire+0x170/0x3f0 [ 406.982003] ? lock_acquire+0x170/0x3f0 [ 406.985957] ? ext4_map_blocks+0x29f/0x1730 [ 406.990259] ext4_map_blocks+0xb19/0x1730 [ 406.994390] ? ext4_issue_zeroout+0x150/0x150 [ 406.998916] ? __ext4_new_inode+0x27c/0x4eb0 [ 407.003323] ext4_getblk+0x98/0x3f0 [ 407.006936] ? ext4_iomap_begin+0x7f0/0x7f0 [ 407.011237] ext4_bread+0x6c/0x1a0 [ 407.014757] ? ext4_getblk+0x3f0/0x3f0 [ 407.018687] ? dquot_initialize_needed+0x240/0x240 [ 407.023686] ext4_append+0x143/0x350 [ 407.027382] ext4_mkdir+0x4c9/0xba0 [ 407.030992] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 407.035648] ? security_inode_mkdir+0xca/0x100 [ 407.040211] vfs_mkdir+0x463/0x6e0 [ 407.043785] SyS_mkdirat+0x1fd/0x270 [ 407.047490] ? SyS_mknod+0x30/0x30 [ 407.051012] ? do_syscall_64+0x4c/0x640 [ 407.054966] ? SyS_mkdirat+0x270/0x270 [ 407.058832] do_syscall_64+0x1d5/0x640 [ 407.062701] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 407.067869] RIP: 0033:0x45d2d7 [ 407.071042] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 407.078749] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000045d2d7 [ 407.086019] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 407.093269] RBP: 00007fde1c26cae0 R08: 0000000020000260 R09: 0000000000000000 [ 407.100516] R10: 0000000000010b20 R11: 0000000000000213 R12: 0000000020000000 [ 407.107762] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 407.127283] BTRFS info (device loop5): turning off barriers [ 407.133024] BTRFS info (device loop5): unrecognized mount option 'fragment=all' [ 407.193546] BTRFS error (device loop5): open_ctree failed 06:06:36 executing program 5 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:36 executing program 2: 06:06:36 executing program 0: 06:06:36 executing program 1: 06:06:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x4, 0x441040) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xac, r4, 0x8, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x4}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xfff}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x101}, @IPVS_CMD_ATTR_SERVICE={0x64, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x15, 0x14}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x1c}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x1}}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x4000008}, 0x4804) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) ioctl$SIOCX25SCUDMATCHLEN(0xffffffffffffffff, 0x89e7, &(0x7f00000000c0)={0x4a}) 06:06:36 executing program 3: 06:06:36 executing program 2: 06:06:36 executing program 0: 06:06:36 executing program 3: 06:06:36 executing program 1: 06:06:36 executing program 3: 06:06:36 executing program 2: [ 407.359141] FAULT_INJECTION: forcing a failure. [ 407.359141] name failslab, interval 1, probability 0, space 0, times 0 [ 407.408078] CPU: 0 PID: 3891 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 407.415899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.425253] Call Trace: [ 407.427849] dump_stack+0x1b2/0x283 [ 407.431838] should_fail.cold+0x10a/0x154 [ 407.435998] should_failslab+0xd6/0x130 [ 407.439968] __kmalloc+0x2c1/0x400 [ 407.443509] ? ext4_find_extent+0x879/0xbc0 [ 407.447826] ext4_find_extent+0x879/0xbc0 [ 407.451976] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 407.457429] ext4_ext_map_blocks+0x19a/0x6b10 [ 407.461923] ? __lock_acquire+0x5fc/0x3f20 [ 407.466157] ? __lock_acquire+0x5fc/0x3f20 [ 407.470747] ? mark_buffer_dirty+0x95/0x480 [ 407.475067] ? trace_hardirqs_on+0x10/0x10 [ 407.479297] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 407.484662] ? ext4_find_delalloc_cluster+0x180/0x180 [ 407.489846] ? trace_hardirqs_on+0x10/0x10 [ 407.494068] ? ext4_mark_iloc_dirty+0x1617/0x2700 [ 407.498944] ? ext4_es_lookup_extent+0x321/0xac0 [ 407.503690] ? lock_acquire+0x170/0x3f0 [ 407.507650] ? lock_acquire+0x170/0x3f0 [ 407.511605] ? ext4_map_blocks+0x29f/0x1730 [ 407.515909] ext4_map_blocks+0xb19/0x1730 [ 407.520036] ? ext4_issue_zeroout+0x150/0x150 [ 407.524517] ? __ext4_new_inode+0x27c/0x4eb0 [ 407.528916] ext4_getblk+0x98/0x3f0 [ 407.532521] ? ext4_iomap_begin+0x7f0/0x7f0 [ 407.536821] ext4_bread+0x6c/0x1a0 [ 407.540339] ? ext4_getblk+0x3f0/0x3f0 [ 407.544208] ? dquot_initialize_needed+0x240/0x240 [ 407.549134] ext4_append+0x143/0x350 [ 407.552823] ext4_mkdir+0x4c9/0xba0 [ 407.556430] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 407.561077] ? security_inode_mkdir+0xca/0x100 [ 407.565637] vfs_mkdir+0x463/0x6e0 [ 407.569151] SyS_mkdirat+0x1fd/0x270 [ 407.572840] ? SyS_mknod+0x30/0x30 [ 407.576370] ? do_syscall_64+0x4c/0x640 [ 407.580324] ? SyS_mkdirat+0x270/0x270 [ 407.584197] do_syscall_64+0x1d5/0x640 [ 407.588072] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 407.593239] RIP: 0033:0x45d2d7 [ 407.596436] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 407.604125] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000045d2d7 [ 407.611386] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 407.618639] RBP: 00007fde1c26cae0 R08: 0000000020000260 R09: 0000000000000000 [ 407.625891] R10: 0000000000010b20 R11: 0000000000000213 R12: 0000000020000000 [ 407.633135] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 407.673173] BTRFS info (device loop5): turning off barriers [ 407.684809] BTRFS info (device loop5): unrecognized mount option 'fragment=all' 06:06:37 executing program 5 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:37 executing program 0: 06:06:37 executing program 2: 06:06:37 executing program 3: 06:06:37 executing program 4: ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000000c0)=""/4096) r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:37 executing program 1: [ 407.723372] BTRFS error (device loop5): open_ctree failed 06:06:37 executing program 0: 06:06:37 executing program 3: 06:06:37 executing program 2: 06:06:37 executing program 1: [ 407.847371] FAULT_INJECTION: forcing a failure. [ 407.847371] name failslab, interval 1, probability 0, space 0, times 0 [ 407.858735] CPU: 1 PID: 3939 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 407.866538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.875887] Call Trace: [ 407.878476] dump_stack+0x1b2/0x283 [ 407.882112] should_fail.cold+0x10a/0x154 [ 407.886264] should_failslab+0xd6/0x130 [ 407.890324] kmem_cache_alloc+0x28e/0x3c0 06:06:37 executing program 1: [ 407.894474] ext4_mb_new_blocks+0x514/0x3db0 [ 407.898902] ? ext4_find_extent+0x6f7/0xbc0 [ 407.903219] ? ext4_ext_search_right+0x2bc/0xaa0 [ 407.907974] ? ext4_inode_to_goal_block+0x29a/0x3b0 [ 407.912991] ext4_ext_map_blocks+0x2845/0x6b10 [ 407.917578] ? __lock_acquire+0x5fc/0x3f20 [ 407.921842] ? mark_buffer_dirty+0x95/0x480 [ 407.926161] ? trace_hardirqs_on+0x10/0x10 [ 407.930393] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 407.935761] ? ext4_find_delalloc_cluster+0x180/0x180 [ 407.940956] ? trace_hardirqs_on+0x10/0x10 06:06:37 executing program 2: [ 407.945193] ? ext4_mark_iloc_dirty+0x1617/0x2700 [ 407.950135] ? ext4_es_lookup_extent+0x321/0xac0 [ 407.954914] ? lock_acquire+0x170/0x3f0 [ 407.958902] ext4_map_blocks+0x675/0x1730 [ 407.963052] ? ext4_issue_zeroout+0x150/0x150 [ 407.967545] ? __ext4_new_inode+0x27c/0x4eb0 [ 407.971958] ext4_getblk+0x98/0x3f0 [ 407.975583] ? ext4_iomap_begin+0x7f0/0x7f0 [ 407.980342] ext4_bread+0x6c/0x1a0 [ 407.983882] ? ext4_getblk+0x3f0/0x3f0 [ 407.987776] ? dquot_initialize_needed+0x240/0x240 [ 407.992729] ext4_append+0x143/0x350 [ 407.996456] ext4_mkdir+0x4c9/0xba0 [ 408.000093] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 408.004854] ? security_inode_mkdir+0xca/0x100 [ 408.009436] vfs_mkdir+0x463/0x6e0 [ 408.012974] SyS_mkdirat+0x1fd/0x270 [ 408.016686] ? SyS_mknod+0x30/0x30 [ 408.020232] ? do_syscall_64+0x4c/0x640 [ 408.024204] ? SyS_mkdirat+0x270/0x270 [ 408.028089] do_syscall_64+0x1d5/0x640 [ 408.031984] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 408.037166] RIP: 0033:0x45d2d7 [ 408.040349] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 408.048053] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000045d2d7 [ 408.055316] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 408.062578] RBP: 00007fde1c26cae0 R08: 0000000020000260 R09: 0000000000000000 [ 408.069844] R10: 0000000000010b20 R11: 0000000000000213 R12: 0000000020000000 [ 408.077109] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:37 executing program 5 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:37 executing program 1: 06:06:37 executing program 2: 06:06:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:37 executing program 0: 06:06:37 executing program 3: 06:06:37 executing program 0: 06:06:37 executing program 1: 06:06:37 executing program 3: 06:06:37 executing program 2: 06:06:37 executing program 0: 06:06:37 executing program 1: [ 408.255901] FAULT_INJECTION: forcing a failure. [ 408.255901] name failslab, interval 1, probability 0, space 0, times 0 [ 408.332807] CPU: 0 PID: 3977 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 408.340757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 408.350282] Call Trace: [ 408.352874] dump_stack+0x1b2/0x283 [ 408.356507] should_fail.cold+0x10a/0x154 [ 408.360661] should_failslab+0xd6/0x130 [ 408.364658] __kmalloc+0x2c1/0x400 [ 408.368201] ? ext4_find_extent+0x879/0xbc0 [ 408.372521] ext4_find_extent+0x879/0xbc0 [ 408.376669] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 408.382187] ext4_ext_map_blocks+0x19a/0x6b10 [ 408.386687] ? __lock_acquire+0x5fc/0x3f20 [ 408.390923] ? mark_buffer_dirty+0x95/0x480 [ 408.395261] ? trace_hardirqs_on+0x10/0x10 [ 408.399490] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 408.404994] ? ext4_find_delalloc_cluster+0x180/0x180 [ 408.410182] ? trace_hardirqs_on+0x10/0x10 [ 408.414406] ? ext4_mark_iloc_dirty+0x1617/0x2700 [ 408.419317] ? ext4_es_lookup_extent+0x321/0xac0 [ 408.424085] ? lock_acquire+0x170/0x3f0 [ 408.428070] ? lock_acquire+0x170/0x3f0 [ 408.432025] ? ext4_map_blocks+0x623/0x1730 [ 408.436330] ext4_map_blocks+0x675/0x1730 [ 408.440467] ? ext4_issue_zeroout+0x150/0x150 [ 408.444943] ? __ext4_new_inode+0x27c/0x4eb0 [ 408.449511] ext4_getblk+0x98/0x3f0 [ 408.453121] ? ext4_iomap_begin+0x7f0/0x7f0 [ 408.457441] ext4_bread+0x6c/0x1a0 [ 408.460968] ? ext4_getblk+0x3f0/0x3f0 [ 408.464839] ? dquot_initialize_needed+0x240/0x240 [ 408.469765] ext4_append+0x143/0x350 [ 408.473459] ext4_mkdir+0x4c9/0xba0 [ 408.477066] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 408.481723] ? security_inode_mkdir+0xca/0x100 [ 408.486286] vfs_mkdir+0x463/0x6e0 [ 408.489805] SyS_mkdirat+0x1fd/0x270 [ 408.493496] ? SyS_mknod+0x30/0x30 [ 408.497016] ? do_syscall_64+0x4c/0x640 [ 408.500978] ? SyS_mkdirat+0x270/0x270 [ 408.504844] do_syscall_64+0x1d5/0x640 [ 408.508714] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 408.513881] RIP: 0033:0x45d2d7 [ 408.517046] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 408.524734] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000045d2d7 06:06:37 executing program 5 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:37 executing program 3: 06:06:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f00000000c0), 0x1, 0x0) 06:06:37 executing program 1: 06:06:37 executing program 2: 06:06:37 executing program 0: [ 408.531979] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 408.539227] RBP: 00007fde1c26cae0 R08: 0000000020000260 R09: 0000000000000000 [ 408.546490] R10: 0000000000010b20 R11: 0000000000000213 R12: 0000000020000000 [ 408.553848] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:37 executing program 1: 06:06:37 executing program 2: [ 408.664055] FAULT_INJECTION: forcing a failure. [ 408.664055] name failslab, interval 1, probability 0, space 0, times 0 [ 408.677916] CPU: 1 PID: 4004 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 408.685724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 408.695074] Call Trace: [ 408.697659] dump_stack+0x1b2/0x283 [ 408.701290] should_fail.cold+0x10a/0x154 [ 408.705436] should_failslab+0xd6/0x130 [ 408.709414] kmem_cache_alloc+0x28e/0x3c0 06:06:37 executing program 0: 06:06:37 executing program 3: 06:06:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x2100, 0x0) fsetxattr(r2, &(0x7f0000000300)=@random={'btrfs.', '-#\\[!+%\x00'}, &(0x7f0000000340)='*\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000000000000000000ff01", @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r4, 0xc020f509, &(0x7f0000000140)={r5, 0x2, 0x8, 0x10000}) getsockname$unix(r2, &(0x7f0000000240), &(0x7f00000002c0)=0x6e) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) [ 408.713560] ext4_mb_new_blocks+0x514/0x3db0 [ 408.717982] ? ext4_find_extent+0x6f7/0xbc0 [ 408.722301] ? ext4_ext_search_right+0x2bc/0xaa0 [ 408.727055] ? ext4_inode_to_goal_block+0x29a/0x3b0 [ 408.732073] ext4_ext_map_blocks+0x2845/0x6b10 [ 408.736657] ? __lock_acquire+0x5fc/0x3f20 [ 408.740896] ? mark_buffer_dirty+0x95/0x480 [ 408.745213] ? trace_hardirqs_on+0x10/0x10 [ 408.749445] ? __ext4_handle_dirty_metadata+0x120/0x480 [ 408.754813] ? ext4_find_delalloc_cluster+0x180/0x180 [ 408.760000] ? trace_hardirqs_on+0x10/0x10 06:06:38 executing program 0: [ 408.764233] ? ext4_mark_iloc_dirty+0x1617/0x2700 [ 408.769080] ? ext4_es_lookup_extent+0x321/0xac0 [ 408.773836] ? lock_acquire+0x170/0x3f0 [ 408.777820] ext4_map_blocks+0x675/0x1730 [ 408.781977] ? ext4_issue_zeroout+0x150/0x150 [ 408.786469] ? __ext4_new_inode+0x27c/0x4eb0 [ 408.790883] ext4_getblk+0x98/0x3f0 [ 408.794510] ? ext4_iomap_begin+0x7f0/0x7f0 [ 408.798836] ext4_bread+0x6c/0x1a0 [ 408.802373] ? ext4_getblk+0x3f0/0x3f0 [ 408.806259] ? dquot_initialize_needed+0x240/0x240 [ 408.807946] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 408.811186] ext4_append+0x143/0x350 [ 408.823498] ext4_mkdir+0x4c9/0xba0 [ 408.827133] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 408.831804] ? security_inode_mkdir+0xca/0x100 [ 408.836391] vfs_mkdir+0x463/0x6e0 [ 408.839931] SyS_mkdirat+0x1fd/0x270 [ 408.843647] ? SyS_mknod+0x30/0x30 [ 408.847188] ? do_syscall_64+0x4c/0x640 [ 408.851170] ? SyS_mkdirat+0x270/0x270 [ 408.855061] do_syscall_64+0x1d5/0x640 [ 408.858953] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 408.864133] RIP: 0033:0x45d2d7 [ 408.867317] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 408.875019] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000045d2d7 [ 408.877552] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 408.882280] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 408.882286] RBP: 00007fde1c26cae0 R08: 0000000020000260 R09: 0000000000000000 [ 408.882291] R10: 0000000000010b20 R11: 0000000000000213 R12: 0000000020000000 [ 408.882297] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:38 executing program 5 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:38 executing program 0: 06:06:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) fcntl$dupfd(r0, 0x406, r2) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:38 executing program 2: 06:06:38 executing program 3: 06:06:38 executing program 1: 06:06:38 executing program 0: [ 409.097340] FAULT_INJECTION: forcing a failure. [ 409.097340] name failslab, interval 1, probability 0, space 0, times 0 [ 409.109048] CPU: 0 PID: 4041 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 409.116843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.126192] Call Trace: [ 409.128781] dump_stack+0x1b2/0x283 [ 409.132412] should_fail.cold+0x10a/0x154 [ 409.136561] should_failslab+0xd6/0x130 [ 409.140535] kmem_cache_alloc+0x40/0x3c0 [ 409.144607] __es_insert_extent+0x338/0x1360 [ 409.149022] ext4_es_insert_extent+0x1b9/0x530 [ 409.153614] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 409.159416] ext4_map_blocks+0x887/0x1730 [ 409.163565] ? ext4_issue_zeroout+0x150/0x150 [ 409.168057] ? __ext4_new_inode+0x27c/0x4eb0 [ 409.172468] ext4_getblk+0x98/0x3f0 [ 409.176101] ? ext4_iomap_begin+0x7f0/0x7f0 [ 409.180432] ext4_bread+0x6c/0x1a0 [ 409.183973] ? ext4_getblk+0x3f0/0x3f0 [ 409.187861] ? dquot_initialize_needed+0x240/0x240 [ 409.192796] ext4_append+0x143/0x350 [ 409.196510] ext4_mkdir+0x4c9/0xba0 [ 409.200145] ? ext4_init_dot_dotdot+0x5a0/0x5a0 [ 409.204816] ? security_inode_mkdir+0xca/0x100 [ 409.209830] vfs_mkdir+0x463/0x6e0 [ 409.213369] SyS_mkdirat+0x1fd/0x270 [ 409.217075] ? SyS_mknod+0x30/0x30 [ 409.220610] ? do_syscall_64+0x4c/0x640 [ 409.224594] ? SyS_mkdirat+0x270/0x270 [ 409.228478] do_syscall_64+0x1d5/0x640 [ 409.232362] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 409.237548] RIP: 0033:0x45d2d7 06:06:38 executing program 1: 06:06:38 executing program 2: 06:06:38 executing program 0: 06:06:38 executing program 2: 06:06:38 executing program 1: [ 409.240731] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 409.248433] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000045d2d7 [ 409.255698] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 409.262961] RBP: 00007fde1c26cae0 R08: 0000000020000260 R09: 0000000000000000 [ 409.270224] R10: 0000000000010b20 R11: 0000000000000213 R12: 0000000020000000 [ 409.277491] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 409.323567] BTRFS info (device loop5): turning off barriers [ 409.329398] BTRFS info (device loop5): unrecognized mount option 'fragment=all' [ 409.383482] BTRFS error (device loop5): open_ctree failed 06:06:38 executing program 5 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:38 executing program 3: 06:06:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f00000000c0)) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:38 executing program 0: 06:06:38 executing program 2: 06:06:38 executing program 1: 06:06:38 executing program 3: 06:06:38 executing program 1: 06:06:38 executing program 2: 06:06:38 executing program 0: 06:06:38 executing program 3: 06:06:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000000000000000000ff01", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x3) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000054c0)=@delchain={0x24, 0x2e, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xfff2, 0xffff}}}, 0x24}}, 0x0) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x4c, 0x0, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd, 0x87, 'l2_drops\x00'}, {0x5, 0x83, 0x1}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x400080c}, 0x20004000) ioctl$FITHAW(r4, 0xc0045878) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) getsockopt$CAN_RAW_FD_FRAMES(r2, 0x65, 0x5, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 409.568918] FAULT_INJECTION: forcing a failure. [ 409.568918] name failslab, interval 1, probability 0, space 0, times 0 [ 409.636985] CPU: 1 PID: 4086 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 409.644809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.651244] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 409.654151] Call Trace: [ 409.654169] dump_stack+0x1b2/0x283 [ 409.654184] should_fail.cold+0x10a/0x154 [ 409.654197] should_failslab+0xd6/0x130 [ 409.654211] __kmalloc_track_caller+0x2bc/0x400 [ 409.681743] ? strndup_user+0x5b/0xf0 [ 409.685547] memdup_user+0x22/0xa0 [ 409.689088] strndup_user+0x5b/0xf0 [ 409.692712] ? copy_mnt_ns+0xa30/0xa30 [ 409.697118] SyS_mount+0x39/0x120 [ 409.700569] ? copy_mnt_ns+0xa30/0xa30 [ 409.704460] do_syscall_64+0x1d5/0x640 [ 409.708351] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 409.713533] RIP: 0033:0x46090a [ 409.716714] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 409.721858] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 409.724594] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 409.724600] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 409.724605] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 409.724610] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 409.724615] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:39 executing program 5 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:39 executing program 0: 06:06:39 executing program 1: 06:06:39 executing program 2: 06:06:39 executing program 3: 06:06:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x4}, &(0x7f0000000140)=0x8) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @private=0xa0100fe}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) ioctl$IOCTL_VMCI_CTX_ADD_NOTIFICATION(r2, 0x7af, &(0x7f00000000c0)={@my=0x0, 0x100}) 06:06:39 executing program 3: 06:06:39 executing program 0: 06:06:39 executing program 2: 06:06:39 executing program 1: 06:06:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0xb16, 0x80a280) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r5 = dup(r4) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_user='access=user'}], [], 0x6b}}) ioctl$SNDRV_PCM_IOCTL_CHANNEL_INFO(r5, 0x80184132, &(0x7f0000000100)) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) [ 409.908897] FAULT_INJECTION: forcing a failure. [ 409.908897] name failslab, interval 1, probability 0, space 0, times 0 [ 409.982582] CPU: 0 PID: 4136 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 409.990407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.999889] Call Trace: [ 410.002482] dump_stack+0x1b2/0x283 [ 410.006119] should_fail.cold+0x10a/0x154 [ 410.010268] should_failslab+0xd6/0x130 [ 410.014243] __kmalloc_track_caller+0x2bc/0x400 [ 410.018911] ? strndup_user+0x5b/0xf0 [ 410.022709] memdup_user+0x22/0xa0 [ 410.026246] strndup_user+0x5b/0xf0 06:06:39 executing program 0: [ 410.029869] ? copy_mnt_ns+0xa30/0xa30 [ 410.033752] SyS_mount+0x68/0x120 [ 410.037203] ? copy_mnt_ns+0xa30/0xa30 [ 410.041091] do_syscall_64+0x1d5/0x640 [ 410.044983] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 410.050162] RIP: 0033:0x46090a [ 410.053341] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 410.061047] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 410.068575] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 410.076188] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 410.083451] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 410.090729] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:39 executing program 5 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:39 executing program 2: 06:06:39 executing program 0: 06:06:39 executing program 1: 06:06:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@access_user='access=user'}], [], 0x6b}}) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, &(0x7f00000001c0)={{&(0x7f0000000140)}, &(0x7f0000000180), 0x5}, 0x20) ioctl$RTC_VL_READ(r3, 0x80047013, &(0x7f0000000040)) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x39}}, 0xfffffd05) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$VIDIOC_S_CTRL(r3, 0xc008561c, &(0x7f0000000280)={0xfffffff9, 0x6}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair(0xa, 0x3, 0x4, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = openat(r5, &(0x7f0000001700)='./file0\x00', 0x44002, 0x50) connect$inet(r7, &(0x7f0000000080)={0x2, 0x4e24, @local}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r6, 0x84, 0x8, &(0x7f0000000140)=0xffffffc9, 0x4) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:39 executing program 3: 06:06:39 executing program 0: 06:06:39 executing program 2: 06:06:39 executing program 3: 06:06:39 executing program 1: [ 410.255179] FAULT_INJECTION: forcing a failure. [ 410.255179] name failslab, interval 1, probability 0, space 0, times 0 [ 410.279976] CPU: 0 PID: 4171 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 410.287787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.297137] Call Trace: [ 410.299990] dump_stack+0x1b2/0x283 [ 410.303626] should_fail.cold+0x10a/0x154 [ 410.307779] should_failslab+0xd6/0x130 [ 410.311779] __kmalloc_track_caller+0x2bc/0x400 06:06:39 executing program 0: 06:06:39 executing program 2: [ 410.316445] ? strndup_user+0x5b/0xf0 [ 410.320244] memdup_user+0x22/0xa0 [ 410.323784] strndup_user+0x5b/0xf0 [ 410.327410] ? copy_mnt_ns+0xa30/0xa30 [ 410.331297] SyS_mount+0x68/0x120 [ 410.334745] ? copy_mnt_ns+0xa30/0xa30 [ 410.338630] do_syscall_64+0x1d5/0x640 [ 410.342526] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 410.347709] RIP: 0033:0x46090a [ 410.350890] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 410.358593] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 410.365856] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 410.373119] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 410.380384] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 410.387650] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:39 executing program 5 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x20000, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r5 = dup(r4) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_user='access=user'}], [], 0x6b}}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r5, 0xc0385720, &(0x7f0000000100)={0x1}) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:39 executing program 1: 06:06:39 executing program 3: 06:06:39 executing program 0: 06:06:39 executing program 2: 06:06:39 executing program 3: 06:06:39 executing program 0: 06:06:39 executing program 1: 06:06:39 executing program 2: [ 410.573932] FAULT_INJECTION: forcing a failure. [ 410.573932] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 410.585788] CPU: 1 PID: 4200 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 410.593577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.602929] Call Trace: [ 410.605519] dump_stack+0x1b2/0x283 [ 410.609146] should_fail.cold+0x10a/0x154 [ 410.613293] __alloc_pages_nodemask+0x22c/0x2720 [ 410.618069] ? __lock_acquire+0x5fc/0x3f20 06:06:39 executing program 3: 06:06:39 executing program 1: [ 410.622306] ? trace_hardirqs_on+0x10/0x10 [ 410.626535] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 410.631368] ? trace_hardirqs_on+0x10/0x10 [ 410.635600] ? trace_hardirqs_on+0x10/0x10 [ 410.639836] ? trace_hardirqs_on+0x10/0x10 [ 410.644069] ? reacquire_held_locks+0xb5/0x3f0 [ 410.648648] ? dput.part.0+0x3b4/0x710 [ 410.652592] ? list_lru_add+0x22a/0x490 [ 410.656564] ? mntput_no_expire+0xc7/0x910 [ 410.660801] cache_grow_begin+0x8f/0x420 [ 410.664864] cache_alloc_refill+0x273/0x350 [ 410.669188] kmem_cache_alloc_trace+0x340/0x3d0 [ 410.673851] ? copy_mnt_ns+0xa30/0xa30 [ 410.677735] copy_mount_options+0x59/0x2f0 [ 410.681966] ? copy_mnt_ns+0xa30/0xa30 [ 410.685851] SyS_mount+0x84/0x120 [ 410.689299] ? copy_mnt_ns+0xa30/0xa30 [ 410.693190] do_syscall_64+0x1d5/0x640 [ 410.697086] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 410.702268] RIP: 0033:0x46090a [ 410.705450] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 410.713161] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 410.720426] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 410.728070] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 410.735337] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 410.742603] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 410.775618] BTRFS info (device loop5): turning off barriers [ 410.787589] BTRFS info (device loop5): unrecognized mount option 'fragment=all' 06:06:40 executing program 5 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/vcs\x00', 0x400, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) getsockname$packet(r5, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000000000000000000ff01", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) r7 = dup(r2) sendmsg$nl_route(r7, &(0x7f0000000440)={&(0x7f0000000240), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=@getnexthop={0x30, 0x6a, 0x10, 0x70bd2d, 0x25dfdbfd, {}, [@NHA_OIF={0x8}, @NHA_ID={0x8}, @NHA_OIF={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000044}, 0x4881) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:40 executing program 1: 06:06:40 executing program 3: 06:06:40 executing program 0: 06:06:40 executing program 2: [ 410.824310] BTRFS error (device loop5): open_ctree failed 06:06:40 executing program 1: 06:06:40 executing program 2: 06:06:40 executing program 0: 06:06:40 executing program 1: [ 410.956647] FAULT_INJECTION: forcing a failure. [ 410.956647] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 410.968472] CPU: 1 PID: 4233 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 410.976262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 410.985609] Call Trace: [ 410.988213] dump_stack+0x1b2/0x283 06:06:40 executing program 3: 06:06:40 executing program 2: [ 410.988229] should_fail.cold+0x10a/0x154 [ 410.988244] __alloc_pages_nodemask+0x22c/0x2720 06:06:40 executing program 5 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) [ 410.988260] ? __lock_acquire+0x5fc/0x3f20 [ 410.988376] ? is_bpf_text_address+0xb8/0x150 [ 410.988388] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 410.988398] ? __kernel_text_address+0x9/0x30 [ 410.988408] ? trace_hardirqs_on+0x10/0x10 [ 410.988457] ? __save_stack_trace+0xa0/0x160 [ 410.988498] ? depot_save_stack+0x10d/0x3e3 [ 410.988513] ? kasan_kmalloc+0x139/0x160 [ 410.988524] ? kasan_kmalloc+0xeb/0x160 [ 410.988538] cache_grow_begin+0x8f/0x420 [ 410.988552] cache_alloc_refill+0x273/0x350 [ 410.988569] kmem_cache_alloc+0x333/0x3c0 [ 410.988580] getname_flags+0xc8/0x550 [ 410.988592] user_path_at_empty+0x2a/0x50 [ 410.988604] do_mount+0x118/0x2a00 [ 410.988622] ? copy_mount_string+0x40/0x40 [ 410.988632] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 410.988642] ? kmem_cache_alloc_trace+0x36c/0x3d0 [ 410.988651] ? copy_mnt_ns+0xa30/0xa30 [ 410.988663] ? copy_mount_options+0x1fa/0x2f0 [ 410.988672] ? copy_mnt_ns+0xa30/0xa30 [ 410.988683] SyS_mount+0xa8/0x120 [ 410.988691] ? copy_mnt_ns+0xa30/0xa30 [ 410.988702] do_syscall_64+0x1d5/0x640 [ 410.988717] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 410.988725] RIP: 0033:0x46090a [ 410.988731] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 410.988742] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 410.988749] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 410.988755] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 410.988760] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 410.988765] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 411.024207] BTRFS info (device loop5): turning off barriers [ 411.024226] BTRFS info (device loop5): unrecognized mount option 'fragment=all' [ 411.040287] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 411.078083] BTRFS error (device loop5): open_ctree failed [ 411.199035] FAULT_INJECTION: forcing a failure. [ 411.199035] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 411.361901] CPU: 1 PID: 4262 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 411.369667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.378998] Call Trace: [ 411.381568] dump_stack+0x1b2/0x283 [ 411.385178] should_fail.cold+0x10a/0x154 [ 411.389304] __alloc_pages_nodemask+0x22c/0x2720 [ 411.394146] ? __lock_acquire+0x5fc/0x3f20 [ 411.398360] ? is_bpf_text_address+0xb8/0x150 [ 411.402859] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 411.407679] ? __kernel_text_address+0x9/0x30 [ 411.412154] ? trace_hardirqs_on+0x10/0x10 [ 411.416364] ? __save_stack_trace+0xa0/0x160 [ 411.420756] ? depot_save_stack+0x10d/0x3e3 [ 411.425073] ? kasan_kmalloc+0x139/0x160 [ 411.429117] ? kasan_kmalloc+0xeb/0x160 [ 411.433083] cache_grow_begin+0x8f/0x420 [ 411.437123] cache_alloc_refill+0x273/0x350 [ 411.441440] kmem_cache_alloc+0x333/0x3c0 [ 411.445565] getname_flags+0xc8/0x550 [ 411.449346] ? cache_alloc_refill+0x2fa/0x350 [ 411.453995] user_path_at_empty+0x2a/0x50 [ 411.458121] do_mount+0x118/0x2a00 [ 411.461639] ? do_raw_spin_unlock+0x164/0x220 [ 411.466127] ? copy_mount_string+0x40/0x40 [ 411.470356] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 411.475348] ? kmem_cache_alloc_trace+0x36c/0x3d0 [ 411.480166] ? copy_mnt_ns+0xa30/0xa30 [ 411.484031] ? copy_mount_options+0x1fa/0x2f0 [ 411.488517] ? copy_mnt_ns+0xa30/0xa30 [ 411.492380] SyS_mount+0xa8/0x120 [ 411.495808] ? copy_mnt_ns+0xa30/0xa30 [ 411.499673] do_syscall_64+0x1d5/0x640 [ 411.503555] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 411.508730] RIP: 0033:0x46090a [ 411.511897] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 411.519580] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 411.526827] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 411.534073] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 411.541316] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 411.548562] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 411.559211] BTRFS info (device loop5): turning off barriers [ 411.565073] BTRFS info (device loop5): unrecognized mount option 'fragment=all' 06:06:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) r3 = openat$adsp1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/adsp1\x00', 0x440081, 0x0) r4 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x5, 0x3f, 0x2, 0x8, 0x0, 0x7ffffffe, 0xed996c69c7fa4aaf, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x7, 0x1, @perf_config_ext={0x2, 0x6}, 0x10240, 0xffffffff, 0x0, 0x1, 0xdf2, 0x4, 0x401}, 0x0, 0x2, r2, 0x2) write$binfmt_script(r4, &(0x7f0000000100)=ANY=[@ANYRES32=r3, @ANYRESOCT=r1, @ANYRES16=r1, @ANYRESOCT], 0x14) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x2080, 0x0) ioctl$SG_SET_COMMAND_Q(r5, 0x2271, &(0x7f0000000200)=0x1) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:40 executing program 0: 06:06:40 executing program 1: 06:06:40 executing program 3: 06:06:40 executing program 2: [ 411.575715] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 411.594352] BTRFS error (device loop5): open_ctree failed 06:06:40 executing program 2: 06:06:40 executing program 5 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BTRFS_IOC_DEFRAG(r2, 0x50009402, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x41000, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r3, 0xc2604111, &(0x7f0000000100)={0xae8f, [[0x10001, 0x802, 0x5, 0x7, 0x81, 0x81, 0x0, 0x1e024000], [0x4, 0x9, 0x401, 0x2, 0x0, 0x8a3a, 0x5, 0xffffffff], [0xb351, 0xfffffffd, 0x40, 0x0, 0x40, 0x8001, 0x5, 0x1ff]], [], [{0x2, 0x401, 0x0, 0x0, 0x0, 0x1}, {0x1, 0x0, 0x1, 0x1}, {0x80000000, 0x1, 0x1, 0x0, 0x1}, {0x1, 0x8, 0x1, 0x0, 0x0, 0x1}, {0x8c3b, 0x9, 0x1}, {0x7, 0x4, 0x0, 0x0, 0x1}, {0x8, 0x101, 0x1, 0x1, 0x0, 0x1}, {0x1, 0x1, 0x1, 0x1}, {0x8f98, 0x8, 0x1, 0x1, 0x0, 0x1}, {0x0, 0x5, 0x0, 0x1}, {0x7fff, 0xfffffe00, 0x0, 0x1, 0x1}, {0x6, 0x99a, 0x0, 0x1, 0x1}], [], 0x6}) 06:06:40 executing program 1: 06:06:40 executing program 3: 06:06:40 executing program 0: 06:06:41 executing program 2: 06:06:41 executing program 1: 06:06:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x400000, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000140)={&(0x7f0000000100)=[0x10000, 0x756, 0x80, 0x10000], 0x4, 0x80800}) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:41 executing program 3: [ 411.776927] FAULT_INJECTION: forcing a failure. [ 411.776927] name failslab, interval 1, probability 0, space 0, times 0 06:06:41 executing program 0: [ 411.855814] CPU: 1 PID: 4295 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 411.863642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.872991] Call Trace: [ 411.875582] dump_stack+0x1b2/0x283 [ 411.879212] should_fail.cold+0x10a/0x154 [ 411.883362] should_failslab+0xd6/0x130 [ 411.887334] __kmalloc_track_caller+0x2bc/0x400 [ 411.892008] ? kstrdup_const+0x35/0x60 [ 411.895891] ? lock_downgrade+0x740/0x740 [ 411.900038] kstrdup+0x36/0x70 [ 411.903235] kstrdup_const+0x35/0x60 [ 411.906944] alloc_vfsmnt+0xe0/0x7f0 [ 411.910652] ? _raw_read_unlock+0x29/0x40 [ 411.914800] vfs_kern_mount.part.0+0x27/0x470 [ 411.919297] do_mount+0xe53/0x2a00 [ 411.922840] ? copy_mount_string+0x40/0x40 [ 411.927193] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 411.932210] ? copy_mnt_ns+0xa30/0xa30 [ 411.936099] ? copy_mount_options+0x1fa/0x2f0 [ 411.940589] ? copy_mnt_ns+0xa30/0xa30 [ 411.944478] SyS_mount+0xa8/0x120 [ 411.947948] ? copy_mnt_ns+0xa30/0xa30 [ 411.951845] do_syscall_64+0x1d5/0x640 06:06:41 executing program 3: 06:06:41 executing program 3: [ 411.955745] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 411.961481] RIP: 0033:0x46090a [ 411.964663] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 411.972366] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 411.979628] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 411.986891] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 411.994155] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 412.001421] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:41 executing program 5 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:41 executing program 3: 06:06:41 executing program 0: 06:06:41 executing program 2: 06:06:41 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) r3 = accept4$unix(r2, 0x0, &(0x7f00000000c0), 0x40800) recvfrom$unix(r3, &(0x7f0000000100), 0x0, 0x40010002, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e24}, 0x6e) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:41 executing program 1: 06:06:41 executing program 0: 06:06:41 executing program 2: 06:06:41 executing program 3: 06:06:41 executing program 1: [ 412.175927] FAULT_INJECTION: forcing a failure. [ 412.175927] name failslab, interval 1, probability 0, space 0, times 0 06:06:41 executing program 4: exit(0x7ff) r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r2, &(0x7f00000000c0)="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", 0x1000, 0x48040, &(0x7f00000010c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) dup(r1) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:41 executing program 0: [ 412.252786] CPU: 0 PID: 4334 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 412.260695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.270046] Call Trace: [ 412.272635] dump_stack+0x1b2/0x283 [ 412.276264] should_fail.cold+0x10a/0x154 [ 412.280415] should_failslab+0xd6/0x130 [ 412.284396] __kmalloc_track_caller+0x2bc/0x400 [ 412.289138] ? btrfs_parse_early_options.constprop.0+0x9b/0x2f0 [ 412.295200] kstrdup+0x36/0x70 [ 412.298393] btrfs_parse_early_options.constprop.0+0x9b/0x2f0 [ 412.304282] ? kstrdup_const+0x35/0x60 [ 412.308169] ? parse_security_options.constprop.0+0x90/0x90 [ 412.313877] ? lock_acquire+0x170/0x3f0 [ 412.317847] ? pcpu_alloc+0x8e8/0xf50 [ 412.321645] ? trace_hardirqs_on+0x10/0x10 [ 412.325879] ? pcpu_alloc+0x8e8/0xf50 [ 412.329677] ? _find_next_bit+0xdb/0x100 [ 412.333831] btrfs_mount+0xfe/0x1fe0 [ 412.337544] ? lock_downgrade+0x740/0x740 [ 412.341692] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 412.347670] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 412.353120] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 412.358142] ? __lockdep_init_map+0x100/0x560 [ 412.362636] ? __lockdep_init_map+0x100/0x560 [ 412.367130] mount_fs+0x92/0x2a0 [ 412.370501] vfs_kern_mount.part.0+0x5b/0x470 [ 412.374999] do_mount+0xe53/0x2a00 [ 412.378544] ? copy_mount_string+0x40/0x40 [ 412.382819] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 412.387833] ? copy_mnt_ns+0xa30/0xa30 [ 412.391710] ? copy_mount_options+0x1fa/0x2f0 [ 412.396185] ? copy_mnt_ns+0xa30/0xa30 [ 412.400053] SyS_mount+0xa8/0x120 [ 412.404362] ? copy_mnt_ns+0xa30/0xa30 [ 412.408240] do_syscall_64+0x1d5/0x640 [ 412.412130] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 412.417299] RIP: 0033:0x46090a [ 412.420475] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 412.428161] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 412.435411] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 412.442658] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 412.449905] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 412.457264] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:41 executing program 5 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:41 executing program 1: 06:06:41 executing program 3: 06:06:41 executing program 0: 06:06:41 executing program 2: 06:06:41 executing program 3: 06:06:41 executing program 1: 06:06:41 executing program 0: 06:06:41 executing program 2: 06:06:41 executing program 3: [ 412.582060] FAULT_INJECTION: forcing a failure. [ 412.582060] name failslab, interval 1, probability 0, space 0, times 0 [ 412.630993] CPU: 0 PID: 4369 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 412.638813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.648163] Call Trace: [ 412.650755] dump_stack+0x1b2/0x283 [ 412.654393] should_fail.cold+0x10a/0x154 [ 412.658542] should_failslab+0xd6/0x130 [ 412.662522] __kmalloc+0x2c1/0x400 [ 412.666056] ? btrfs_mount+0x2d5/0x1fe0 [ 412.670027] ? _find_next_bit+0xdb/0x100 [ 412.674089] btrfs_mount+0x2d5/0x1fe0 [ 412.677889] ? lock_downgrade+0x740/0x740 [ 412.682036] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 412.688102] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 412.693552] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 412.698566] ? __lockdep_init_map+0x100/0x560 [ 412.703056] ? __lockdep_init_map+0x100/0x560 [ 412.707551] mount_fs+0x92/0x2a0 [ 412.710920] vfs_kern_mount.part.0+0x5b/0x470 [ 412.715419] do_mount+0xe53/0x2a00 [ 412.718966] ? copy_mount_string+0x40/0x40 [ 412.723201] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 412.728233] ? copy_mnt_ns+0xa30/0xa30 [ 412.732124] ? copy_mount_options+0x1fa/0x2f0 [ 412.736619] ? copy_mnt_ns+0xa30/0xa30 [ 412.740507] SyS_mount+0xa8/0x120 [ 412.743957] ? copy_mnt_ns+0xa30/0xa30 [ 412.749067] do_syscall_64+0x1d5/0x640 [ 412.752962] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 412.758143] RIP: 0033:0x46090a [ 412.761324] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 412.769029] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 412.776292] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 412.783549] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 412.790810] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 412.798079] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:42 executing program 3: 06:06:42 executing program 2: 06:06:42 executing program 1: 06:06:42 executing program 0: 06:06:42 executing program 5 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:42 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_user='access=user'}], [], 0x6b}}) ioctl$RTC_PIE_ON(r2, 0x7005) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, 0x0, 0x0, 0x70bd26, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = accept(r3, &(0x7f00000000c0)=@l2tp={0x2, 0x0, @multicast2}, &(0x7f0000000140)=0x80) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r4, 0x8982, &(0x7f0000000180)) r5 = dup(r3) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) r7 = dup(r6) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x84100, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r8, 0xae03, 0x1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="7472614c733d010000020000000000", @ANYRESHEX=r6, @ANYBLOB=',wfdno=', @ANYRESHEX=r7, @ANYBLOB="2c6163636573733d757365722c6be5b5dc07fab47d9c668c343d3ac7d115788bd9f0a2f7640836c04f846272d6491197b6cdbc7738dcf4fa2534db97b6d48eb0e98c8a54b65d4379df3a6758e5b690f8f36ac7671eb026e12bd3394b0e3a33f1dfed87dd1c64dfd9ab31393a9fd36816c924c4329ece04ea230410ab3520f899c5e20d"]) ioctl$SG_IO(r7, 0x2285, &(0x7f00000003c0)={0x0, 0xfffffffffffffffb, 0xc1, 0x4, @scatter={0x1, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)=""/46, 0x2e}]}, &(0x7f0000000240)="40e830cc16609f1c0d27450915a6ee7fb20e84b14e799726901649765af03f563e33a6ef490a4c528d6c18867bfd11d80c8fda57ce1da49f586ddd361a9956a075279e0021b9aee8f0c702d60d03ff8be558fddc9979799aea6f93a3e05063ecffdf9c85c294ee01fbde15e6cef238f667b593696fd11fbf3b4b1c6721b8f8e37c56aee253b454d848adf8364bc8046419c63ad64ffc9cc2eeeee7eaedf334204c03fa897822812672439fe39044b99e3a104e53cb09089f9812d5fdeb05cf9175", &(0x7f0000000340)=""/38, 0x7, 0x0, 0x1, &(0x7f0000000380)}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e22, @multicast1}, 0x10) write$binfmt_script(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:42 executing program 1: 06:06:42 executing program 0: 06:06:42 executing program 3: 06:06:42 executing program 2: 06:06:42 executing program 1: 06:06:42 executing program 3: [ 413.198512] FAULT_INJECTION: forcing a failure. [ 413.198512] name failslab, interval 1, probability 0, space 0, times 0 06:06:42 executing program 2: 06:06:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x100, @broadcast}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:42 executing program 1: 06:06:42 executing program 3: [ 413.306613] CPU: 1 PID: 4401 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 413.314452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.323805] Call Trace: [ 413.326400] dump_stack+0x1b2/0x283 [ 413.330036] should_fail.cold+0x10a/0x154 [ 413.334187] should_failslab+0xd6/0x130 [ 413.338162] __kmalloc+0x2c1/0x400 [ 413.341786] ? btrfs_mount+0x2d5/0x1fe0 [ 413.345759] ? _find_next_bit+0xdb/0x100 [ 413.349817] btrfs_mount+0x2d5/0x1fe0 [ 413.353617] ? lock_downgrade+0x740/0x740 [ 413.357765] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 413.363742] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 413.369192] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 413.374207] ? __lockdep_init_map+0x100/0x560 [ 413.378701] ? __lockdep_init_map+0x100/0x560 [ 413.383199] mount_fs+0x92/0x2a0 [ 413.386649] vfs_kern_mount.part.0+0x5b/0x470 [ 413.391124] do_mount+0xe53/0x2a00 [ 413.394645] ? copy_mount_string+0x40/0x40 [ 413.398861] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 413.403854] ? copy_mnt_ns+0xa30/0xa30 [ 413.407721] ? copy_mount_options+0x1fa/0x2f0 [ 413.412196] ? copy_mnt_ns+0xa30/0xa30 [ 413.416064] SyS_mount+0xa8/0x120 [ 413.419493] ? copy_mnt_ns+0xa30/0xa30 [ 413.423392] do_syscall_64+0x1d5/0x640 [ 413.427263] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 413.432457] RIP: 0033:0x46090a [ 413.435622] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 413.443308] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 413.450556] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 413.457801] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 413.465051] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 413.472319] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:42 executing program 5 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:42 executing program 2: 06:06:42 executing program 0: 06:06:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4010}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) accept$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000100)=0x1c) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:42 executing program 1: 06:06:42 executing program 3: 06:06:42 executing program 0: 06:06:42 executing program 3: 06:06:42 executing program 1: 06:06:42 executing program 2: [ 413.585461] FAULT_INJECTION: forcing a failure. [ 413.585461] name failslab, interval 1, probability 0, space 0, times 0 06:06:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@access_user='access=user'}], [], 0x6b}}) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r3, 0x8008ae9d, &(0x7f00000000c0)) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:42 executing program 0: [ 413.664800] CPU: 0 PID: 4442 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 413.672627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.681978] Call Trace: [ 413.684565] dump_stack+0x1b2/0x283 [ 413.688198] should_fail.cold+0x10a/0x154 [ 413.692352] should_failslab+0xd6/0x130 [ 413.696326] kmem_cache_alloc+0x28e/0x3c0 [ 413.700479] alloc_vfsmnt+0x23/0x7f0 [ 413.704193] vfs_kern_mount.part.0+0x27/0x470 [ 413.708691] vfs_kern_mount+0x3c/0x60 [ 413.712580] btrfs_mount+0x42a/0x1fe0 [ 413.716637] ? lock_downgrade+0x740/0x740 [ 413.720874] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 413.726852] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 413.732311] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 413.737328] ? __lockdep_init_map+0x100/0x560 [ 413.741817] ? __lockdep_init_map+0x100/0x560 [ 413.746309] mount_fs+0x92/0x2a0 [ 413.749679] vfs_kern_mount.part.0+0x5b/0x470 [ 413.754173] do_mount+0xe53/0x2a00 [ 413.757718] ? retint_kernel+0x2d/0x2d [ 413.761603] ? copy_mount_string+0x40/0x40 [ 413.765838] ? copy_mount_options+0x185/0x2f0 [ 413.770330] ? copy_mount_options+0x18b/0x2f0 [ 413.774824] ? copy_mount_options+0x1fa/0x2f0 [ 413.779311] ? copy_mnt_ns+0xa30/0xa30 [ 413.783197] SyS_mount+0xa8/0x120 [ 413.786647] ? copy_mnt_ns+0xa30/0xa30 [ 413.790529] do_syscall_64+0x1d5/0x640 [ 413.794417] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 413.799602] RIP: 0033:0x46090a [ 413.802783] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 06:06:43 executing program 5 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:43 executing program 2: 06:06:43 executing program 3: 06:06:43 executing program 1: 06:06:43 executing program 0: 06:06:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) r3 = openat$cgroup_ro(r2, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0) ioctl$BTRFS_IOC_QGROUP_LIMIT(r3, 0x8030942b, &(0x7f0000000200)={0x7, {0x1c, 0x1, 0x7f, 0xff, 0x1}}) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0xa8, "dba47dd95c45cf25dc637a4c34edcf1fe81e557c42b5d44af0113fae3d3ebb53dffb104edaf380d8514bbed7f1ca14b3a43dc72728098b351d31eb78d18a799d32f80e89f31a3df1e2ccddece742c9c37d6c1b341fe7690afcebe519037d4dcce7ad40c3ed09b3d84780502e972c51cbd94a6607f5ebafa67fb6b8f73e18825eebcc94ed585f92a1517c7f0f2f1d39c4572f5f7731cfb4857353217cbe2a86d896cf5218a9c23161"}, &(0x7f0000000180)=0xb0) [ 413.810488] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 413.817754] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 413.825023] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 413.832303] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 413.839556] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:43 executing program 1: 06:06:43 executing program 0: 06:06:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYRESOCT, @ANYRESOCT=r0, @ANYRESDEC, @ANYBLOB="7530d0ad16a73deca6408dfe5daa534a16d05a1c41", @ANYRESDEC=r0, @ANYRESHEX=r1, @ANYRESDEC=r1], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:43 executing program 1: 06:06:43 executing program 0: 06:06:43 executing program 3: [ 413.946970] FAULT_INJECTION: forcing a failure. [ 413.946970] name failslab, interval 1, probability 0, space 0, times 0 [ 414.014271] CPU: 1 PID: 4476 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 414.022294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 414.031647] Call Trace: [ 414.034238] dump_stack+0x1b2/0x283 [ 414.037875] should_fail.cold+0x10a/0x154 [ 414.042029] should_failslab+0xd6/0x130 [ 414.046010] __kmalloc_track_caller+0x2bc/0x400 [ 414.050681] ? kstrdup_const+0x35/0x60 [ 414.054581] ? lock_downgrade+0x740/0x740 [ 414.058734] kstrdup+0x36/0x70 [ 414.061926] kstrdup_const+0x35/0x60 [ 414.066071] alloc_vfsmnt+0xe0/0x7f0 [ 414.069788] vfs_kern_mount.part.0+0x27/0x470 [ 414.074281] vfs_kern_mount+0x3c/0x60 [ 414.078079] btrfs_mount+0x42a/0x1fe0 [ 414.081876] ? lock_downgrade+0x740/0x740 [ 414.086021] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 414.091998] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 414.097472] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 414.102488] ? __lockdep_init_map+0x100/0x560 [ 414.106983] ? __lockdep_init_map+0x100/0x560 [ 414.111771] mount_fs+0x92/0x2a0 [ 414.115234] vfs_kern_mount.part.0+0x5b/0x470 [ 414.119811] do_mount+0xe53/0x2a00 [ 414.123337] ? copy_mount_string+0x40/0x40 [ 414.127549] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 414.132542] ? copy_mnt_ns+0xa30/0xa30 [ 414.136499] ? copy_mount_options+0x1fa/0x2f0 [ 414.141077] ? copy_mnt_ns+0xa30/0xa30 [ 414.144959] SyS_mount+0xa8/0x120 [ 414.148393] ? copy_mnt_ns+0xa30/0xa30 [ 414.152260] do_syscall_64+0x1d5/0x640 [ 414.156272] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 414.161465] RIP: 0033:0x46090a [ 414.164637] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 414.172340] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 414.179601] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 414.186852] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 414.194111] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 414.201355] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:43 executing program 5 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:43 executing program 2: 06:06:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) sendto(r0, &(0x7f00000003c0)="0d04a70ab42ef5997ba3edf99988308ff67bc4957e1b5ed568ae72bc8b24ea8e302b04e812b8003d26db8d8f54b162ef0e21511e543b56fdb6cf7c739c314fa0717b22041ded53782b084d7f0f65d411451547c6bca111ea6460ab9c7513442e718035cf202dd1b95cc88ee86f57b448703ba9c66703af16c4a3501f07d5f2a5350ad4482b7769e4baaba16e886e05f254980d1357cf7d6395ae59451180d30a08f81250f9753ac866a6337111ee9cd1feec1abf576082269c6b8d66d77b90cb6b55683d89acf3cccfce6040cf103b47accacf1cc3f25b5c923f8678ea29236bf416babd4dfb03e99d", 0xe9, 0xc0, 0x0, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) getsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0xc) r3 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x4, 0x4700) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000001c0)={'syztnl0\x00', &(0x7f00000002c0)={'syztnl0\x00', 0x0, 0x10, 0x10, 0x6e6, 0x4000001, {{0x29, 0x4, 0x3, 0x1, 0xa4, 0x66, 0x0, 0x4, 0x2f, 0x0, @multicast1, @remote, {[@timestamp={0x44, 0x14, 0x41, 0x0, 0x6, [0x7, 0x800, 0xfff, 0x603d]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0xb, 0x70, [@dev={0xac, 0x14, 0x14, 0x31}, @private=0xa010102]}, @generic={0x94, 0xd, "8237b7cad4be7521a87683"}, @noop, @ssrr={0x89, 0x1b, 0x9b, [@broadcast, @empty, @local, @loopback, @rand_addr=0x64010101, @broadcast]}, @timestamp_prespec={0x44, 0x1c, 0xcf, 0x3, 0x5, [{@empty}, {@multicast1, 0x8000}, {@dev={0xac, 0x14, 0x14, 0x42}, 0x8}]}, @ra={0x94, 0x4}, @cipso={0x86, 0x22, 0x0, [{0x2, 0x12, "e0fd2bc76adfde59a8b5ff7443fe97a9"}, {0x5, 0x3, "eb"}, {0x6, 0x7, "460b66b455"}]}]}}}}}) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:43 executing program 0: 06:06:43 executing program 3: 06:06:43 executing program 1: 06:06:43 executing program 1: 06:06:43 executing program 0: 06:06:43 executing program 2: 06:06:43 executing program 3: 06:06:43 executing program 1: 06:06:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bind$inet(r1, &(0x7f0000000040)={0x2, 0x80, @remote}, 0x10) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) [ 414.336980] FAULT_INJECTION: forcing a failure. [ 414.336980] name failslab, interval 1, probability 0, space 0, times 0 [ 414.395701] CPU: 1 PID: 4510 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 414.403521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 414.412869] Call Trace: [ 414.415457] dump_stack+0x1b2/0x283 [ 414.419349] should_fail.cold+0x10a/0x154 [ 414.423504] should_failslab+0xd6/0x130 [ 414.427477] __kmalloc_track_caller+0x2bc/0x400 [ 414.432146] ? btrfs_parse_early_options.constprop.0+0x9b/0x2f0 [ 414.438214] kstrdup+0x36/0x70 [ 414.441416] btrfs_parse_early_options.constprop.0+0x9b/0x2f0 [ 414.447300] ? kstrdup_const+0x35/0x60 [ 414.451189] ? parse_security_options.constprop.0+0x90/0x90 [ 414.456901] ? lock_acquire+0x170/0x3f0 [ 414.460877] ? pcpu_alloc+0x8e8/0xf50 [ 414.464680] ? trace_hardirqs_on+0x10/0x10 [ 414.468912] ? pcpu_alloc+0x8e8/0xf50 [ 414.472711] ? _find_next_bit+0xdb/0x100 [ 414.476772] btrfs_mount+0xfe/0x1fe0 [ 414.480485] ? lock_downgrade+0x740/0x740 [ 414.484626] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 414.490578] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 414.496027] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 414.501022] ? __lockdep_init_map+0x100/0x560 [ 414.505494] ? __lockdep_init_map+0x100/0x560 [ 414.509967] mount_fs+0x92/0x2a0 [ 414.513316] vfs_kern_mount.part.0+0x5b/0x470 [ 414.517788] vfs_kern_mount+0x3c/0x60 [ 414.521567] btrfs_mount+0x42a/0x1fe0 [ 414.525355] ? lock_downgrade+0x740/0x740 [ 414.530461] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 414.536430] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 414.541855] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 414.546848] ? __lockdep_init_map+0x100/0x560 [ 414.551317] ? __lockdep_init_map+0x100/0x560 [ 414.555801] mount_fs+0x92/0x2a0 [ 414.559148] vfs_kern_mount.part.0+0x5b/0x470 [ 414.563619] do_mount+0xe53/0x2a00 [ 414.567160] ? copy_mount_string+0x40/0x40 [ 414.571392] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 414.576398] ? copy_mnt_ns+0xa30/0xa30 [ 414.580284] ? copy_mount_options+0x1fa/0x2f0 [ 414.584769] ? copy_mnt_ns+0xa30/0xa30 [ 414.588646] SyS_mount+0xa8/0x120 [ 414.592074] ? copy_mnt_ns+0xa30/0xa30 [ 414.595937] do_syscall_64+0x1d5/0x640 [ 414.599822] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 414.605014] RIP: 0033:0x46090a [ 414.608180] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 414.615874] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 414.623122] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 414.630366] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 414.637611] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 414.644867] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:43 executing program 5 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:43 executing program 3: 06:06:43 executing program 0: 06:06:43 executing program 1: 06:06:43 executing program 2: 06:06:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x6, @multicast}, 0x10) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f00000001c0)=0x2, 0x4) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:44 executing program 0: 06:06:44 executing program 1: 06:06:44 executing program 2: 06:06:44 executing program 3: [ 414.781019] FAULT_INJECTION: forcing a failure. [ 414.781019] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 414.798250] CPU: 0 PID: 4554 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 414.806064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 414.815415] Call Trace: [ 414.818007] dump_stack+0x1b2/0x283 [ 414.821646] should_fail.cold+0x10a/0x154 [ 414.825798] __alloc_pages_nodemask+0x22c/0x2720 06:06:44 executing program 3: 06:06:44 executing program 2: [ 414.830554] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 414.835655] ? debug_check_no_obj_freed+0x2c0/0x674 [ 414.840675] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 414.846120] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 414.850957] ? kfree+0x14a/0x250 [ 414.854322] ? btrfs_parse_early_options.constprop.0+0x18e/0x2f0 [ 414.860466] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 414.865486] ? btrfs_parse_early_options.constprop.0+0x193/0x2f0 [ 414.871634] ? parse_security_options.constprop.0+0x90/0x90 [ 414.877342] ? lock_acquire+0x170/0x3f0 [ 414.881316] ? pcpu_alloc+0x8e8/0xf50 [ 414.885116] alloc_pages_current+0x155/0x260 [ 414.889524] get_zeroed_page+0x19/0x50 [ 414.893409] parse_security_options.constprop.0+0x1a/0x90 [ 414.898943] btrfs_mount+0x1d5/0x1fe0 [ 414.902744] ? lock_downgrade+0x740/0x740 [ 414.906927] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 414.912903] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 414.918350] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 414.923366] ? __lockdep_init_map+0x100/0x560 [ 414.928469] ? __lockdep_init_map+0x100/0x560 [ 414.932964] mount_fs+0x92/0x2a0 [ 414.936334] vfs_kern_mount.part.0+0x5b/0x470 [ 414.940830] vfs_kern_mount+0x3c/0x60 [ 414.944633] btrfs_mount+0x42a/0x1fe0 [ 414.948436] ? lock_downgrade+0x740/0x740 [ 414.952586] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 414.958555] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 414.963984] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 414.968981] ? __lockdep_init_map+0x100/0x560 [ 414.973460] ? __lockdep_init_map+0x100/0x560 [ 414.978017] mount_fs+0x92/0x2a0 [ 414.981478] vfs_kern_mount.part.0+0x5b/0x470 [ 414.985961] do_mount+0xe53/0x2a00 [ 414.989483] ? retint_kernel+0x2d/0x2d [ 414.993367] ? copy_mount_string+0x40/0x40 [ 414.997587] ? copy_mount_options+0x150/0x2f0 [ 415.002059] ? copy_mount_options+0x17b/0x2f0 [ 415.006550] ? copy_mount_options+0x1fa/0x2f0 [ 415.011023] ? copy_mnt_ns+0xa30/0xa30 [ 415.014891] SyS_mount+0xa8/0x120 [ 415.018335] ? copy_mnt_ns+0xa30/0xa30 [ 415.022215] do_syscall_64+0x1d5/0x640 [ 415.026093] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 415.031259] RIP: 0033:0x46090a [ 415.034437] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 415.042120] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 415.049377] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 415.056625] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 415.063873] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 415.071132] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:44 executing program 5 (fault-call:0 fault-nth:61): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:44 executing program 1: 06:06:44 executing program 0: 06:06:44 executing program 3: 06:06:44 executing program 2: 06:06:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) prctl$PR_GET_UNALIGN(0x5, &(0x7f00000000c0)) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:44 executing program 0: 06:06:44 executing program 2: 06:06:44 executing program 3: 06:06:44 executing program 1: 06:06:44 executing program 2: [ 415.190486] FAULT_INJECTION: forcing a failure. [ 415.190486] name fail_page_alloc, interval 1, probability 0, space 0, times 0 06:06:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x100, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) setsockopt$inet_tcp_int(r1, 0x6, 0xa, &(0x7f0000000100)=0x2, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) r4 = open(&(0x7f0000000140)='./file0\x00', 0x200000, 0x43) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') sendmsg$NL80211_CMD_CHANNEL_SWITCH(r4, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x4c, r5, 0x400, 0x70bd2b, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_CH_SWITCH_COUNT={0x8, 0xb7, 0xd7}, @NL80211_ATTR_CH_SWITCH_COUNT={0x8, 0xb7, 0x2e}, @chandef_params=[@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x5}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0xe6}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x8}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8, 0xb7, 0x3e}, @NL80211_ATTR_CH_SWITCH_COUNT={0x8, 0xb7, 0x11}]}, 0x4c}, 0x1, 0x0, 0x0, 0x880}, 0x8000) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) [ 415.241528] CPU: 0 PID: 4583 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 415.249352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.258699] Call Trace: [ 415.261280] dump_stack+0x1b2/0x283 [ 415.264904] should_fail.cold+0x10a/0x154 [ 415.269054] __alloc_pages_nodemask+0x22c/0x2720 [ 415.273815] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 415.278918] ? debug_check_no_obj_freed+0x2c0/0x674 [ 415.283941] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 415.289387] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 415.294227] ? kfree+0x14a/0x250 [ 415.297591] ? btrfs_parse_early_options.constprop.0+0x18e/0x2f0 [ 415.303733] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 415.308754] ? btrfs_parse_early_options.constprop.0+0x193/0x2f0 [ 415.314904] ? parse_security_options.constprop.0+0x90/0x90 [ 415.320821] ? lock_acquire+0x170/0x3f0 [ 415.324792] ? pcpu_alloc+0x8e8/0xf50 [ 415.328589] alloc_pages_current+0x155/0x260 [ 415.333001] get_zeroed_page+0x19/0x50 [ 415.336886] parse_security_options.constprop.0+0x1a/0x90 [ 415.342420] btrfs_mount+0x1d5/0x1fe0 [ 415.346220] ? lock_downgrade+0x740/0x740 [ 415.350366] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 415.356339] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 415.361788] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 415.366805] ? __lockdep_init_map+0x100/0x560 [ 415.371295] ? __lockdep_init_map+0x100/0x560 [ 415.375787] mount_fs+0x92/0x2a0 [ 415.379156] vfs_kern_mount.part.0+0x5b/0x470 [ 415.383653] vfs_kern_mount+0x3c/0x60 [ 415.387452] btrfs_mount+0x42a/0x1fe0 [ 415.391255] ? lock_downgrade+0x740/0x740 [ 415.395409] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 415.401391] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 415.407193] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 415.412208] ? __lockdep_init_map+0x100/0x560 [ 415.416700] ? __lockdep_init_map+0x100/0x560 [ 415.421184] mount_fs+0x92/0x2a0 [ 415.424611] vfs_kern_mount.part.0+0x5b/0x470 [ 415.429083] do_mount+0xe53/0x2a00 [ 415.432598] ? do_raw_spin_unlock+0x164/0x220 [ 415.437186] ? copy_mount_string+0x40/0x40 [ 415.441405] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 415.446403] ? copy_mnt_ns+0xa30/0xa30 [ 415.450271] ? copy_mount_options+0x1fa/0x2f0 [ 415.454774] ? copy_mnt_ns+0xa30/0xa30 [ 415.458641] SyS_mount+0xa8/0x120 [ 415.462071] ? copy_mnt_ns+0xa30/0xa30 [ 415.465941] do_syscall_64+0x1d5/0x640 [ 415.469823] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 415.474992] RIP: 0033:0x46090a [ 415.478159] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 415.485844] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 415.493092] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 415.500339] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 415.507585] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 415.514830] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:44 executing program 5 (fault-call:0 fault-nth:62): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:44 executing program 3: 06:06:44 executing program 1: 06:06:44 executing program 2: 06:06:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_open_dev$vim2m(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x2) r2 = dup(r1) prctl$PR_SET_ENDIAN(0x14, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e23, @remote}}, 0x1ff, 0x5, 0x6, 0x7, 0x3}, &(0x7f00000001c0)=0x98) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:44 executing program 0: 06:06:44 executing program 3: 06:06:44 executing program 0: 06:06:44 executing program 1: 06:06:44 executing program 2: 06:06:44 executing program 1: 06:06:44 executing program 3: [ 415.664158] FAULT_INJECTION: forcing a failure. [ 415.664158] name failslab, interval 1, probability 0, space 0, times 0 [ 415.701408] CPU: 0 PID: 4626 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 415.709230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 415.718579] Call Trace: [ 415.721168] dump_stack+0x1b2/0x283 [ 415.724795] should_fail.cold+0x10a/0x154 [ 415.728961] should_failslab+0xd6/0x130 [ 415.732942] kmem_cache_alloc+0x28e/0x3c0 [ 415.737095] getname_kernel+0x4e/0x340 [ 415.740982] kern_path+0x1b/0x40 [ 415.744348] lookup_bdev+0xc6/0x1c0 [ 415.747976] ? bd_acquire+0x440/0x440 [ 415.751772] ? btrfs_parse_early_options.constprop.0+0x193/0x2f0 [ 415.757992] blkdev_get_by_path+0x1b/0xa0 [ 415.762221] btrfs_scan_one_device+0x84/0x330 [ 415.766716] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 415.771730] ? device_list_add+0x8f0/0x8f0 [ 415.775977] btrfs_mount+0x1fc/0x1fe0 [ 415.779778] ? lock_downgrade+0x740/0x740 [ 415.783927] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 415.789907] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 415.795358] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 415.800432] ? __lockdep_init_map+0x100/0x560 [ 415.804929] ? __lockdep_init_map+0x100/0x560 [ 415.809425] mount_fs+0x92/0x2a0 [ 415.812804] vfs_kern_mount.part.0+0x5b/0x470 [ 415.817298] vfs_kern_mount+0x3c/0x60 [ 415.821096] btrfs_mount+0x42a/0x1fe0 [ 415.824896] ? lock_downgrade+0x740/0x740 [ 415.829041] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 415.835021] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 415.840472] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 415.845488] ? __lockdep_init_map+0x100/0x560 [ 415.849980] ? __lockdep_init_map+0x100/0x560 [ 415.854476] mount_fs+0x92/0x2a0 [ 415.857844] vfs_kern_mount.part.0+0x5b/0x470 [ 415.862338] do_mount+0xe53/0x2a00 [ 415.865884] ? copy_mount_string+0x40/0x40 [ 415.870116] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 415.875130] ? copy_mnt_ns+0xa30/0xa30 [ 415.879014] ? copy_mount_options+0x1fa/0x2f0 [ 415.883505] ? copy_mnt_ns+0xa30/0xa30 [ 415.887393] SyS_mount+0xa8/0x120 [ 415.890834] ? copy_mnt_ns+0xa30/0xa30 [ 415.894703] do_syscall_64+0x1d5/0x640 [ 415.898685] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 415.903860] RIP: 0033:0x46090a [ 415.907037] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 415.914730] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 415.922080] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 415.929334] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 415.937368] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 415.944624] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:45 executing program 5 (fault-call:0 fault-nth:63): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0xffffffff00000001) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000140)=0x54) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000180)={{0x3, 0x0, @identifier="03f98cb6f4f7125d33b3d4731785ebed"}}) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) r1 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x1, 0x24c03) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000000000000000000ff01", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=ANY=[@ANYBLOB="001d0f00000000", @ANYRES32=r5, @ANYBLOB="00000000f1ffffff000000000b000100636c736163740000"], 0x30}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000054c0)=@delchain={0x24, 0x2e, 0x2, 0x0, 0x1, {0x0, 0x0, 0x0, r5, {}, {0xfff2, 0xe}, {0x10}}}, 0x24}}, 0x8040) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000200)={0x0, 0x1, r3, 0x8, 0x80000}) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:45 executing program 2: 06:06:45 executing program 3: 06:06:45 executing program 1: 06:06:45 executing program 0: 06:06:45 executing program 2: 06:06:45 executing program 0: 06:06:45 executing program 3: 06:06:45 executing program 1: [ 416.024887] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 06:06:45 executing program 2: [ 416.079034] FAULT_INJECTION: forcing a failure. [ 416.079034] name failslab, interval 1, probability 0, space 0, times 0 06:06:45 executing program 0: [ 416.126674] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 416.139607] CPU: 1 PID: 4656 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 416.147420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 416.156769] Call Trace: [ 416.159357] dump_stack+0x1b2/0x283 [ 416.163159] should_fail.cold+0x10a/0x154 [ 416.167308] ? mempool_free+0x1d0/0x1d0 [ 416.171279] should_failslab+0xd6/0x130 [ 416.175252] kmem_cache_alloc+0x40/0x3c0 [ 416.179327] ? mempool_free+0x1d0/0x1d0 [ 416.183296] mempool_alloc+0x10e/0x2d0 [ 416.187187] ? remove_element.isra.0+0x1b0/0x1b0 [ 416.191942] ? alloc_buffer_head+0x20/0x110 [ 416.196265] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 416.201809] bio_alloc_bioset+0x41b/0x830 [ 416.205962] ? bvec_alloc+0x2d0/0x2d0 [ 416.209759] ? lock_downgrade+0x740/0x740 [ 416.213912] submit_bh_wbc+0xf5/0x6f0 [ 416.217714] block_read_full_page+0x6ce/0x870 [ 416.222213] ? set_init_blocksize+0x210/0x210 [ 416.226709] ? __lru_cache_add+0x178/0x250 [ 416.230939] ? __bread_gfp+0x2e0/0x2e0 [ 416.234833] ? add_to_page_cache_lru+0x136/0x2b0 [ 416.239592] ? add_to_page_cache_locked+0x40/0x40 [ 416.244436] ? alloc_pages_current+0x15d/0x260 [ 416.249106] do_read_cache_page+0x38e/0xc10 [ 416.253519] ? blkdev_writepages+0xd0/0xd0 [ 416.257740] btrfs_read_disk_super+0xd0/0x370 [ 416.262217] btrfs_scan_one_device+0xb5/0x330 [ 416.266714] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 416.271730] ? device_list_add+0x8f0/0x8f0 [ 416.275947] btrfs_mount+0x1fc/0x1fe0 [ 416.279733] ? lock_downgrade+0x740/0x740 [ 416.283864] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 416.289823] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 416.295248] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 416.300240] ? __lockdep_init_map+0x100/0x560 [ 416.304713] ? __lockdep_init_map+0x100/0x560 [ 416.309189] mount_fs+0x92/0x2a0 [ 416.316533] vfs_kern_mount.part.0+0x5b/0x470 [ 416.321017] vfs_kern_mount+0x3c/0x60 [ 416.324796] btrfs_mount+0x42a/0x1fe0 [ 416.328587] ? lock_downgrade+0x740/0x740 [ 416.332712] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 416.338664] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 416.344091] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 416.349091] ? __lockdep_init_map+0x100/0x560 [ 416.353571] ? __lockdep_init_map+0x100/0x560 [ 416.358050] mount_fs+0x92/0x2a0 [ 416.361513] vfs_kern_mount.part.0+0x5b/0x470 [ 416.365998] do_mount+0xe53/0x2a00 [ 416.369524] ? copy_mount_string+0x40/0x40 [ 416.373762] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 416.378757] ? copy_mnt_ns+0xa30/0xa30 [ 416.382624] ? copy_mount_options+0x1fa/0x2f0 [ 416.387096] ? copy_mnt_ns+0xa30/0xa30 [ 416.390990] SyS_mount+0xa8/0x120 [ 416.394420] ? copy_mnt_ns+0xa30/0xa30 [ 416.398299] do_syscall_64+0x1d5/0x640 [ 416.402168] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 416.407334] RIP: 0033:0x46090a [ 416.410499] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 416.418181] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 416.425431] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 416.432684] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 416.439951] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 416.447198] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 416.475320] BTRFS info (device loop5): turning off barriers [ 416.484839] BTRFS info (device loop5): unrecognized mount option 'fragment=all' 06:06:45 executing program 5 (fault-call:0 fault-nth:64): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:45 executing program 3: 06:06:45 executing program 2: 06:06:45 executing program 0: 06:06:45 executing program 1: 06:06:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r5 = dup(r4) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_user='access=user'}], [], 0x6b}}) ioctl$SCSI_IOCTL_GET_PCI(r5, 0x5387, &(0x7f00000000c0)) [ 416.533230] BTRFS error (device loop5): open_ctree failed 06:06:45 executing program 3: 06:06:45 executing program 2: 06:06:45 executing program 0: [ 416.646305] FAULT_INJECTION: forcing a failure. [ 416.646305] name failslab, interval 1, probability 0, space 0, times 0 [ 416.657780] CPU: 0 PID: 4696 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 416.665572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 416.674920] Call Trace: [ 416.677489] dump_stack+0x1b2/0x283 [ 416.681195] should_fail.cold+0x10a/0x154 [ 416.685363] should_failslab+0xd6/0x130 [ 416.689313] kmem_cache_alloc+0x40/0x3c0 [ 416.693351] radix_tree_node_alloc.constprop.0+0x1b0/0x2f0 [ 416.698951] __radix_tree_create+0x323/0x4b0 [ 416.703340] page_cache_tree_insert+0x98/0x2a0 [ 416.707900] ? file_check_and_advance_wb_err+0x370/0x370 [ 416.713325] ? __add_to_page_cache_locked+0x1ed/0x840 [ 416.718494] __add_to_page_cache_locked+0x1fd/0x840 [ 416.723485] ? page_cache_tree_insert+0x2a0/0x2a0 [ 416.728300] ? find_get_entry+0x339/0x630 [ 416.732431] add_to_page_cache_lru+0xcf/0x2b0 [ 416.736913] ? add_to_page_cache_locked+0x40/0x40 [ 416.741729] ? alloc_pages_current+0x15d/0x260 [ 416.746285] do_read_cache_page+0x36f/0xc10 [ 416.750582] ? blkdev_writepages+0xd0/0xd0 [ 416.755761] btrfs_read_disk_super+0xd0/0x370 [ 416.760235] btrfs_scan_one_device+0xb5/0x330 [ 416.764707] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 416.769695] ? device_list_add+0x8f0/0x8f0 [ 416.773912] btrfs_mount+0x1fc/0x1fe0 [ 416.777687] ? lock_downgrade+0x740/0x740 [ 416.781808] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 416.787758] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 416.793193] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 416.798183] ? __lockdep_init_map+0x100/0x560 [ 416.802651] ? __lockdep_init_map+0x100/0x560 [ 416.807132] mount_fs+0x92/0x2a0 [ 416.810485] vfs_kern_mount.part.0+0x5b/0x470 [ 416.814965] vfs_kern_mount+0x3c/0x60 [ 416.818739] btrfs_mount+0x42a/0x1fe0 [ 416.822514] ? lock_downgrade+0x740/0x740 [ 416.826635] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 416.832584] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 416.838062] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 416.843070] ? __lockdep_init_map+0x100/0x560 [ 416.847543] ? __lockdep_init_map+0x100/0x560 [ 416.852174] mount_fs+0x92/0x2a0 [ 416.855624] vfs_kern_mount.part.0+0x5b/0x470 [ 416.860098] do_mount+0xe53/0x2a00 [ 416.863631] ? copy_mount_string+0x40/0x40 [ 416.867853] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 416.872845] ? copy_mnt_ns+0xa30/0xa30 [ 416.876711] ? copy_mount_options+0x1fa/0x2f0 [ 416.881181] ? copy_mnt_ns+0xa30/0xa30 [ 416.885208] SyS_mount+0xa8/0x120 [ 416.888636] ? copy_mnt_ns+0xa30/0xa30 [ 416.892511] do_syscall_64+0x1d5/0x640 [ 416.896375] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 416.901554] RIP: 0033:0x46090a [ 416.904717] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 416.912400] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 416.919644] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 416.926893] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 416.934230] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 06:06:46 executing program 1: 06:06:46 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) move_pages(0x0, 0x4, &(0x7f00000000c0)=[&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil], 0x0, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x2) [ 416.941485] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:46 executing program 0: 06:06:46 executing program 5 (fault-call:0 fault-nth:65): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:46 executing program 3: 06:06:46 executing program 2: 06:06:46 executing program 1: 06:06:46 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000000000000000000ff01", @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000054c0)=@delchain={0x24, 0x2e, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xfff2, 0xffff}}}, 0x24}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000000000000000000ff01", @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000054c0)=@delchain={0x24, 0x2e, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xfff2, 0xffff}}}, 0x24}}, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xe8, 0x0, 0x400, 0x70bd2c, 0x25dfdbfb, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_macvtap\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x20000050}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:46 executing program 0: [ 417.076654] BTRFS info (device loop5): turning off barriers [ 417.082622] BTRFS info (device loop5): unrecognized mount option 'fragment=all' [ 417.116591] BTRFS error (device loop5): open_ctree failed 06:06:46 executing program 2: 06:06:46 executing program 1: 06:06:46 executing program 3: 06:06:46 executing program 0: [ 417.191484] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 06:06:46 executing program 2: 06:06:46 executing program 1: [ 417.239192] FAULT_INJECTION: forcing a failure. [ 417.239192] name failslab, interval 1, probability 0, space 0, times 0 [ 417.282460] CPU: 0 PID: 4733 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 417.290288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 417.299644] Call Trace: [ 417.302256] dump_stack+0x1b2/0x283 [ 417.305892] should_fail.cold+0x10a/0x154 [ 417.310043] should_failslab+0xd6/0x130 [ 417.314021] kmem_cache_alloc+0x28e/0x3c0 [ 417.318172] alloc_buffer_head+0x20/0x110 [ 417.322322] alloc_page_buffers+0xb3/0x1f0 [ 417.326562] create_empty_buffers+0x36/0x450 [ 417.330971] ? mem_cgroup_commit_charge+0x17c/0x3b0 [ 417.336868] create_page_buffers+0x14d/0x1c0 [ 417.340869] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 417.341277] block_read_full_page+0xb9/0x870 [ 417.354255] ? __add_to_page_cache_locked+0x2ea/0x840 [ 417.359447] ? check_preemption_disabled+0x35/0x240 [ 417.364467] ? set_init_blocksize+0x210/0x210 [ 417.369053] ? __lru_cache_add+0x178/0x250 [ 417.373287] ? __bread_gfp+0x2e0/0x2e0 [ 417.377178] ? add_to_page_cache_lru+0x136/0x2b0 [ 417.381936] ? add_to_page_cache_locked+0x40/0x40 [ 417.386783] ? alloc_pages_current+0x15d/0x260 [ 417.391373] do_read_cache_page+0x38e/0xc10 [ 417.395705] ? blkdev_writepages+0xd0/0xd0 [ 417.399985] btrfs_read_disk_super+0xd0/0x370 [ 417.404480] btrfs_scan_one_device+0xb5/0x330 [ 417.409050] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 417.414051] ? device_list_add+0x8f0/0x8f0 [ 417.418274] btrfs_mount+0x1fc/0x1fe0 [ 417.422054] ? lock_downgrade+0x740/0x740 [ 417.426181] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 417.432132] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 417.437560] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 417.442564] ? __lockdep_init_map+0x100/0x560 [ 417.447098] ? __lockdep_init_map+0x100/0x560 [ 417.451658] mount_fs+0x92/0x2a0 [ 417.455005] vfs_kern_mount.part.0+0x5b/0x470 [ 417.459475] vfs_kern_mount+0x3c/0x60 [ 417.463258] btrfs_mount+0x42a/0x1fe0 [ 417.467044] ? lock_downgrade+0x740/0x740 [ 417.471184] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 417.477167] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 417.482591] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 417.487582] ? __lockdep_init_map+0x100/0x560 [ 417.492064] ? __lockdep_init_map+0x100/0x560 [ 417.496535] mount_fs+0x92/0x2a0 [ 417.499893] vfs_kern_mount.part.0+0x5b/0x470 [ 417.504372] do_mount+0xe53/0x2a00 [ 417.507899] ? retint_kernel+0x2d/0x2d [ 417.511776] ? copy_mount_string+0x40/0x40 [ 417.515989] ? copy_mount_options+0x185/0x2f0 [ 417.520458] ? copy_mount_options+0x18b/0x2f0 [ 417.524928] ? copy_mount_options+0x1fa/0x2f0 [ 417.529399] ? copy_mnt_ns+0xa30/0xa30 [ 417.533273] SyS_mount+0xa8/0x120 [ 417.536719] ? copy_mnt_ns+0xa30/0xa30 [ 417.540593] do_syscall_64+0x1d5/0x640 [ 417.544474] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 417.549746] RIP: 0033:0x46090a [ 417.552914] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 417.560605] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 417.567851] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 417.575096] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 417.582361] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 417.589619] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 417.621412] BTRFS info (device loop5): turning off barriers [ 417.639178] BTRFS info (device loop5): unrecognized mount option 'fragment=all' [ 417.682967] BTRFS error (device loop5): open_ctree failed 06:06:46 executing program 5 (fault-call:0 fault-nth:66): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:46 executing program 0: 06:06:46 executing program 3: 06:06:46 executing program 2: 06:06:46 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_IBSS(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, 0x0, 0x401, 0x70bd28, 0x25dfdbff, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x9, 0x30}}}}, ["", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x840) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) ioctl$VT_ACTIVATE(r2, 0x5606, 0x6) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:46 executing program 1: 06:06:47 executing program 0: 06:06:47 executing program 1: 06:06:47 executing program 2: 06:06:47 executing program 3: 06:06:47 executing program 2: 06:06:47 executing program 1: [ 417.818926] FAULT_INJECTION: forcing a failure. [ 417.818926] name failslab, interval 1, probability 0, space 0, times 0 [ 417.875184] CPU: 1 PID: 4765 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 417.883180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 417.892531] Call Trace: [ 417.895125] dump_stack+0x1b2/0x283 [ 417.898758] should_fail.cold+0x10a/0x154 [ 417.902953] ? mempool_free+0x1d0/0x1d0 [ 417.906927] should_failslab+0xd6/0x130 [ 417.910902] kmem_cache_alloc+0x40/0x3c0 [ 417.914962] ? mempool_free+0x1d0/0x1d0 [ 417.919017] mempool_alloc+0x10e/0x2d0 [ 417.922883] ? remove_element.isra.0+0x1b0/0x1b0 [ 417.927789] ? alloc_buffer_head+0x20/0x110 [ 417.932087] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 417.937545] bio_alloc_bioset+0x41b/0x830 [ 417.941669] ? bvec_alloc+0x2d0/0x2d0 [ 417.945446] ? lock_downgrade+0x740/0x740 [ 417.949585] submit_bh_wbc+0xf5/0x6f0 [ 417.953386] block_read_full_page+0x6ce/0x870 [ 417.957882] ? set_init_blocksize+0x210/0x210 [ 417.962358] ? __lru_cache_add+0x178/0x250 [ 417.966575] ? __bread_gfp+0x2e0/0x2e0 [ 417.970440] ? add_to_page_cache_lru+0x136/0x2b0 [ 417.975222] ? add_to_page_cache_locked+0x40/0x40 [ 417.980058] ? alloc_pages_current+0x15d/0x260 [ 417.984664] do_read_cache_page+0x38e/0xc10 [ 417.988971] ? blkdev_writepages+0xd0/0xd0 [ 417.993186] btrfs_read_disk_super+0xd0/0x370 [ 417.997661] btrfs_scan_one_device+0xb5/0x330 [ 418.002133] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 418.007125] ? device_list_add+0x8f0/0x8f0 [ 418.011338] btrfs_mount+0x1fc/0x1fe0 [ 418.015115] ? lock_downgrade+0x740/0x740 [ 418.019242] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 418.025196] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 418.030644] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 418.035636] ? __lockdep_init_map+0x100/0x560 [ 418.040138] ? __lockdep_init_map+0x100/0x560 [ 418.044609] mount_fs+0x92/0x2a0 [ 418.047980] vfs_kern_mount.part.0+0x5b/0x470 [ 418.052451] vfs_kern_mount+0x3c/0x60 [ 418.056228] btrfs_mount+0x42a/0x1fe0 [ 418.060009] ? lock_downgrade+0x740/0x740 [ 418.064133] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 418.070082] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 418.075517] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 418.080508] ? __lockdep_init_map+0x100/0x560 [ 418.084978] ? __lockdep_init_map+0x100/0x560 [ 418.089449] mount_fs+0x92/0x2a0 [ 418.092807] vfs_kern_mount.part.0+0x5b/0x470 [ 418.097279] do_mount+0xe53/0x2a00 [ 418.100796] ? copy_mount_string+0x40/0x40 [ 418.105006] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 418.109998] ? copy_mnt_ns+0xa30/0xa30 [ 418.113860] ? copy_mount_options+0x1fa/0x2f0 [ 418.118341] ? copy_mnt_ns+0xa30/0xa30 [ 418.122215] SyS_mount+0xa8/0x120 [ 418.125643] ? copy_mnt_ns+0xa30/0xa30 [ 418.129527] do_syscall_64+0x1d5/0x640 [ 418.133407] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 418.138571] RIP: 0033:0x46090a [ 418.141734] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 418.149427] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 418.156672] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 418.163917] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 418.171173] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 418.178441] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 418.215920] BTRFS info (device loop5): turning off barriers [ 418.228430] BTRFS info (device loop5): unrecognized mount option 'fragment=all' 06:06:47 executing program 5 (fault-call:0 fault-nth:67): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:47 executing program 0: 06:06:47 executing program 3: 06:06:47 executing program 1: 06:06:47 executing program 2: 06:06:47 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0xb) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$X25_QBITINCL(r4, 0x106, 0x1, &(0x7f00000000c0), &(0x7f00000002c0)=0x4) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x40051) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000000000000000000ff01", @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c00000000007468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x24, 0x24, 0x400, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {0x4, 0x8}, {0xc, 0xffff}}}, 0x24}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000054c0)=@delchain={0x24, 0x2e, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {0xfff2, 0xffff}}}, 0x24}}, 0x0) write$binfmt_script(r0, &(0x7f0000002c00)=ANY=[@ANYRES64, @ANYRESDEC=r5, @ANYRES16=r2, @ANYBLOB="36d1d006c99ae6e343d873f6c56ba590bca552bc0c4a19de76cf1ba02f1c965d09ee9a15f13b8cea40c1781e8123aa0cb8a8d0ee2422cb7f9e61844a4c78e6c19ad49ff9a7c5dbfee3d62ed03c66b2c6cc727bb30aa7c5fabf5cc8aedc6a9e0b2c6a1dd46e2e663bc9f8ac947d5912c38fd6c5ca50b2d6fbd79aee104d906462d3bb8c4eab3b050f56212205c324ed5d7157289a511f9d6e863e69108dba3aec8b8c64a41aa1359051fbed7f6844e4d3f159293f1391ac3f2415104bb0213a0ffa57d5619b7e817fd7a4174cb7601a57a615bbf49f99bdd09a709bd512909ba2c4ba073ffcc69d48d9da996a"], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000300), 0x1, 0x0) [ 418.275468] BTRFS error (device loop5): open_ctree failed 06:06:47 executing program 1: 06:06:47 executing program 0: 06:06:47 executing program 3: 06:06:47 executing program 2: 06:06:47 executing program 2: [ 418.381122] FAULT_INJECTION: forcing a failure. [ 418.381122] name failslab, interval 1, probability 0, space 0, times 0 [ 418.404285] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 418.417664] CPU: 1 PID: 4797 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 418.425474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 418.434824] Call Trace: [ 418.437420] dump_stack+0x1b2/0x283 [ 418.441051] should_fail.cold+0x10a/0x154 [ 418.445197] ? kasan_kmalloc+0xeb/0x160 [ 418.449174] should_failslab+0xd6/0x130 [ 418.453147] kmem_cache_alloc_node+0x54/0x410 [ 418.456056] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 418.457641] create_task_io_context+0x2a/0x3c0 [ 418.457651] generic_make_request_checks+0x1350/0x19f0 [ 418.457664] ? mempool_alloc+0x10e/0x2d0 [ 418.480184] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 418.485635] ? blk_rq_prep_clone+0x6c0/0x6c0 [ 418.490039] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 418.495052] ? trace_hardirqs_on+0x10/0x10 [ 418.499289] generic_make_request+0x67/0x850 [ 418.503696] ? remove_element.isra.0+0x1b0/0x1b0 [ 418.508456] ? blk_queue_exit+0x1d0/0x1d0 [ 418.512604] ? alloc_buffer_head+0x20/0x110 [ 418.516925] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 418.522372] ? guard_bio_eod+0x15c/0x520 [ 418.526434] submit_bio+0x234/0x390 06:06:47 executing program 2: [ 418.530058] ? generic_make_request+0x850/0x850 [ 418.534731] ? guard_bio_eod+0x1ba/0x520 [ 418.538786] ? bio_add_page+0x96/0xe0 [ 418.542583] submit_bh_wbc+0x526/0x6f0 [ 418.546469] block_read_full_page+0x6ce/0x870 [ 418.550966] ? set_init_blocksize+0x210/0x210 [ 418.555460] ? __lru_cache_add+0x178/0x250 [ 418.559690] ? __bread_gfp+0x2e0/0x2e0 [ 418.563577] ? add_to_page_cache_lru+0x136/0x2b0 [ 418.568330] ? add_to_page_cache_locked+0x40/0x40 [ 418.573160] ? alloc_pages_current+0x15d/0x260 [ 418.577723] do_read_cache_page+0x38e/0xc10 [ 418.582024] ? blkdev_writepages+0xd0/0xd0 [ 418.586241] btrfs_read_disk_super+0xd0/0x370 [ 418.590801] btrfs_scan_one_device+0xb5/0x330 [ 418.595274] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 418.600284] ? device_list_add+0x8f0/0x8f0 [ 418.604508] btrfs_mount+0x1fc/0x1fe0 [ 418.608286] ? lock_downgrade+0x740/0x740 [ 418.612412] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 418.618393] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 418.623819] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 418.628811] ? __lockdep_init_map+0x100/0x560 [ 418.633370] ? __lockdep_init_map+0x100/0x560 [ 418.637841] mount_fs+0x92/0x2a0 [ 418.641186] vfs_kern_mount.part.0+0x5b/0x470 [ 418.645922] vfs_kern_mount+0x3c/0x60 [ 418.649699] btrfs_mount+0x42a/0x1fe0 [ 418.653480] ? lock_downgrade+0x740/0x740 [ 418.657618] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 418.663570] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 418.668996] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 418.673990] ? __lockdep_init_map+0x100/0x560 [ 418.678460] ? __lockdep_init_map+0x100/0x560 [ 418.682932] mount_fs+0x92/0x2a0 [ 418.686279] vfs_kern_mount.part.0+0x5b/0x470 [ 418.690751] do_mount+0xe53/0x2a00 [ 418.694267] ? do_raw_spin_unlock+0x164/0x220 [ 418.698753] ? copy_mount_string+0x40/0x40 [ 418.702966] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 418.707959] ? copy_mnt_ns+0xa30/0xa30 [ 418.711835] ? copy_mount_options+0x1fa/0x2f0 [ 418.716362] ? copy_mnt_ns+0xa30/0xa30 [ 418.720244] SyS_mount+0xa8/0x120 [ 418.723730] ? copy_mnt_ns+0xa30/0xa30 [ 418.727607] do_syscall_64+0x1d5/0x640 [ 418.731497] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 418.736673] RIP: 0033:0x46090a [ 418.739850] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 418.747545] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 418.755660] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 418.762908] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 418.770168] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 418.777415] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 418.804347] BTRFS info (device loop5): turning off barriers [ 418.810092] BTRFS info (device loop5): unrecognized mount option 'fragment=all' 06:06:48 executing program 5 (fault-call:0 fault-nth:68): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:48 executing program 0: 06:06:48 executing program 1: 06:06:48 executing program 2: 06:06:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f00000000c0), 0x4) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:48 executing program 3: [ 418.863050] BTRFS error (device loop5): open_ctree failed 06:06:48 executing program 3: 06:06:48 executing program 2: 06:06:48 executing program 1: 06:06:48 executing program 0: 06:06:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup3(r0, r0, 0x0) r3 = accept4(r0, 0x0, &(0x7f0000000080), 0x80800) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r6 = dup(r5) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="74f2616e733d66642c7266646e6f3d", @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r6, @ANYBLOB=',access=user,k']) ioctl$KVM_GET_EMULATED_CPUID(r6, 0xc008ae09, &(0x7f0000000100)=""/217) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:48 executing program 3: [ 419.000487] FAULT_INJECTION: forcing a failure. [ 419.000487] name failslab, interval 1, probability 0, space 0, times 0 [ 419.050171] CPU: 1 PID: 4834 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 419.058000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 419.067352] Call Trace: [ 419.069943] dump_stack+0x1b2/0x283 [ 419.073578] should_fail.cold+0x10a/0x154 [ 419.077729] ? mempool_free+0x1d0/0x1d0 [ 419.081703] should_failslab+0xd6/0x130 [ 419.085680] kmem_cache_alloc+0x40/0x3c0 [ 419.089743] ? mempool_free+0x1d0/0x1d0 [ 419.093713] mempool_alloc+0x10e/0x2d0 [ 419.097609] ? remove_element.isra.0+0x1b0/0x1b0 [ 419.102371] ? alloc_buffer_head+0x20/0x110 [ 419.106701] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 419.112162] bio_alloc_bioset+0x41b/0x830 [ 419.116317] ? bvec_alloc+0x2d0/0x2d0 [ 419.120127] ? lock_downgrade+0x740/0x740 [ 419.124279] submit_bh_wbc+0xf5/0x6f0 [ 419.128088] block_read_full_page+0x6ce/0x870 [ 419.132589] ? set_init_blocksize+0x210/0x210 [ 419.137088] ? __lru_cache_add+0x178/0x250 [ 419.141320] ? __bread_gfp+0x2e0/0x2e0 [ 419.145342] ? add_to_page_cache_lru+0x136/0x2b0 [ 419.150132] ? add_to_page_cache_locked+0x40/0x40 [ 419.154951] ? alloc_pages_current+0x15d/0x260 [ 419.159511] do_read_cache_page+0x38e/0xc10 [ 419.163811] ? blkdev_writepages+0xd0/0xd0 [ 419.168080] btrfs_read_disk_super+0xd0/0x370 [ 419.172555] btrfs_scan_one_device+0xb5/0x330 [ 419.177028] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 419.182070] ? device_list_add+0x8f0/0x8f0 [ 419.186285] btrfs_mount+0x1fc/0x1fe0 [ 419.190062] ? lock_downgrade+0x740/0x740 [ 419.194189] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 419.200143] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 419.205585] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 419.210580] ? __lockdep_init_map+0x100/0x560 [ 419.215571] ? __lockdep_init_map+0x100/0x560 [ 419.220043] mount_fs+0x92/0x2a0 [ 419.223405] vfs_kern_mount.part.0+0x5b/0x470 [ 419.227878] vfs_kern_mount+0x3c/0x60 [ 419.231654] btrfs_mount+0x42a/0x1fe0 [ 419.235430] ? lock_downgrade+0x740/0x740 [ 419.239569] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 419.245522] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 419.250948] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 419.255948] ? __lockdep_init_map+0x100/0x560 [ 419.260438] ? __lockdep_init_map+0x100/0x560 [ 419.264925] mount_fs+0x92/0x2a0 [ 419.268275] vfs_kern_mount.part.0+0x5b/0x470 [ 419.272842] do_mount+0xe53/0x2a00 [ 419.276360] ? do_raw_spin_unlock+0x164/0x220 [ 419.280833] ? copy_mount_string+0x40/0x40 [ 419.285130] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 419.290123] ? copy_mnt_ns+0xa30/0xa30 [ 419.294009] ? copy_mount_options+0x1fa/0x2f0 [ 419.298489] ? copy_mnt_ns+0xa30/0xa30 [ 419.302369] SyS_mount+0xa8/0x120 [ 419.305797] ? copy_mnt_ns+0xa30/0xa30 [ 419.309663] do_syscall_64+0x1d5/0x640 [ 419.313555] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 419.318726] RIP: 0033:0x46090a [ 419.321891] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 419.329576] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 419.336854] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 419.344100] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 419.351345] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 419.358605] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 419.389661] BTRFS info (device loop5): turning off barriers [ 419.396850] BTRFS info (device loop5): unrecognized mount option 'fragment=all' 06:06:48 executing program 5 (fault-call:0 fault-nth:69): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:48 executing program 2: 06:06:48 executing program 1: 06:06:48 executing program 0: 06:06:48 executing program 3: 06:06:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xa6) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) [ 419.433188] BTRFS error (device loop5): open_ctree failed 06:06:48 executing program 1: 06:06:48 executing program 2: 06:06:48 executing program 0: 06:06:48 executing program 3: [ 419.545214] FAULT_INJECTION: forcing a failure. [ 419.545214] name failslab, interval 1, probability 0, space 0, times 0 06:06:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_misc(r0, &(0x7f00000000c0)={'syz1', "1d74f992b1410b62a73bb1a134cf48a8c00e3622c4162e0c5fd43c9d602f416d6f181e515e1eeae0d156e95ecda9a45e534b394b72ca27bfb479862ea2ce7e441b2ee152a225efcf29779231f7a6296668d8f17ff47eb581263306fb5dae72f4a676fe5434f0224cd6c45c"}, 0x6f) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000140)=0x6) [ 419.590617] CPU: 0 PID: 4871 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 419.598443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 419.607791] Call Trace: [ 419.610379] dump_stack+0x1b2/0x283 [ 419.614007] should_fail.cold+0x10a/0x154 [ 419.618257] should_failslab+0xd6/0x130 [ 419.622230] kmem_cache_alloc_node_trace+0x25a/0x400 [ 419.627341] __kmalloc_node+0x38/0x70 [ 419.631142] kvmalloc_node+0x88/0xd0 [ 419.634853] btrfs_mount+0x911/0x1fe0 06:06:48 executing program 2: [ 419.638650] ? lock_downgrade+0x740/0x740 [ 419.642807] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 419.648782] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 419.654227] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 419.659245] ? __lockdep_init_map+0x100/0x560 [ 419.663741] ? __lockdep_init_map+0x100/0x560 [ 419.668321] mount_fs+0x92/0x2a0 [ 419.671693] vfs_kern_mount.part.0+0x5b/0x470 [ 419.676195] vfs_kern_mount+0x3c/0x60 [ 419.679994] btrfs_mount+0x42a/0x1fe0 [ 419.683796] ? lock_downgrade+0x740/0x740 [ 419.687943] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 419.693925] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 419.699545] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 419.704561] ? __lockdep_init_map+0x100/0x560 [ 419.709054] ? __lockdep_init_map+0x100/0x560 [ 419.713547] mount_fs+0x92/0x2a0 [ 419.716914] vfs_kern_mount.part.0+0x5b/0x470 [ 419.721412] do_mount+0xe53/0x2a00 [ 419.724957] ? copy_mount_string+0x40/0x40 [ 419.729189] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 419.734202] ? copy_mnt_ns+0xa30/0xa30 [ 419.738087] ? copy_mount_options+0x1fa/0x2f0 [ 419.742603] ? copy_mnt_ns+0xa30/0xa30 [ 419.746488] SyS_mount+0xa8/0x120 [ 419.749935] ? copy_mnt_ns+0xa30/0xa30 [ 419.753821] do_syscall_64+0x1d5/0x640 [ 419.757721] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 419.762902] RIP: 0033:0x46090a [ 419.766082] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 419.773766] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 419.781017] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 419.788302] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 419.795575] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 419.802849] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 419.818362] BTRFS info (device loop5): turning off barriers [ 419.824193] BTRFS info (device loop5): unrecognized mount option 'fragment=all' 06:06:49 executing program 5 (fault-call:0 fault-nth:70): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:49 executing program 1: 06:06:49 executing program 2: 06:06:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000000c0)=0x5, 0x4) r3 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) epoll_create(0x9) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:49 executing program 3: 06:06:49 executing program 0: [ 419.853163] BTRFS error (device loop5): open_ctree failed 06:06:49 executing program 3: 06:06:49 executing program 2: 06:06:49 executing program 0: 06:06:49 executing program 3: 06:06:49 executing program 1: 06:06:49 executing program 2: [ 419.971358] FAULT_INJECTION: forcing a failure. [ 419.971358] name failslab, interval 1, probability 0, space 0, times 0 [ 420.030813] CPU: 1 PID: 4910 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 420.038631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 420.047992] Call Trace: [ 420.050589] dump_stack+0x1b2/0x283 [ 420.054224] should_fail.cold+0x10a/0x154 [ 420.058372] should_failslab+0xd6/0x130 [ 420.062346] kmem_cache_alloc_trace+0x29a/0x3d0 [ 420.067016] btrfs_mount+0x9ee/0x1fe0 [ 420.070822] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 420.076806] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 420.082430] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 420.087446] ? __lockdep_init_map+0x100/0x560 [ 420.091948] ? __lockdep_init_map+0x100/0x560 [ 420.096441] mount_fs+0x92/0x2a0 [ 420.099820] vfs_kern_mount.part.0+0x5b/0x470 [ 420.104318] vfs_kern_mount+0x3c/0x60 [ 420.108120] btrfs_mount+0x42a/0x1fe0 [ 420.111919] ? lock_downgrade+0x740/0x740 [ 420.116066] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 420.122074] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 420.127556] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 420.132568] ? __lockdep_init_map+0x100/0x560 [ 420.137041] ? __lockdep_init_map+0x100/0x560 [ 420.141557] mount_fs+0x92/0x2a0 [ 420.144924] vfs_kern_mount.part.0+0x5b/0x470 [ 420.149397] do_mount+0xe53/0x2a00 [ 420.152918] ? copy_mount_string+0x40/0x40 [ 420.157138] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 420.162171] ? copy_mnt_ns+0xa30/0xa30 [ 420.166042] ? copy_mount_options+0x1fa/0x2f0 [ 420.170515] ? copy_mnt_ns+0xa30/0xa30 [ 420.174407] SyS_mount+0xa8/0x120 [ 420.177852] ? copy_mnt_ns+0xa30/0xa30 [ 420.181727] do_syscall_64+0x1d5/0x640 [ 420.185603] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 420.190771] RIP: 0033:0x46090a [ 420.193945] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 420.201631] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 420.208896] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 420.216149] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 420.223428] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 420.230672] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:49 executing program 5 (fault-call:0 fault-nth:71): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:49 executing program 0: 06:06:49 executing program 3: 06:06:49 executing program 2: 06:06:49 executing program 1: 06:06:49 executing program 3: 06:06:49 executing program 2: 06:06:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_mount_image$fuse(&(0x7f00000000c0)='fuse\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8b040, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0xc00}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@blksize={'blksize', 0x3d, 0xf00}}], [{@smackfsdef={'smackfsdef'}}, {@obj_user={'obj_user'}}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'unconfined_u'}}, {@fowner_gt={'fowner>', 0xee01}}, {@hash='hash'}, {@audit='audit'}, {@permit_directio='permit_directio'}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}]}}) r2 = dup(r1) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcsa\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) [ 420.363403] FAULT_INJECTION: forcing a failure. [ 420.363403] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 420.375237] CPU: 0 PID: 4939 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 420.383036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 420.392391] Call Trace: [ 420.394980] dump_stack+0x1b2/0x283 [ 420.398610] should_fail.cold+0x10a/0x154 [ 420.402760] __alloc_pages_nodemask+0x22c/0x2720 [ 420.407518] ? __lock_acquire+0x5fc/0x3f20 06:06:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x4000, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) [ 420.411753] ? vfs_kern_mount+0x3c/0x60 [ 420.415723] ? btrfs_mount+0x42a/0x1fe0 [ 420.419689] ? mount_fs+0x92/0x2a0 [ 420.423235] ? vfs_kern_mount.part.0+0x5b/0x470 [ 420.427925] ? do_mount+0xe53/0x2a00 [ 420.431634] ? SyS_mount+0xa8/0x120 [ 420.435256] ? do_syscall_64+0x1d5/0x640 [ 420.439314] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 420.444682] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 420.449523] ? trace_hardirqs_on+0x10/0x10 [ 420.453763] ? __blkdev_put+0x51a/0x800 [ 420.457736] ? cache_alloc_refill+0x1da/0x350 [ 420.462233] ? lock_acquire+0x170/0x3f0 [ 420.466209] cache_grow_begin+0x8f/0x420 [ 420.470271] cache_alloc_refill+0x273/0x350 [ 420.474592] kmem_cache_alloc_trace+0x340/0x3d0 [ 420.479263] btrfs_mount+0x9ee/0x1fe0 [ 420.483078] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 420.489062] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 420.494510] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 420.499525] ? __lockdep_init_map+0x100/0x560 [ 420.504019] ? __lockdep_init_map+0x100/0x560 [ 420.508516] mount_fs+0x92/0x2a0 06:06:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x0, 0x4df, 0x1, 0x4, 0x0, 0x5, 0x36e9, {0x0, @in={{0x2, 0x4e24, @broadcast}}, 0x8, 0x95f, 0x401, 0x0, 0x400}}, &(0x7f0000000180)=0xb0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) [ 420.511910] vfs_kern_mount.part.0+0x5b/0x470 [ 420.516410] vfs_kern_mount+0x3c/0x60 [ 420.520211] btrfs_mount+0x42a/0x1fe0 [ 420.524010] ? lock_downgrade+0x740/0x740 [ 420.528155] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 420.534133] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 420.539583] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 420.544610] ? __lockdep_init_map+0x100/0x560 [ 420.549105] ? __lockdep_init_map+0x100/0x560 [ 420.553591] mount_fs+0x92/0x2a0 [ 420.556952] vfs_kern_mount.part.0+0x5b/0x470 [ 420.561447] do_mount+0xe53/0x2a00 [ 420.564995] ? copy_mount_string+0x40/0x40 [ 420.569225] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 420.574239] ? copy_mnt_ns+0xa30/0xa30 [ 420.578125] ? copy_mount_options+0x1fa/0x2f0 [ 420.582617] ? copy_mnt_ns+0xa30/0xa30 [ 420.586490] SyS_mount+0xa8/0x120 [ 420.589920] ? copy_mnt_ns+0xa30/0xa30 [ 420.593885] do_syscall_64+0x1d5/0x640 [ 420.597757] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 420.602980] RIP: 0033:0x46090a [ 420.606147] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 420.613871] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 420.621135] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 420.628382] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 420.635632] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 420.642888] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 420.678969] BTRFS info (device loop5): turning off barriers [ 420.688826] BTRFS info (device loop5): unrecognized mount option 'fragment=all' 06:06:50 executing program 5 (fault-call:0 fault-nth:72): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100)='ethtool\x00') ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000300)={'ip_vti0\x00', &(0x7f00000002c0)={'gre0\x00', 0x0, 0x87, 0x40, 0x3ff, 0x1, {{0x6, 0x4, 0x3, 0x8, 0x18, 0x68, 0x0, 0xff, 0x2f, 0x0, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@end]}}}}}) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000000000000000000ff01", @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb, 0x1, 'clsact\x00'}]}, 0x30}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000054c0)=@delchain={0x24, 0x2e, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r8, {}, {0xfff2, 0xffff}}}, 0x24}}, 0x0) sendmsg$IPSET_CMD_SAVE(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x30, 0x8, 0x6, 0x101, 0x0, 0x0, {0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x40010) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xec, r3, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @ETHTOOL_A_LINKMODES_OURS={0xb4, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xa8, 0x4, "effbeacede2b3d42c129e3c0c8cdfeae413a9300f1a2251748ba2b118b7fe13ce5b887d6f361ca11dea73fe014b31c96befe4b2aea6ac15d0624d4602ab07af83878f3c8cb555096e5a1ddeafcdcb57bf98f847e5fd3feb32d410afae0d5fb808c3af44dde27afe9f5130113d909b685a81ee96d007a7ad1d3bf8d159cee3dfb62fcb09501054b62e23067d31291ce3504636c7bc3fffe8574aab576d73c7892dad49092"}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0xc0}]}, 0xec}, 0x1, 0x0, 0x0, 0x80}, 0x4080) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:50 executing program 1: 06:06:50 executing program 3: 06:06:50 executing program 0: 06:06:50 executing program 2: [ 420.732839] BTRFS error (device loop5): open_ctree failed 06:06:50 executing program 0: 06:06:50 executing program 3: 06:06:50 executing program 2: 06:06:50 executing program 1: [ 420.824428] FAULT_INJECTION: forcing a failure. [ 420.824428] name failslab, interval 1, probability 0, space 0, times 0 [ 420.843284] CPU: 0 PID: 4988 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 420.851104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 420.860455] Call Trace: [ 420.863043] dump_stack+0x1b2/0x283 [ 420.866675] should_fail.cold+0x10a/0x154 [ 420.870825] should_failslab+0xd6/0x130 [ 420.874797] kmem_cache_alloc_trace+0x29a/0x3d0 [ 420.879464] btrfs_mount+0x988/0x1fe0 [ 420.883265] ? lock_downgrade+0x740/0x740 [ 420.887610] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 420.893594] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 420.899038] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 420.904051] ? __lockdep_init_map+0x100/0x560 [ 420.908543] ? __lockdep_init_map+0x100/0x560 [ 420.913054] mount_fs+0x92/0x2a0 [ 420.916426] vfs_kern_mount.part.0+0x5b/0x470 [ 420.920931] vfs_kern_mount+0x3c/0x60 [ 420.924730] btrfs_mount+0x42a/0x1fe0 [ 420.928539] ? lock_downgrade+0x740/0x740 [ 420.932717] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 420.938696] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 420.944146] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 420.949242] ? __lockdep_init_map+0x100/0x560 [ 420.953743] ? __lockdep_init_map+0x100/0x560 [ 420.958237] mount_fs+0x92/0x2a0 [ 420.961604] vfs_kern_mount.part.0+0x5b/0x470 [ 420.966102] do_mount+0xe53/0x2a00 [ 420.967215] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 420.969638] ? do_raw_spin_unlock+0x164/0x220 [ 420.969653] ? copy_mount_string+0x40/0x40 [ 420.986917] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 420.991933] ? copy_mnt_ns+0xa30/0xa30 [ 420.995831] ? copy_mount_options+0x1fa/0x2f0 [ 421.000327] ? copy_mnt_ns+0xa30/0xa30 [ 421.004216] SyS_mount+0xa8/0x120 [ 421.007757] ? copy_mnt_ns+0xa30/0xa30 [ 421.011645] do_syscall_64+0x1d5/0x640 [ 421.015534] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 421.020715] RIP: 0033:0x46090a 06:06:50 executing program 0: [ 421.023910] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 421.031613] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 421.038877] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 421.046146] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 421.053415] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 421.060696] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:50 executing program 5 (fault-call:0 fault-nth:73): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r2, 0x8008f513, &(0x7f00000000c0)) r3 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000140)='NLBL_MGMT\x00') r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$clear(0x7, r4) sendmsg$NLBL_MGMT_C_REMOVEDEF(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r3, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_MGMT_A_DOMAIN={0x7, 0x1, 'syz'}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0xffffffffffffffff}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}, 0x38}, 0x1, 0x0, 0x0, 0x40}, 0xc800) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r2, 0x89f7, &(0x7f00000002c0)={'syztnl1\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x29, 0x7, 0x1, 0x2, 0x0, @remote, @rand_addr=' \x01\x00', 0x10, 0x8000, 0x7}}) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000300)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', r5}, 0x14) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) [ 421.072380] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 06:06:50 executing program 3: 06:06:50 executing program 1: 06:06:50 executing program 2: 06:06:50 executing program 0: [ 421.257504] FAULT_INJECTION: forcing a failure. [ 421.257504] name failslab, interval 1, probability 0, space 0, times 0 [ 421.268721] CPU: 1 PID: 5019 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 421.276543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.285895] Call Trace: [ 421.288574] dump_stack+0x1b2/0x283 [ 421.292205] should_fail.cold+0x10a/0x154 [ 421.296356] should_failslab+0xd6/0x130 [ 421.300330] kmem_cache_alloc+0x40/0x3c0 [ 421.304568] radix_tree_node_alloc.constprop.0+0x1b0/0x2f0 [ 421.310186] __radix_tree_create+0x323/0x4b0 [ 421.314579] page_cache_tree_insert+0x98/0x2a0 [ 421.319143] ? file_check_and_advance_wb_err+0x370/0x370 [ 421.324657] ? __add_to_page_cache_locked+0x1ed/0x840 [ 421.329827] __add_to_page_cache_locked+0x1fd/0x840 [ 421.334837] ? page_cache_tree_insert+0x2a0/0x2a0 [ 421.339669] ? lock_downgrade+0x740/0x740 [ 421.343793] add_to_page_cache_lru+0xcf/0x2b0 [ 421.348274] ? add_to_page_cache_locked+0x40/0x40 [ 421.353094] ? alloc_pages_current+0x15d/0x260 [ 421.357653] pagecache_get_page+0x300/0xab0 [ 421.361953] __getblk_slow+0x1dd/0x7a0 [ 421.365820] __bread_gfp+0x206/0x2e0 [ 421.369568] btrfs_read_dev_super+0x79/0x1f0 [ 421.373953] btrfs_get_bdev_and_sb+0xd3/0x2c0 [ 421.378426] __btrfs_open_devices+0x172/0xa30 [ 421.382912] ? find_device+0xf0/0xf0 [ 421.386602] ? btrfs_mount+0x9ee/0x1fe0 [ 421.390551] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 421.395977] btrfs_open_devices+0x98/0xb0 [ 421.400098] btrfs_mount+0xb24/0x1fe0 [ 421.403889] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 421.409838] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 421.415262] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 421.420252] ? __lockdep_init_map+0x100/0x560 [ 421.424728] ? __lockdep_init_map+0x100/0x560 [ 421.429211] mount_fs+0x92/0x2a0 [ 421.432557] vfs_kern_mount.part.0+0x5b/0x470 [ 421.437028] vfs_kern_mount+0x3c/0x60 [ 421.440815] btrfs_mount+0x42a/0x1fe0 [ 421.444605] ? lock_downgrade+0x740/0x740 [ 421.448730] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 421.454691] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 421.460129] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 421.465120] ? __lockdep_init_map+0x100/0x560 [ 421.469588] ? __lockdep_init_map+0x100/0x560 [ 421.474060] mount_fs+0x92/0x2a0 [ 421.477417] vfs_kern_mount.part.0+0x5b/0x470 [ 421.481890] do_mount+0xe53/0x2a00 [ 421.485409] ? copy_mount_string+0x40/0x40 [ 421.489616] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 421.494610] ? copy_mnt_ns+0xa30/0xa30 [ 421.498475] ? copy_mount_options+0x1fa/0x2f0 [ 421.502942] ? copy_mnt_ns+0xa30/0xa30 [ 421.506818] SyS_mount+0xa8/0x120 [ 421.510243] ? copy_mnt_ns+0xa30/0xa30 [ 421.514106] do_syscall_64+0x1d5/0x640 [ 421.517986] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 421.523150] RIP: 0033:0x46090a [ 421.526314] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 421.534006] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 421.541260] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 421.548515] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 06:06:50 executing program 3: 06:06:50 executing program 2: 06:06:50 executing program 3: 06:06:50 executing program 1: [ 421.555771] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 421.563015] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:50 executing program 0: 06:06:50 executing program 2: [ 421.708248] BTRFS info (device loop5): turning off barriers [ 421.721828] BTRFS info (device loop5): unrecognized mount option 'fragment=all' 06:06:51 executing program 5 (fault-call:0 fault-nth:74): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:51 executing program 3: 06:06:51 executing program 1: 06:06:51 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r5 = dup(r4) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@access_user='access=user'}], [], 0x6b}}) ioctl$SNDRV_TIMER_IOCTL_INFO(r5, 0x80e85411, &(0x7f00000001c0)=""/209) ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f0000000180)=@get={0x1, &(0x7f0000000100)=""/89, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x200, 0x444001) 06:06:51 executing program 0: 06:06:51 executing program 2: [ 421.762773] BTRFS error (device loop5): open_ctree failed 06:06:51 executing program 3: 06:06:51 executing program 2: 06:06:51 executing program 1: 06:06:51 executing program 0: [ 421.867947] FAULT_INJECTION: forcing a failure. [ 421.867947] name failslab, interval 1, probability 0, space 0, times 0 06:06:51 executing program 1: 06:06:51 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x11, &(0x7f00000000c0)=0x346a595b, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) r3 = dup3(r1, r0, 0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)={0x5c, r5, 0x917, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @mcast2={0xff, 0x5}}]}, 0x5c}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r5, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4010}, 0x40010) [ 421.951248] CPU: 0 PID: 5063 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 421.959077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.968429] Call Trace: [ 421.971157] dump_stack+0x1b2/0x283 [ 421.974793] should_fail.cold+0x10a/0x154 [ 421.978947] should_failslab+0xd6/0x130 [ 421.982929] kmem_cache_alloc+0x28e/0x3c0 [ 421.987077] getname_kernel+0x4e/0x340 [ 421.991117] kern_path+0x1b/0x40 [ 421.994485] lookup_bdev+0xc6/0x1c0 [ 421.998111] ? bd_acquire+0x440/0x440 [ 422.001912] blkdev_get_by_path+0x1b/0xa0 [ 422.006061] btrfs_get_bdev_and_sb+0x2f/0x2c0 [ 422.010563] __btrfs_open_devices+0x172/0xa30 [ 422.015061] ? find_device+0xf0/0xf0 [ 422.018776] ? btrfs_mount+0x9ee/0x1fe0 [ 422.022747] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 422.028197] btrfs_open_devices+0x98/0xb0 [ 422.032341] btrfs_mount+0xb24/0x1fe0 [ 422.036141] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 422.042121] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 422.047571] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 422.052588] ? __lockdep_init_map+0x100/0x560 [ 422.057080] ? __lockdep_init_map+0x100/0x560 [ 422.061577] mount_fs+0x92/0x2a0 [ 422.064945] vfs_kern_mount.part.0+0x5b/0x470 [ 422.069551] vfs_kern_mount+0x3c/0x60 [ 422.073331] btrfs_mount+0x42a/0x1fe0 [ 422.077125] ? lock_downgrade+0x740/0x740 [ 422.081297] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 422.087253] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 422.092865] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 422.097861] ? __lockdep_init_map+0x100/0x560 [ 422.102335] ? __lockdep_init_map+0x100/0x560 [ 422.106890] mount_fs+0x92/0x2a0 [ 422.110240] vfs_kern_mount.part.0+0x5b/0x470 [ 422.114714] do_mount+0xe53/0x2a00 [ 422.118234] ? copy_mount_string+0x40/0x40 [ 422.122444] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 422.127476] ? copy_mnt_ns+0xa30/0xa30 [ 422.131350] ? copy_mount_options+0x1fa/0x2f0 [ 422.135841] ? copy_mnt_ns+0xa30/0xa30 [ 422.139703] SyS_mount+0xa8/0x120 [ 422.143139] ? copy_mnt_ns+0xa30/0xa30 [ 422.147018] do_syscall_64+0x1d5/0x640 [ 422.150893] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 422.156069] RIP: 0033:0x46090a [ 422.159249] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 422.166935] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 422.174182] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 422.181437] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 422.188682] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 422.195926] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:51 executing program 5 (fault-call:0 fault-nth:75): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:51 executing program 1: 06:06:51 executing program 0: 06:06:51 executing program 2: 06:06:51 executing program 3: 06:06:51 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) timer_create(0x5, &(0x7f00000000c0)={0x0, 0x6}, &(0x7f0000000100)=0x0) timer_delete(r1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) setsockopt$netrom_NETROM_T4(r3, 0x103, 0x6, &(0x7f00000007c0)=0x8001, 0x4) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) write$cgroup_netprio_ifpriomap(r3, &(0x7f0000000140)={'veth0_to_hsr', 0x32, 0x34}, 0xf) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r3, &(0x7f0000000780)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000740)={&(0x7f00000001c0)={0x56c, 0x0, 0x100, 0x70bd25, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@fils_params=[@NL80211_ATTR_FILS_ERP_USERNAME={0xa, 0xf9, "499694c39aa5"}, @NL80211_ATTR_FILS_ERP_REALM={0x8f, 0xfa, "426fd7fafe478da4cf5e8831bc23f1de70faac37745a5fbaa5e424d91ec91a899e05d0752b26855283685f3149067d14967c3b114b15feab6444e2921b3884e01bbfd16f8c8f94efaabc12ed8907cd4a739c5227a62bace78458260c16a76afa527ca4e6b0f323e5dc5d539ef8ec9438cba7adc81e4d5aa93954554088c7345a30ce6ea7b7aefa773c80fb"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x8}], @fils_params=[@NL80211_ATTR_FILS_ERP_REALM={0x41, 0xfa, "1fd92c6f646c6cf33080a0a1ebe73fdca6a0e78c24f875124ca172332c97468f6383f27fa3a1a6bed1d550c7e8ac02e67746c2778e11ad7fae75b04d0b"}], @NL80211_ATTR_IE={0x21, 0x2a, [@rann={0x7e, 0x15, {{0x0, 0x4b}, 0x20, 0x1f, @broadcast, 0x2f, 0x2, 0xfffffffc}}, @chsw_timing={0x68, 0x4, {0x3, 0x5}}]}, @NL80211_ATTR_IE={0x106, 0x2a, [@erp={0x2a, 0x1, {0x1, 0x1}}, @random_vendor={0xdd, 0xa4, "74d9514525e4eba8ca27f94022892ce722fa4816e3e35050cc4e0122bd8cabba8da0f2e73386b0b71b9c0fc90c92ccf1ca22311c488840f6229a2f20ff894fb95ca5e795a4ec139f52cac5ba321401162ba6578ede2870aab15a70a3056dc1f4471a7e380e4342c6d91a9c3286a0ed4a93a0e1ddbbc5fa8304388bd7689d0d0b9a899281dabf2b41f060c539861ad10d742bc2ad0ae3605297af7e15bb39d0bec65f1129"}, @channel_switch={0x25, 0x3, {0x0, 0x9d, 0x3}}, @preq={0x82, 0x2b, @ext={{0x0, 0x1, 0x1}, 0xf5, 0xaf, 0xe, @device_b, 0x9, @broadcast, 0x8001, 0x80000, 0x1, [{{0x0, 0x0, 0x1}, @device_b, 0x6}]}}, @ssid={0x0, 0x20, @random="ceca962407116bb75853d582e6889ee4d3105a78e11b00bfd9b83de76bda92d3"}, @channel_switch={0x25, 0x3, {0x1, 0x3, 0xff}}]}, @fils_params=[@NL80211_ATTR_FILS_ERP_USERNAME={0xb, 0xf9, "d959969980b94e"}, @NL80211_ATTR_FILS_ERP_REALM={0x98, 0xfa, "db5873e3af7301890c6fc3b62d28f1cf96305d3b8668ae0fb6bf282eeebf48d7acb45082c0a0ac5e61cb297cc7a6f4da6ea1133081393d5cf4ca45ccc7ce77d5ddfe0fc9b9f31fe2b88df167963c43dd6a20370df4f35188164b03cff48a63572bddd9872b6700b4676929ad35471fb2e4186229bc1f65655386169df7ee58adc953589f13fa33926bf3ef2390f1599733349988"}], @fils_params, @fils_params=[@NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6}, @NL80211_ATTR_FILS_ERP_REALM={0x3f, 0xfa, "21336fbd6314b817bb415cbee804ac1bf8523006fbd895c14389890b59f1c914442c37c5630fe78b75743f1a78a216f4d8e6e1a55cecfdbb61bcdb"}, @NL80211_ATTR_FILS_ERP_USERNAME={0x4}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x1}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6}], @NL80211_ATTR_IE={0x3a, 0x2a, [@peer_mgmt={0x75, 0x4, {0x1, 0x4da, @void, @void, @void}}, @ssid={0x0, 0x12, @random="f21f5d445d81b0c5f39a1078fb3cc16b9438"}, @channel_switch={0x25, 0x3, {0x0, 0xb8, 0x7f}}, @rann={0x7e, 0x15, {{0x1, 0x8}, 0x20, 0x3f, @broadcast, 0x0, 0xdef, 0x334}}]}, @fils_params=[@NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x40}, @NL80211_ATTR_FILS_ERP_REALM={0x9, 0xfa, "acbc5c0042"}, @NL80211_ATTR_FILS_ERP_REALM={0x34, 0xfa, "7a3016666064399d8db56d2b1f3014f1b7921d4d05a6fdb18914275cac909ac8a4e2376eb514487f4d4ad455bf50029b"}, @NL80211_ATTR_FILS_ERP_RRK={0x94, 0xfc, "2d917457195713e297c4096d10c486fd43e44318432fe6f1fc11cb788c28ff5421f3917e84fc315ec104ddfa70e9304429bd16a7d0dcd99278651a803740b966df6fb4671cd2464a64d809b49c61dfa3c926f6f02473051d4b1dc0cfb7ee9a7745e027a81bc04bd34d9b56e10cab5d44af3713835d626b2292a46dd7c69b5ba08939a5538f8dca2224f5709d81f1dac7"}, @NL80211_ATTR_FILS_ERP_USERNAME={0x7, 0xf9, "3d1181"}], @NL80211_ATTR_IE={0x11c, 0x2a, [@link_id={0x65, 0x12, {@initial, @device_a, @device_b}}, @gcr_ga={0xbd, 0x6}, @random={0x1, 0x21, "b5e8aa019f8f6daa6cca26a6bbae1c5f6e7ba44804ed2773967c2a52f24cb587e6"}, @random_vendor={0xdd, 0xa9, "66e448681905582e252f1a57597f45425e92b66d57ce21b2545bf9994e3aa05f2b2ca11afd1fd0bf10f5e07c4834b5b4fd03f498214e72454f003daf92f6c7dd2ff50bd1f072d2c169639af87777af0c325377e356a8fead25b1851b88100bcbc2ff4a848e8012dec66b4f804bf0866533f091a934a7763e20446682d8c1e56d18aadc0ba76293c0f652a9b80d532eb68883eca8c191ffe93090b06c1ec7084e77ac498fae57312541"}, @random={0x4, 0x2c, "c1359e26c8fbabfa2e7a0b62a1627ba7c0c6227cad91011bfc0b6d9deacd92a2ee349128e0919ee6a7a38601"}]}]}, 0x56c}, 0x1, 0x0, 0x0, 0x4040000}, 0x4004400) 06:06:51 executing program 2: 06:06:51 executing program 0: 06:06:51 executing program 1: 06:06:51 executing program 3: [ 422.342328] FAULT_INJECTION: forcing a failure. [ 422.342328] name failslab, interval 1, probability 0, space 0, times 0 06:06:51 executing program 1: [ 422.389918] CPU: 1 PID: 5102 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 422.397749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 422.407105] Call Trace: [ 422.409693] dump_stack+0x1b2/0x283 [ 422.413356] should_fail.cold+0x10a/0x154 [ 422.417533] should_failslab+0xd6/0x130 [ 422.421513] kmem_cache_alloc_trace+0x29a/0x3d0 [ 422.426266] ? dlm_send_remote_unlock_request.constprop.0.cold+0x1d/0x1d [ 422.433119] sget_userns+0x102/0xc10 06:06:51 executing program 1: [ 422.436880] ? dlm_send_remote_unlock_request.constprop.0.cold+0x1d/0x1d [ 422.443726] ? btrfs_kill_super+0x540/0x540 [ 422.448055] ? dlm_send_remote_unlock_request.constprop.0.cold+0x1d/0x1d [ 422.454893] ? btrfs_kill_super+0x540/0x540 [ 422.459239] sget+0xd1/0x110 [ 422.462264] btrfs_mount+0xbbe/0x1fe0 [ 422.466075] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 422.472065] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 422.477517] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 422.482534] ? __lockdep_init_map+0x100/0x560 [ 422.487031] ? __lockdep_init_map+0x100/0x560 [ 422.491628] mount_fs+0x92/0x2a0 [ 422.495000] vfs_kern_mount.part.0+0x5b/0x470 [ 422.499495] vfs_kern_mount+0x3c/0x60 [ 422.503318] btrfs_mount+0x42a/0x1fe0 [ 422.507122] ? lock_downgrade+0x740/0x740 [ 422.511283] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 422.517383] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 422.522837] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 422.527855] ? __lockdep_init_map+0x100/0x560 [ 422.532348] ? __lockdep_init_map+0x100/0x560 [ 422.536846] mount_fs+0x92/0x2a0 [ 422.540226] vfs_kern_mount.part.0+0x5b/0x470 [ 422.544754] do_mount+0xe53/0x2a00 [ 422.548300] ? copy_mount_string+0x40/0x40 [ 422.552531] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 422.557557] ? copy_mnt_ns+0xa30/0xa30 [ 422.561444] ? copy_mount_options+0x1fa/0x2f0 [ 422.565944] ? copy_mnt_ns+0xa30/0xa30 [ 422.569834] SyS_mount+0xa8/0x120 [ 422.573282] ? copy_mnt_ns+0xa30/0xa30 [ 422.577171] do_syscall_64+0x1d5/0x640 [ 422.581066] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 422.586256] RIP: 0033:0x46090a [ 422.589438] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 422.597140] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 422.604407] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 422.611674] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 422.618954] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 422.626586] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:51 executing program 5 (fault-call:0 fault-nth:76): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:51 executing program 1: 06:06:51 executing program 3: 06:06:51 executing program 2: 06:06:51 executing program 0: 06:06:51 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000100)={'ip6gre0\x00', 0x0, 0x2d, 0x9b, 0x9, 0x2, 0x0, @local, @empty, 0x20, 0x80, 0xca75, 0x4}}) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000000000000000000ff01", @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x44801) sendmsg$nl_route_sched(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3000000024001d0f00"/20, @ANYRES32=r7, @ANYBLOB="0000000000000b42721cbb2a55971130371f28a3000100636c736163740000"], 0x30}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB="300000003200000427bd7000fcdbdf25d400009d2d1d625478d300", @ANYRES32=r3, @ANYBLOB="2800000000900000050027000000000008000a00", @ANYRES32=0x0, @ANYBLOB="e6e30d410c6abff0bcd6c1a878f9c9d0e644f5815136303559964b204f7c8a06a5973584e5d4c2e75ac1943092cfb9f0cb318816a9a28a880f8b26314784945f16b46a3fad94114438f34665c36d1b574f8d168d6eedb15b39bf69b627d055b2c3df76fd7fa8f06ca92d5ab04a5a3ea5be"], 0x30}, 0x1, 0x0, 0x0, 0x4094}, 0x1) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:52 executing program 3: 06:06:52 executing program 0: 06:06:52 executing program 3: 06:06:52 executing program 0: [ 422.761677] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 06:06:52 executing program 2: 06:06:52 executing program 1: [ 422.809019] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 422.820112] FAULT_INJECTION: forcing a failure. [ 422.820112] name failslab, interval 1, probability 0, space 0, times 0 [ 422.875141] CPU: 0 PID: 5135 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 422.882968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 422.892316] Call Trace: [ 422.894906] dump_stack+0x1b2/0x283 [ 422.898539] should_fail.cold+0x10a/0x154 [ 422.902693] ? mempool_free+0x1d0/0x1d0 [ 422.906664] should_failslab+0xd6/0x130 [ 422.910638] kmem_cache_alloc+0x40/0x3c0 [ 422.914698] ? mempool_free+0x1d0/0x1d0 [ 422.918669] mempool_alloc+0x10e/0x2d0 [ 422.922558] ? remove_element.isra.0+0x1b0/0x1b0 [ 422.927318] ? mark_held_locks+0xa6/0xf0 [ 422.931376] ? __find_get_block+0x817/0xc40 [ 422.935708] bio_alloc_bioset+0x41b/0x830 [ 422.939856] ? bvec_alloc+0x2d0/0x2d0 [ 422.943654] ? __getblk_slow+0x57f/0x7a0 [ 422.947718] submit_bh_wbc+0xf5/0x6f0 [ 422.951523] __bread_gfp+0x11c/0x2e0 [ 422.955240] btrfs_read_dev_super+0x79/0x1f0 [ 422.960349] btrfs_get_bdev_and_sb+0xd3/0x2c0 [ 422.964848] __btrfs_open_devices+0x172/0xa30 [ 422.969357] ? find_device+0xf0/0xf0 [ 422.973070] ? btrfs_mount+0x9ee/0x1fe0 [ 422.977037] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 422.982477] btrfs_open_devices+0x98/0xb0 [ 422.986614] btrfs_mount+0xb24/0x1fe0 [ 422.990410] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 422.996498] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 423.001927] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 423.006925] ? __lockdep_init_map+0x100/0x560 [ 423.011412] ? __lockdep_init_map+0x100/0x560 [ 423.015906] mount_fs+0x92/0x2a0 [ 423.019256] vfs_kern_mount.part.0+0x5b/0x470 [ 423.023741] vfs_kern_mount+0x3c/0x60 [ 423.027702] btrfs_mount+0x42a/0x1fe0 [ 423.031482] ? lock_downgrade+0x740/0x740 [ 423.035627] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 423.041582] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 423.047011] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 423.052005] ? __lockdep_init_map+0x100/0x560 [ 423.056494] ? __lockdep_init_map+0x100/0x560 [ 423.060982] mount_fs+0x92/0x2a0 [ 423.064336] vfs_kern_mount.part.0+0x5b/0x470 [ 423.068813] do_mount+0xe53/0x2a00 [ 423.072334] ? copy_mount_string+0x40/0x40 [ 423.076547] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 423.081544] ? copy_mnt_ns+0xa30/0xa30 [ 423.085427] ? copy_mount_options+0x1fa/0x2f0 [ 423.089896] ? copy_mnt_ns+0xa30/0xa30 [ 423.093775] SyS_mount+0xa8/0x120 [ 423.097222] ? copy_mnt_ns+0xa30/0xa30 [ 423.101090] do_syscall_64+0x1d5/0x640 [ 423.104962] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 423.110127] RIP: 0033:0x46090a [ 423.113298] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 423.120990] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 423.128238] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 423.135491] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 423.142748] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 423.150001] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 423.180253] BTRFS info (device loop5): turning off barriers [ 423.191626] BTRFS info (device loop5): unrecognized mount option 'fragment=all' [ 423.213158] BTRFS error (device loop5): open_ctree failed 06:06:52 executing program 5 (fault-call:0 fault-nth:77): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:52 executing program 3: 06:06:52 executing program 4: r0 = socket$inet_tcp(0x2, 0x3, 0x6) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x842, 0x0) ioctl$KVM_CHECK_EXTENSION(r3, 0xae03, 0x7fffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0x14) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) 06:06:52 executing program 1: 06:06:52 executing program 0: 06:06:52 executing program 2: 06:06:52 executing program 3: 06:06:52 executing program 1: 06:06:52 executing program 0: 06:06:52 executing program 2: 06:06:52 executing program 4: 06:06:52 executing program 2: [ 423.336729] print_req_error: 34 callbacks suppressed [ 423.336735] print_req_error: I/O error, dev loop5, sector 0 [ 423.356225] FAULT_INJECTION: forcing a failure. [ 423.356225] name failslab, interval 1, probability 0, space 0, times 0 [ 423.427530] CPU: 1 PID: 5171 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 423.435355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 423.444708] Call Trace: [ 423.447298] dump_stack+0x1b2/0x283 [ 423.450931] should_fail.cold+0x10a/0x154 [ 423.455085] should_failslab+0xd6/0x130 [ 423.459062] __kmalloc+0x2c1/0x400 [ 423.462617] ? __list_lru_init+0x67/0x710 [ 423.466766] __list_lru_init+0x67/0x710 [ 423.470743] sget_userns+0x504/0xc10 [ 423.474457] ? dlm_send_remote_unlock_request.constprop.0.cold+0x1d/0x1d [ 423.481299] ? btrfs_kill_super+0x540/0x540 [ 423.485621] ? dlm_send_remote_unlock_request.constprop.0.cold+0x1d/0x1d [ 423.492459] ? btrfs_kill_super+0x540/0x540 [ 423.496777] sget+0xd1/0x110 [ 423.499796] btrfs_mount+0xbbe/0x1fe0 [ 423.503598] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 423.509566] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 423.515006] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 423.520000] ? __lockdep_init_map+0x100/0x560 [ 423.524472] ? __lockdep_init_map+0x100/0x560 [ 423.528947] mount_fs+0x92/0x2a0 [ 423.532297] vfs_kern_mount.part.0+0x5b/0x470 [ 423.536773] vfs_kern_mount+0x3c/0x60 [ 423.540552] btrfs_mount+0x42a/0x1fe0 [ 423.544332] ? lock_downgrade+0x740/0x740 [ 423.548459] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 423.554429] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 423.559878] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 423.564873] ? __lockdep_init_map+0x100/0x560 [ 423.569354] ? __lockdep_init_map+0x100/0x560 [ 423.573829] mount_fs+0x92/0x2a0 [ 423.577177] vfs_kern_mount.part.0+0x5b/0x470 [ 423.581651] do_mount+0xe53/0x2a00 [ 423.585178] ? do_raw_spin_unlock+0x164/0x220 [ 423.589661] ? copy_mount_string+0x40/0x40 [ 423.593877] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 423.598870] ? copy_mnt_ns+0xa30/0xa30 [ 423.602736] ? copy_mount_options+0x1fa/0x2f0 [ 423.607208] ? copy_mnt_ns+0xa30/0xa30 [ 423.611072] SyS_mount+0xa8/0x120 [ 423.614502] ? copy_mnt_ns+0xa30/0xa30 [ 423.618366] do_syscall_64+0x1d5/0x640 [ 423.622232] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 423.627425] RIP: 0033:0x46090a [ 423.630598] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 423.638280] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 423.645526] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 423.652786] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 423.660047] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 423.667293] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:53 executing program 5 (fault-call:0 fault-nth:78): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:53 executing program 3: 06:06:53 executing program 0: 06:06:53 executing program 1: 06:06:53 executing program 4: 06:06:53 executing program 2: 06:06:53 executing program 1: 06:06:53 executing program 2: 06:06:53 executing program 4: 06:06:53 executing program 3: 06:06:53 executing program 0: 06:06:53 executing program 2: [ 423.891378] FAULT_INJECTION: forcing a failure. [ 423.891378] name failslab, interval 1, probability 0, space 0, times 0 [ 423.952245] CPU: 1 PID: 5204 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 423.960072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 423.969423] Call Trace: [ 423.972018] dump_stack+0x1b2/0x283 [ 423.975655] should_fail.cold+0x10a/0x154 [ 423.979816] should_failslab+0xd6/0x130 [ 423.983789] __kmalloc+0x2c1/0x400 [ 423.987347] ? __list_lru_init+0x67/0x710 [ 423.991606] __list_lru_init+0x67/0x710 [ 423.995582] sget_userns+0x4e4/0xc10 [ 423.999421] ? dlm_send_remote_unlock_request.constprop.0.cold+0x1d/0x1d [ 424.006261] ? btrfs_kill_super+0x540/0x540 [ 424.010589] ? dlm_send_remote_unlock_request.constprop.0.cold+0x1d/0x1d [ 424.017427] ? btrfs_kill_super+0x540/0x540 [ 424.021743] sget+0xd1/0x110 [ 424.024761] btrfs_mount+0xbbe/0x1fe0 [ 424.028652] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 424.034607] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 424.040031] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 424.045022] ? __lockdep_init_map+0x100/0x560 [ 424.049493] ? __lockdep_init_map+0x100/0x560 [ 424.053965] mount_fs+0x92/0x2a0 [ 424.057310] vfs_kern_mount.part.0+0x5b/0x470 [ 424.061779] vfs_kern_mount+0x3c/0x60 [ 424.065557] btrfs_mount+0x42a/0x1fe0 [ 424.069356] ? lock_downgrade+0x740/0x740 [ 424.073484] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 424.079436] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 424.084872] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 424.089869] ? __lockdep_init_map+0x100/0x560 [ 424.094353] ? __lockdep_init_map+0x100/0x560 [ 424.098827] mount_fs+0x92/0x2a0 [ 424.102176] vfs_kern_mount.part.0+0x5b/0x470 [ 424.106649] do_mount+0xe53/0x2a00 [ 424.110180] ? copy_mount_string+0x40/0x40 [ 424.114390] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 424.119379] ? copy_mnt_ns+0xa30/0xa30 [ 424.123243] ? copy_mount_options+0x1fa/0x2f0 [ 424.127722] ? copy_mnt_ns+0xa30/0xa30 [ 424.131594] SyS_mount+0xa8/0x120 [ 424.135023] ? copy_mnt_ns+0xa30/0xa30 [ 424.138887] do_syscall_64+0x1d5/0x640 [ 424.142754] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 424.147917] RIP: 0033:0x46090a [ 424.151079] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 424.158933] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 424.166190] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 424.173436] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 424.180690] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 424.187983] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:53 executing program 5 (fault-call:0 fault-nth:79): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:53 executing program 3: 06:06:53 executing program 0: 06:06:53 executing program 1: 06:06:53 executing program 4: 06:06:53 executing program 2: 06:06:53 executing program 0: 06:06:53 executing program 1: 06:06:53 executing program 2: 06:06:53 executing program 4: 06:06:53 executing program 3: 06:06:53 executing program 0: [ 424.376038] FAULT_INJECTION: forcing a failure. [ 424.376038] name failslab, interval 1, probability 0, space 0, times 0 [ 424.432473] CPU: 1 PID: 5237 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 424.440297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 424.449647] Call Trace: [ 424.452239] dump_stack+0x1b2/0x283 [ 424.455871] should_fail.cold+0x10a/0x154 [ 424.460013] should_failslab+0xd6/0x130 [ 424.463978] __kmalloc+0x2c1/0x400 [ 424.467525] ? __list_lru_init+0x67/0x710 [ 424.471681] __list_lru_init+0x67/0x710 [ 424.475660] sget_userns+0x504/0xc10 [ 424.479382] ? dlm_send_remote_unlock_request.constprop.0.cold+0x1d/0x1d [ 424.486224] ? btrfs_kill_super+0x540/0x540 [ 424.490548] ? dlm_send_remote_unlock_request.constprop.0.cold+0x1d/0x1d [ 424.497384] ? btrfs_kill_super+0x540/0x540 [ 424.501702] sget+0xd1/0x110 [ 424.504723] btrfs_mount+0xbbe/0x1fe0 [ 424.508526] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 424.514507] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 424.519958] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 424.524972] ? __lockdep_init_map+0x100/0x560 [ 424.529552] ? __lockdep_init_map+0x100/0x560 [ 424.534044] mount_fs+0x92/0x2a0 [ 424.537441] vfs_kern_mount.part.0+0x5b/0x470 [ 424.541935] vfs_kern_mount+0x3c/0x60 [ 424.545726] btrfs_mount+0x42a/0x1fe0 [ 424.549505] ? lock_downgrade+0x740/0x740 [ 424.553631] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 424.559582] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 424.565098] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 424.570139] ? __lockdep_init_map+0x100/0x560 [ 424.574611] ? __lockdep_init_map+0x100/0x560 [ 424.579082] mount_fs+0x92/0x2a0 [ 424.582430] vfs_kern_mount.part.0+0x5b/0x470 [ 424.586905] do_mount+0xe53/0x2a00 [ 424.590427] ? copy_mount_string+0x40/0x40 [ 424.594640] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 424.599676] ? copy_mnt_ns+0xa30/0xa30 [ 424.603542] ? copy_mount_options+0x1fa/0x2f0 [ 424.608014] ? copy_mnt_ns+0xa30/0xa30 [ 424.611880] SyS_mount+0xa8/0x120 [ 424.615311] ? copy_mnt_ns+0xa30/0xa30 [ 424.619177] do_syscall_64+0x1d5/0x640 [ 424.623045] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 424.628250] RIP: 0033:0x46090a [ 424.631469] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 424.639162] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 424.646418] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 424.653674] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 424.661018] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 424.668266] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 06:06:54 executing program 5 (fault-call:0 fault-nth:80): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x12b, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}], 0x0, &(0x7f0000000080)={[{@nobarrier='nobarrier'}, {@space_cache_v1='space_cache=v1'}, {@fragment_all='fragment=all'}]}) 06:06:54 executing program 2: 06:06:54 executing program 1: 06:06:54 executing program 4: 06:06:54 executing program 3: 06:06:54 executing program 0: 06:06:54 executing program 4: 06:06:54 executing program 2: 06:06:54 executing program 0: 06:06:54 executing program 3: 06:06:54 executing program 1: 06:06:54 executing program 4: [ 424.870342] FAULT_INJECTION: forcing a failure. [ 424.870342] name failslab, interval 1, probability 0, space 0, times 0 [ 424.923773] CPU: 0 PID: 5263 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 424.931599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 424.940951] Call Trace: [ 424.943540] dump_stack+0x1b2/0x283 [ 424.947177] should_fail.cold+0x10a/0x154 [ 424.951328] should_failslab+0xd6/0x130 [ 424.955299] __kmalloc+0x2c1/0x400 [ 424.958838] ? register_shrinker+0x1ab/0x220 [ 424.963258] register_shrinker+0x1ab/0x220 [ 424.967489] sget_userns+0x9aa/0xc10 [ 424.971207] ? dlm_send_remote_unlock_request.constprop.0.cold+0x1d/0x1d [ 424.978061] ? btrfs_kill_super+0x540/0x540 [ 424.982560] ? dlm_send_remote_unlock_request.constprop.0.cold+0x1d/0x1d [ 424.989396] ? btrfs_kill_super+0x540/0x540 [ 424.993713] sget+0xd1/0x110 [ 424.996728] btrfs_mount+0xbbe/0x1fe0 [ 425.000530] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 425.006510] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 425.011958] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 425.016975] ? __lockdep_init_map+0x100/0x560 [ 425.021470] ? __lockdep_init_map+0x100/0x560 [ 425.025960] mount_fs+0x92/0x2a0 [ 425.029324] vfs_kern_mount.part.0+0x5b/0x470 [ 425.034429] vfs_kern_mount+0x3c/0x60 [ 425.038228] btrfs_mount+0x42a/0x1fe0 [ 425.042029] ? lock_downgrade+0x740/0x740 [ 425.046192] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 425.052170] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 425.057616] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 425.062630] ? __lockdep_init_map+0x100/0x560 [ 425.067112] ? __lockdep_init_map+0x100/0x560 [ 425.071584] mount_fs+0x92/0x2a0 [ 425.074944] vfs_kern_mount.part.0+0x5b/0x470 [ 425.079425] do_mount+0xe53/0x2a00 [ 425.082957] ? copy_mount_string+0x40/0x40 [ 425.087176] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 425.092185] ? copy_mnt_ns+0xa30/0xa30 [ 425.096057] ? copy_mount_options+0x1fa/0x2f0 [ 425.100529] ? copy_mnt_ns+0xa30/0xa30 [ 425.104396] SyS_mount+0xa8/0x120 [ 425.107827] ? copy_mnt_ns+0xa30/0xa30 [ 425.111692] do_syscall_64+0x1d5/0x640 [ 425.115649] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 425.120816] RIP: 0033:0x46090a [ 425.123983] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 425.131752] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 425.138999] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 425.146255] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 425.153514] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 425.160773] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 425.212873] ================================================================== [ 425.220490] BUG: KASAN: use-after-free in btrfs_mount+0x1c3f/0x1fe0 [ 425.226874] Read of size 8 at addr ffff888056d97450 by task syz-executor.5/5263 [ 425.234292] [ 425.235923] CPU: 1 PID: 5263 Comm: syz-executor.5 Not tainted 4.14.203-syzkaller #0 [ 425.243688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 425.253018] Call Trace: [ 425.255585] dump_stack+0x1b2/0x283 [ 425.259215] print_address_description.cold+0x54/0x1d3 [ 425.264471] kasan_report_error.cold+0x8a/0x194 [ 425.269113] ? btrfs_mount+0x1c3f/0x1fe0 [ 425.273162] __asan_report_load8_noabort+0x68/0x70 [ 425.278065] ? btrfs_mount+0x1c3f/0x1fe0 [ 425.282100] btrfs_mount+0x1c3f/0x1fe0 [ 425.285967] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 425.291916] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 425.297340] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 425.302331] ? __lockdep_init_map+0x100/0x560 [ 425.306816] ? __lockdep_init_map+0x100/0x560 [ 425.311285] mount_fs+0x92/0x2a0 [ 425.314637] vfs_kern_mount.part.0+0x5b/0x470 [ 425.319124] vfs_kern_mount+0x3c/0x60 [ 425.322901] btrfs_mount+0x42a/0x1fe0 [ 425.326678] ? lock_downgrade+0x740/0x740 [ 425.330813] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 425.336765] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 425.342187] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 425.347356] ? __lockdep_init_map+0x100/0x560 [ 425.351826] ? __lockdep_init_map+0x100/0x560 [ 425.356295] mount_fs+0x92/0x2a0 [ 425.359640] vfs_kern_mount.part.0+0x5b/0x470 [ 425.364110] do_mount+0xe53/0x2a00 [ 425.367629] ? copy_mount_string+0x40/0x40 [ 425.371837] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 425.377194] ? copy_mnt_ns+0xa30/0xa30 [ 425.381070] ? copy_mount_options+0x1fa/0x2f0 [ 425.385552] ? copy_mnt_ns+0xa30/0xa30 [ 425.389419] SyS_mount+0xa8/0x120 [ 425.392850] ? copy_mnt_ns+0xa30/0xa30 [ 425.396712] do_syscall_64+0x1d5/0x640 [ 425.400581] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 425.405745] RIP: 0033:0x46090a [ 425.408929] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 425.416625] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 425.423944] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 425.431203] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 425.438482] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 425.447062] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 425.454332] [ 425.455972] Allocated by task 5263: [ 425.459578] kasan_kmalloc+0xeb/0x160 [ 425.463356] __kmalloc_node+0x4c/0x70 [ 425.467132] kvmalloc_node+0x88/0xd0 [ 425.470818] btrfs_mount+0x911/0x1fe0 [ 425.474600] mount_fs+0x92/0x2a0 [ 425.478319] vfs_kern_mount.part.0+0x5b/0x470 [ 425.482792] vfs_kern_mount+0x3c/0x60 [ 425.486564] btrfs_mount+0x42a/0x1fe0 [ 425.490337] mount_fs+0x92/0x2a0 [ 425.493677] vfs_kern_mount.part.0+0x5b/0x470 [ 425.498157] do_mount+0xe53/0x2a00 [ 425.501670] SyS_mount+0xa8/0x120 [ 425.505109] do_syscall_64+0x1d5/0x640 [ 425.508972] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 425.514130] [ 425.515731] Freed by task 5263: [ 425.518984] kasan_slab_free+0xc3/0x1a0 [ 425.522936] kfree+0xc9/0x250 [ 425.526121] kvfree+0x45/0x50 [ 425.529198] deactivate_locked_super+0x6c/0xd0 [ 425.533753] sget_userns+0x9c4/0xc10 [ 425.537439] sget+0xd1/0x110 [ 425.540436] btrfs_mount+0xbbe/0x1fe0 [ 425.544215] mount_fs+0x92/0x2a0 [ 425.547556] vfs_kern_mount.part.0+0x5b/0x470 [ 425.552030] vfs_kern_mount+0x3c/0x60 [ 425.555801] btrfs_mount+0x42a/0x1fe0 [ 425.559585] mount_fs+0x92/0x2a0 [ 425.562935] vfs_kern_mount.part.0+0x5b/0x470 [ 425.567406] do_mount+0xe53/0x2a00 [ 425.570963] SyS_mount+0xa8/0x120 [ 425.574393] do_syscall_64+0x1d5/0x640 [ 425.578259] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 425.583419] [ 425.585025] The buggy address belongs to the object at ffff888056d95e00 [ 425.585025] which belongs to the cache kmalloc-8192 of size 8192 [ 425.600962] The buggy address is located 5712 bytes inside of [ 425.600962] 8192-byte region [ffff888056d95e00, ffff888056d97e00) [ 425.612987] The buggy address belongs to the page: [ 425.617894] page:ffffea00015b6500 count:1 mapcount:0 mapping:ffff888056d95e00 index:0x0 compound_mapcount: 0 [ 425.627835] flags: 0xfff00000008100(slab|head) [ 425.632392] raw: 00fff00000008100 ffff888056d95e00 0000000000000000 0000000100000001 [ 425.640259] raw: ffffea00016d5f20 ffffea0001681b20 ffff88813fe08080 0000000000000000 [ 425.648112] page dumped because: kasan: bad access detected [ 425.653813] [ 425.655413] Memory state around the buggy address: [ 425.660313] ffff888056d97300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 425.667647] ffff888056d97380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 425.674980] >ffff888056d97400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 425.682311] ^ [ 425.688267] ffff888056d97480: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 425.695622] ffff888056d97500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 425.702952] ================================================================== [ 425.710281] Disabling lock debugging due to kernel taint [ 425.722689] Kernel panic - not syncing: panic_on_warn set ... [ 425.722689] [ 425.730053] CPU: 1 PID: 5263 Comm: syz-executor.5 Tainted: G B 4.14.203-syzkaller #0 [ 425.739053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 425.748404] Call Trace: [ 425.750988] dump_stack+0x1b2/0x283 [ 425.754683] panic+0x1f9/0x42d [ 425.757854] ? add_taint.cold+0x16/0x16 [ 425.761805] ? ___preempt_schedule+0x16/0x18 [ 425.766189] kasan_end_report+0x43/0x49 [ 425.770143] kasan_report_error.cold+0xa7/0x194 [ 425.774789] ? btrfs_mount+0x1c3f/0x1fe0 [ 425.778829] __asan_report_load8_noabort+0x68/0x70 [ 425.783741] ? btrfs_mount+0x1c3f/0x1fe0 [ 425.787775] btrfs_mount+0x1c3f/0x1fe0 [ 425.791653] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 425.797611] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 425.803045] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 425.808066] ? __lockdep_init_map+0x100/0x560 [ 425.812550] ? __lockdep_init_map+0x100/0x560 [ 425.817026] mount_fs+0x92/0x2a0 [ 425.820369] vfs_kern_mount.part.0+0x5b/0x470 [ 425.824848] vfs_kern_mount+0x3c/0x60 [ 425.828626] btrfs_mount+0x42a/0x1fe0 [ 425.832405] ? lock_downgrade+0x740/0x740 [ 425.836548] ? btrfs_get_subvol_name_from_objectid+0x8b0/0x8b0 [ 425.842572] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 425.848006] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 425.853004] ? __lockdep_init_map+0x100/0x560 [ 425.857475] ? __lockdep_init_map+0x100/0x560 [ 425.861945] mount_fs+0x92/0x2a0 [ 425.865292] vfs_kern_mount.part.0+0x5b/0x470 [ 425.870027] do_mount+0xe53/0x2a00 [ 425.873545] ? copy_mount_string+0x40/0x40 [ 425.877763] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 425.882757] ? copy_mnt_ns+0xa30/0xa30 [ 425.886679] ? copy_mount_options+0x1fa/0x2f0 [ 425.891194] ? copy_mnt_ns+0xa30/0xa30 [ 425.895063] SyS_mount+0xa8/0x120 [ 425.898498] ? copy_mnt_ns+0xa30/0xa30 [ 425.902365] do_syscall_64+0x1d5/0x640 [ 425.906256] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 425.911423] RIP: 0033:0x46090a [ 425.914613] RSP: 002b:00007fde1c26ca88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 425.922326] RAX: ffffffffffffffda RBX: 00007fde1c26cb20 RCX: 000000000046090a [ 425.929578] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fde1c26cae0 [ 425.936821] RBP: 00007fde1c26cae0 R08: 00007fde1c26cb20 R09: 0000000020000000 [ 425.944067] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 425.951315] R13: 0000000020000100 R14: 0000000020000200 R15: 0000000020000080 [ 425.959263] Kernel Offset: disabled [ 425.962886] Rebooting in 86400 seconds..