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"}, {0x100, 0x115, 0x101, "b57a31fdc896cce07fc3426b4a06ca6f07c05fa5d6787ad391bed1cc3042f84634b16cb5e22d9a5ba5172ff0c07089506d1281a17660119a4bcb759f86be315bf2ce731c2f1c611d1da3a21ae48911ddc019a56b1a9e6e7bc25f9f411668ab6ba20c805c6f012e04b872661ada69bba8d75b818d16e8ee98ebe9556b306708c49b19aa9722ce87a21d13de46c05198b623f100dc3be66cdfc312dffe47e1c5e089e927a5613ff6842a2c16b48f270318d4131de38e3611c430b628fbfe11446f33d8de9c86823fc06bd4dce9e921561a4d60db290edc3fb6c6eb178b4e321c4083a686e32c7ef0f9435da29862"}, {0xe8, 0x11d, 0x10000, "924e667115682a47c713a82c5f38ded726a8f88ae20d3d5a5485b20e5c35565b2d290c2dac4a479a00ed80fa4cb2efef14b20bc7be1e50ef707c470ae934bc17d73866a2f0487bc4e359bdf875e90fd3fc91bf7cb3dcadcaeb648d42a703421fe36093198d22c784fb2f0fa95d8ccea27cdbcdabe6647f74fa7e5ccf8f77b8bfbcb1a4e87b35d03f51f4cee075947fcec2cc20f526e99b420d389a0601d80346794a06ebf30e33b0cb28e8295fb503ad719acc2b32eda9de665404bf878f969dc39112de7503e39d8e809ee8e53f23845816"}, {0xb8, 0x10f, 0x9, "49535720b9e50ed0e848abb7812a535e1a186b4d0a989492a84dea44c2b3849697ee98242d7eca1d54de74b2095afa4804fe63c70c26cbdc272c5948141bdb21811847e73a6e787f83637b33e18da72d43d64d5981b0ec8362bcdc3ced167f25ce4141e7b6c95d308e0a63ee07f63332f15acb1d270002ba4aa90c7175fca07cfbc816d907609c6a6957dfc7b3fb592327c6858b2d675d8994e3262ad1a8897def4a"}, {0x100, 0x105, 0x7, "2adcacf62a348fe7af7d212e38e84751e1c755e07ac15ff46d498a515118b80f5f3c55fb241e7ca6605ed318c8b427d91be5c756a42215a3ee87037797d5fa2a3bd55533c44002fcb89dfacd874c5f652aa4698d81d02978f0897d762ed1b07b8e9e6b0ba6c05d319de10a7dc4f3d94987f2689732212df76a94eb5e751b92748fa602a908c0c4054cb35582e3f168fc58403f6cbe79ba265fc51d6a3a0fff0bf5cf975b9b8d56f531d05cc492cde33ea441bdcd5ef32eedd9a8b4cc2d060843c0686b0679682ce3da4a2d799d80241a08b13e83761bc4ec198399166be492711f1aa15bd85bd3efbfd19242"}, {0x98, 0x119, 0x2, "f3af975b13a8d12fe414aacbf43c6dde5e527a73dce4430a856971e7952ae74c6620161f1277b4ad2baa9fc0cac98a955c862dc63d2effe3a374ec7ffcff673e5f07f478613a903822082a8f25e273c4927fbc33e9dc1649f4a897a4e4aa7c00bfae5c867502578cb05af985df21009fec44107fa460ca13bdb328a56ce4aa06d67b"}, {0x10, 0x13a, 0x9}], 0x15a8, 0x20008000}, 0x800) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000100)=0x8000000) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x2000) getsockname$packet(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000300)=0x14) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) restart_syscall() 07:10:32 executing program 6: r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x579afed52b429aaa, {0x2, 0x4e22, @broadcast=0xffffffff}, 'ip6tnl0\x00'}) r4 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x0, 0x0) r5 = dup2(r4, r4) syz_kvm_setup_cpu$x86(r5, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000480)="b95d030000b800800000ba000000000f302e0f890038000066ba4000b840f90000efc4814d5863ab3e8197fd4300008fbc0000673667674d0fc79bc2c1f8640f323e400f0766baa000b000eeb9a5030000b89e4a0000ba000000000f30", 0x5d}], 0x1, 0x0, &(0x7f0000000500), 0x0) 07:10:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000010a07031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) close(r2) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) write$P9_RWALK(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="4a0000006f010005004003000000020000000000f7ff3f03000000050000000000000080020000000800000000000000ad8e04810786b8ddb9bc2f5845d7395ae52f9cdbd30766da227283b1a386e46c97c4441b9515e2e0e75fa893f88e388f048bc0c3ff7bf2d6da4c972d821be174e7851477b3001d7267e020bdb198f7c324d21a8978f77ccfce0f8d80fad4edb06d57b6d93f1d42f5a2f1670aab1c79a1bbda7a223233d216a0007990e97a0ae3410b973970e3ccdc9d8c77cbd9a80000000000000000000000000000"], 0x4a) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000780)='9p\x00', 0x0, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c}) write$P9_RCLUNK(r4, &(0x7f0000000100)={0x7, 0x79, 0x2}, 0x7) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, &(0x7f00000002c0)={0x15, 0x110, 0xfa00, {r5, 0x3ff, 0x0, 0x0, 0x0, @ib={0x1b, 0xb9, 0x7fff, {"5d7b1882c8f3d68535b8a3d25eb963c6"}, 0x1f, 0x89, 0x2}, @in={0x2, 0x4e21, @loopback=0x7f000001}}}, 0x118) 07:10:32 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0x80045104, &(0x7f00000000c0)) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000000)=[@in6={0xa, 0x0, 0xe5, @remote={0xfe, 0x80, [], 0xbb}, 0x3}, @in={0x2, 0x0, @broadcast=0xffffffff}], 0x2c) 07:10:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:10:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x9dc) 07:10:32 executing program 7: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x8000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xcc, r1, 0x1, 0x70bd26, 0x25dfdbfd, {0xc}, [@IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x3d, 0x1a}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x2}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}]}, @IPVS_CMD_ATTR_DEST={0x4, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'irlan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local={0xac, 0x14, 0x14, 0xaa}}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote={0xac, 0x14, 0x14, 0xbb}}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1000}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x80}, 0x4000010) r2 = socket$inet6(0xa, 0x4, 0x20) ioctl(r2, 0x8912, &(0x7f0000000080)="025cc83d6d345f8f762070") r3 = socket(0x10, 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') sendfile(r3, r4, &(0x7f0000000000), 0x80000002) 07:10:32 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x422}], 0x1) 07:10:32 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f00000000c0)={0x1, 0x100000000}) r1 = socket(0x1e, 0x1, 0x0) r2 = syz_open_pts(0xffffffffffffff9c, 0x22c0) ioctl$TIOCEXCL(r2, 0x540c) sendfile(r1, r1, 0x0, 0x80000000) getsockopt(r1, 0x1a60000000000, 0x81, &(0x7f0000000040)=""/4, &(0x7f0000000080)=0x4) 07:10:32 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$sndpcmp(&(0x7f0000001640)='/dev/snd/pcmC#D#p\x00', 0x6, 0x101) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f00000015c0)={r0}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000001600)=0x12, 0x4) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000001680)) r2 = gettid() syz_mount_image$nfs4(&(0x7f0000000040)='nfs4\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x6, &(0x7f00000014c0)=[{&(0x7f00000000c0)="c0cf941be8765f7cf8713d46757af04d0573ec019e6701501158154bce7bf5d72362ac8788757f8bf9404f763d973ddb863bf6c3ddf1a2bb2a2d4912c50d23f68df221ef9a65c7db755f83df7564ad6bd12a2af1c37eafc6151cd8a46befa6f98d5fa5198685b2698e2118da5d20c01ea0a73f3cc692a16e64e6c930a785deaa576f45a324c5ecc98d6f5101f61eb763f4b0b40d142d12333e9c", 0x9a}, {&(0x7f00000002c0)="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", 0x1000, 0x2}, {&(0x7f0000000180)="7ad2d84b6fcd5e4a2224fc40b876c8775c64bb50ad2b0bfc70e4a9161dacb52420e0b172057b934a91ec4d6a5489f2614d5c14bdf7572fbf7acc4a630da534ddf41896976de122597397a52f965715be27a6e587e90f31e4505c9fa6f5c7a89a78639b06a7cf74e9812bae04961bcf01dfb8b5f7438718ec41952ed83ae9a67c3b183f1fdc5f00f0a608a606e40dd28e7df7aa87fff194e730275e88f713ad65f99a1c3a5be0aea8475140a7e873db05345b0a3ccebb8335d360896e286be3365609fac94cbd446015ed58a7899d629c1488d1bd96", 0xd5, 0x3}, {&(0x7f00000012c0)="5799eb8e5b1cb24479a2f38bb4ee", 0xe}, {&(0x7f0000001300)="e9680dbed2bd4e7de263368c2ce841f2c4ca81154d9ac6644b23fbb68497c416255118d3fb56ac1d5a6b7df8a1cb0fb0a872c059d2c22beb7d7b8a81889d2e7ef33c97c54bc3e79df09e82b1fbceae74fc2354d9b68da4f68b668101480270c511cf32decce50e93cf69b3b9003bd7d8ff5b83b29dfadec6756be4e7a5502093efd32d27b64f7f18148a1fa0e00fc15999f72af7b09fb319532be20a25141d24f388ab11b165e17d538c118d30109deec4e92b45b8266a0bc0da119ec926fbbdf44a1f0c2207ad85423a6803e15114a253bc1ea3e44ca924c1274a6290182af4d5965fb39c6c8245fb3e1d67002b3c8aa25daf5669aa", 0xf6, 0x2}, {&(0x7f0000001400)="946ecdcc7df496ea42d87df3f1a0a3bcf6604b1939a53f6498b1aba732c59ab39d60380e705b3fdc46e9765e7fb3f5e5408ddbdc2cfb709856f27536a949367f6a406ffd73b801aa7718a87c739de81cd540259e2f4229c3218bce2f4ec227e426102f99c29a33a76303676613b03b567b1adbbc34df2e7c01f1e14f4c46312b1665f727852b677f2281a4f4e322200908850292996a", 0x96, 0x8}], 0x2000001, &(0x7f0000001580)='bond0\x00') rt_sigprocmask(0x0, &(0x7f0000057000)={0xfffffffffffffffe}, 0x0, 0x8) timer_create(0x3, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r2}, &(0x7f0000044000)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bond0\x00'}) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000016c0)) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000d43000)) 07:10:32 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0xfffc, 0x0) ioctl$TIOCCBRK(r0, 0x5428) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x8200, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000040)=[@text32={0x20, &(0x7f00000000c0)="0f01c826650f0966b831010f00d8440f20c03509000000440f22c0260f30b805000000b90b0000000f01c10f22240f22c3b9230800000f3266baf80cb8f09c3c8aef66bafc0cb83d000000ef", 0x4c}], 0x1, 0x3, &(0x7f0000000580), 0x100000b9) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f00000001c0)=ANY=[@ANYBLOB="06000000020000000800000000000000010000000000000009000000000000000600000000000000018000f85cff1a000000000004000000000000006e020000000000000800000000000000020c000000000000ffffffffffffffff0500000000000000b0020000"]) getgroups(0x2, &(0x7f0000000000)=[0xffffffffffffffff, 0xffffffffffffffff]) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r3, 0xc4c85512, &(0x7f0000000240)={{0xa, 0x0, 0x1, 0x4, 'syz1\x00', 0x5}, 0x0, [0x401, 0x9, 0xffff, 0x20, 0x1, 0x1, 0x7, 0x9, 0x1, 0xffffffff, 0xff, 0x0, 0x2, 0x6, 0x20, 0x2, 0x1000, 0x81, 0x12, 0x4, 0xfffffffffffffffb, 0x9, 0x706, 0xffffffff, 0x88, 0x40, 0x7fffffff, 0x5, 0x10001, 0x0, 0x10001, 0x3, 0x10000, 0x5, 0x7ff, 0x100, 0x7, 0x9, 0x800, 0x0, 0x1b2a, 0x0, 0x9b7e, 0x7, 0x2, 0x2, 0x9, 0x6, 0x9, 0x3, 0x4, 0xb206, 0x7, 0x38, 0xfff, 0x100000001, 0x100000001, 0x80, 0x7c, 0x31, 0x1, 0x80000001, 0x5, 0x8, 0x5, 0x13, 0xfffffffffffff800, 0x5, 0x154b, 0x2, 0x7, 0x4, 0x4, 0x3, 0x92f, 0x2, 0x0, 0x4, 0x5, 0x2, 0x533, 0x0, 0x8, 0x1, 0x6, 0x2, 0x80000001, 0x73, 0x7f, 0xf3, 0xf304, 0x3f, 0xfffffffffffffff8, 0x8001, 0x0, 0x7f, 0xffffffff, 0x9, 0x6, 0x4, 0xe5b0, 0x8, 0x6, 0x5, 0xe5a2, 0x28f4, 0x0, 0x2, 0x2, 0x4, 0x8, 0x3, 0x4, 0xffff, 0x3, 0x9, 0x4, 0x80000001, 0x7, 0xfffffffffffff000, 0x0, 0x30f5b4e4, 0x101, 0xfff, 0x7, 0xdbde, 0x3, 0x4], {r5, r6+10000000}}) setfsgid(r4) fcntl$getflags(r2, 0xb) [ 400.347211] netlink: 20 bytes leftover after parsing attributes in process `syz-executor3'. 07:10:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x5da) 07:10:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threadedd', 0x9) 07:10:32 executing program 6: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="920fbd"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000140)="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") syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x0, &(0x7f0000000000), 0x1000000000000040) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:10:32 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x6, &(0x7f0000000180)=0x2640) r1 = accept4$llc(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000100)=0x10, 0x800) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000140)={'bridge_slave_0\x00', 0x8}) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, &(0x7f0000002600), 0x8000, &(0x7f0000000000)=ANY=[@ANYBLOB="ec4760d7932009d789d7a3646f733178666c9b8b27812c00"]) 07:10:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x54b) 07:10:32 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0xcc}], 0x1) 07:10:32 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r2, 0x4038ae7a, &(0x7f0000000200)={0x4, 0x347, &(0x7f0000000140)="e4121c41aa9715933cd043446f2b8be3404c3814f6c9d1978778631a799b0930732c6771f8c8a970ca13cf9cfb3688ab86b2f924eaab99879a460485ab2ba53d194817c1af9aa795a92a98566a04c25bccffe45c6d9ae44abfc14ca65921ab1bf39176b3d28d2bcd7a8ebabd838bc27b5996ec79e513a1088663fb0dea73dfe6099835fbce2ab5d2908484", &(0x7f0000000080)="d2d963edabe2a0f7b5a194fe24116c677cac78616c02cbaea066894f6841171707bdfaa72dfc17935de25b47d2fea3b6a107776e17819095c0086e101e09f6e5840d1889547e9763bfce1521788070e40432c9cceb2f", 0x8b, 0x56}) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8e, 0x600080) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x9, 0x4) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000100)="66ba2000ed0f01c30f20d835080000000f22d8c4c2350353ae0fc0680303acc7307d0000c4e121761666b8cc008ee064650fc71e670f38096e8b", 0x3a}], 0x1, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 400.812917] *** Guest State *** [ 400.816353] CR0: actual=0x0000000080000031, shadow=0x00000000e0000011, gh_mask=fffffffffffffff7 [ 400.825261] CR4: actual=0x00000000000027fa, shadow=0x00000000000007fa, gh_mask=ffffffffffffe871 [ 400.834156] CR3 = 0x0000000000004000 [ 400.837924] PDPTR0 = 0x00000000000000e7 PDPTR1 = 0x0000000000000000 [ 400.844458] PDPTR2 = 0x0000000000000000 PDPTR3 = 0x0000000000000000 [ 400.851006] RSP = 0x00000000000007fa RIP = 0x000000000000912e [ 400.857062] RFLAGS=0x00000012 DR7 = 0x0000000000000400 07:10:33 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x285}], 0x1) 07:10:33 executing program 6: perf_event_open(&(0x7f0000000000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0x5, &(0x7f0000000000)=@framed={{0x18}, [@call={0x85, 0x0, 0x0, 0x19}], {0x95}}, &(0x7f00000000c0)='GPL\x00', 0xe6, 0xfb, &(0x7f0000000300)=""/251}, 0x48) r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x7fff, 0x40) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x4, 0x3, [0xfffffffffffffffc, 0x7, 0x5]}, &(0x7f0000000140)=0xe) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000200)={r1, 0x3a1}, 0x8) 07:10:33 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0xcd4) 07:10:33 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000040)={0x81, 0x6, 0xea, 0x4, 0xa00}) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="e92be282346d61ac97"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x25}, [@ldst={0x7, 0x0, 0x4, 0x0, 0x0, 0x0, 0xa000000}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) move_pages(0x0, 0x5, &(0x7f0000000080)=[&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil], &(0x7f00000000c0)=[0x1, 0x5773, 0x8001], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x2) [ 400.863153] Sysenter RSP=0000000000000f80 CS:RIP=0030:0000000000002810 [ 400.869876] CS: sel=0x0010, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 400.877910] DS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 400.885969] SS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 400.894006] ES: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 400.902057] FS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 400.910077] GS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 400.918136] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 400.926173] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 400.934194] IDTR: limit=0x000001ff, base=0x0000000000003800 [ 400.942234] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 400.950258] EFER = 0x0000000000000001 PAT = 0x0007040600070406 [ 400.957078] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 400.964587] Interruptibility = 00000000 ActivityState = 00000000 [ 400.971162] *** Host State *** [ 400.974444] RIP = 0xffffffff811f4664 RSP = 0xffff88019616f350 [ 400.980753] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 400.987223] FSBase=00007f5205df2700 GSBase=ffff8801daf00000 TRBase=fffffe0000034000 [ 400.995089] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000 [ 401.001059] CR0=0000000080050033 CR3=00000001b7023000 CR4=00000000001426e0 [ 401.008131] Sysenter RSP=fffffe0000033200 CS:RIP=0010:ffffffff87a01380 [ 401.014847] EFER = 0x0000000000000d01 PAT = 0x0000000000000000 [ 401.020955] *** Control State *** [ 401.024448] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 401.031430] EntryControls=0000d1ff ExitControls=0023efff [ 401.036930] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 401.043918] VMEntry: intr_info=00000b0d errcode=00000000 ilen=00000000 [ 401.050635] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 401.057279] reason=80000021 qualification=0000000000000002 [ 401.063636] IDTVectoring: info=00000000 errcode=00000000 [ 401.069134] TSC Offset = 0xffffff2692d36dc3 [ 401.073503] EPT pointer = 0x00000001be34801e 07:10:33 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0xbdc) 07:10:33 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000bf6000)=0x177, 0x4) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000e13f4e), 0x0, 0x0, &(0x7f000020d000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) recvmmsg(r0, &(0x7f0000f61000)=[{{&(0x7f0000f62ff0)=@ipx, 0x10, &(0x7f0000f5d000), 0x0, &(0x7f0000f62000)=""/89, 0x59}}], 0x61, 0x2041, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) 07:10:33 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000440)={@local={0xfe, 0x80, [], 0xaa}, @empty, @local={0xfe, 0x80, [], 0xaa}, 0x0, 0x40}) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x10001, 0x480100) getpeername$unix(r1, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) r2 = shmget(0x1, 0x4000, 0xc80, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_LOCK(r2, 0xb) [ 401.268220] *** Guest State *** [ 401.271793] CR0: actual=0x0000000080000031, shadow=0x00000000e0000011, gh_mask=fffffffffffffff7 [ 401.280684] CR4: actual=0x00000000000027fa, shadow=0x00000000000007fa, gh_mask=ffffffffffffe871 [ 401.289559] CR3 = 0x0000000000004000 [ 401.293300] PDPTR0 = 0x00000000000000e7 PDPTR1 = 0x0000000000000000 [ 401.299821] PDPTR2 = 0x0000000000000000 PDPTR3 = 0x0000000000000000 [ 401.306337] RSP = 0x00000000000007fa RIP = 0x000000000000912e [ 401.312444] RFLAGS=0x00000012 DR7 = 0x0000000000000400 [ 401.318444] Sysenter RSP=0000000000000f80 CS:RIP=0030:0000000000002810 [ 401.325138] CS: sel=0x0010, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 401.333141] DS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 401.341142] SS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 401.349154] ES: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 401.357187] FS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 401.365202] GS: sel=0x0038, attr=0x04093, limit=0x000fffff, base=0x0000000000000000 [ 401.373216] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 401.381260] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 401.389315] IDTR: limit=0x000001ff, base=0x0000000000003800 [ 401.397640] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 401.405783] EFER = 0x0000000000000001 PAT = 0x0007040600070406 [ 401.412281] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 401.419789] Interruptibility = 00000000 ActivityState = 00000000 [ 401.426090] *** Host State *** [ 401.430213] RIP = 0xffffffff811f4664 RSP = 0xffff88018c2ff350 [ 401.436253] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 401.442742] FSBase=00007f5205dd1700 GSBase=ffff8801dae00000 TRBase=fffffe0000003000 [ 401.450600] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 401.456510] CR0=0000000080050033 CR3=00000001b7023000 CR4=00000000001426f0 [ 401.463573] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87a01380 [ 401.470268] EFER = 0x0000000000000d01 PAT = 0x0000000000000000 [ 401.476350] *** Control State *** [ 401.479831] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 401.486520] EntryControls=0000d1ff ExitControls=0023efff [ 401.492045] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 401.499048] VMEntry: intr_info=00000b0d errcode=00000000 ilen=00000000 [ 401.505745] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 401.512370] reason=80000021 qualification=0000000000000002 [ 401.518708] IDTVectoring: info=00000000 errcode=00000000 [ 401.524191] TSC Offset = 0xffffff2692d36dc3 [ 401.528543] EPT pointer = 0x00000001be34801e 07:10:33 executing program 4: stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getegid() getgroups(0x6, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0x0, 0x0]) setgroups(0x3, &(0x7f00000001c0)=[r0, r1, r2]) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:33 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x217}], 0x1) 07:10:33 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0xadc) 07:10:33 executing program 7: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x100f}}, 0x20) r2 = memfd_create(&(0x7f0000000580)="7573657270726f63df7070703123247070703000", 0x0) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f0000000640)=""/98) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000005c0), &(0x7f0000000600)=0xc) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000540)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000400)=[{0x2, 0x0, [0x2, 0x2, 0xffffffffffffff07, 0xbc86, 0xe000000, 0x9, 0xfffffffffffffff7, 0x1, 0xffffffffffff8000, 0xffffffffffff0000, 0x3, 0xfff, 0x4, 0x3, 0x2]}, {0x10, 0x0, [0x1ae, 0x3, 0x21, 0x0, 0xe6, 0x9, 0xab2, 0x800, 0x6, 0x1, 0x1, 0xfffffffffffffffb, 0x1ff, 0xb93, 0x2, 0x3]}, {0x10, 0x0, [0x9, 0x4, 0x80000000, 0x9, 0x6, 0x1, 0xfffffffffffffffd, 0xff, 0xfff, 0x80000000, 0x1ff, 0x5, 0x80, 0x3, 0x9cb, 0x4]}, {0x39, 0x0, [0x9, 0x3, 0xfffffffffffffffb, 0x9, 0xfffffffffffffff7, 0x0, 0x1, 0x8000, 0xc29d, 0x10001, 0x5, 0x2, 0x80000001, 0x764, 0x6]}], r1, 0x1, 0x1, 0x120}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, r3}}, 0x48) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000140)={0x13, 0x10, 0xfa00, {&(0x7f0000000200), r3, 0x2}}, 0x18) 07:10:33 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000780)='g', 0x1}], 0x1) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x280000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000300)}, 0x10) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000040)="89330300e153b6c223d59bb230651a47f57a8772ffb8bec2ea09b41f5005bed50028ff4f430885a010a329635fc94aa4de729227e2404600f7f34a6b6f99e90e39f5938392334097050bdcdcb8713f710b3e42d38ffd6559a47413bf8f3580aa9c1bb706fb835292515253ec5390c4157efa8d6bd21ae4faf354743be0f523f731b861cc4b1e72bbb5bad24e0566a235054fc7fcfe62201f67b3905602114e8881db5de687facb5aa4ee8aed71b7ec6f6cdae2eab58ee1de611f9f09cdbb408fb23802b3d3d886dbd39344", 0xcb}, {&(0x7f00000007c0)="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", 0x1000}, {&(0x7f0000000140)="ad81450328ed9b8f93b9fa38808ef1908ae9e801b8314ded6e0fb0a39f15f4674159fe4fabcda8292e2a206bb99b9cb29bae4912f2141abcdd475a4670289c124b8d093be60f0cd838101ded9a371e24a89b7fc9586bc422ac8c8a67361384e14b4de18617f6b9241601be5d3366ed783c5d5fd290b8a973a4e22eb092a17dda9f7a769f6f3f24dc4d21fa1228e4fa287bf4ab9848ec3b0856eea0572623a79488e537a8835cd21cc3a92edc1a94e013a8085cf8db3fae2f9ecef911daf86e63c0aac47512768077a05ada605928d636a3f298ec813fa06fdc0786cf31a9b86bf020", 0xe2}], 0x3) 07:10:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:10:33 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x8000, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f00000000c0)={0x10000}, 0x1) sendmsg$nl_generic(r0, &(0x7f0000000040)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="18000000270063810000000000000000b20615bb04000700830828c9d965951adff21547fcfb04a4a0ea1d69b429031ff0aba75838dac5018e70fe3d7ce4e45b05"], 0x18}, 0x1}, 0x0) 07:10:33 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={"76657468300000000000000000000001", 0x0}) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000240)=@setlink={0x28, 0x13, 0x21, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x8, 0x1a, [{0x3}]}]}, 0x28}, 0x1}, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x400, 0x0) fallocate(r0, 0x2a, 0x3, 0x30) write$P9_RLCREATE(r2, &(0x7f0000000300)={0x18, 0xf, 0x1, {{0x8, 0x2, 0x5}, 0x5}}, 0x18) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}, 0x1, 0x2, 0xffffffffffff0000, 0x3ff, 0x4}, &(0x7f0000000140)=0x98) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r3, 0x80045700, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000180)={r4, 0x10, "725908e04fecd2ed7495738cfff801bf"}, &(0x7f00000001c0)=0x18) 07:10:33 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x85e) 07:10:34 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x3e2}], 0x1) 07:10:34 executing program 7: r0 = socket$inet(0x10, 0x3, 0x3) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000017fdc)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000640)="2400000002031f001cfffd946fa2830020200a000900020002e712006300a3a20404ff7e", 0x24}], 0x1}, 0x0) 07:10:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) accept$alg(r0, 0x0, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(xtea)\x00'}, 0x58) ioctl$void(r0, 0x5451) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d66593ae164c990a0028e", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) memfd_create(&(0x7f0000000040)='skcipher\x00', 0x2) recvmsg(r1, &(0x7f00000026c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000024c0)=""/118, 0x76}, {&(0x7f0000002900)=""/4096, 0x1000}], 0x2, &(0x7f00000025c0)=""/230, 0xe6}, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) migrate_pages(r2, 0x32d5, &(0x7f0000000140)=0x1, &(0x7f0000000180)=0x9) 07:10:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket(0x2, 0x0, 0x7) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 07:10:34 executing program 6: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x44, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="006340400000004000000000000000000000000000000080200000000000000000000000000000000000000000ba5a7900000000", @ANYPTR=&(0x7f0000000200)=ANY=[], @ANYPTR=&(0x7f0000000240)=ANY=[]], 0x1, 0x1400000000000000, &(0x7f0000000480)="e9"}) 07:10:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x65c) [ 401.882192] BTRFS: device fsid ecf6f2a2-2997-48ae-b81e-1b00920efd9a devid 28 transid 756082810144684242 /dev/loop4 [ 401.900662] BTRFS error (device loop4): unsupported checksum algorithm 3786 [ 401.908088] BTRFS error (device loop4): superblock checksum mismatch [ 401.917269] BTRFS error (device loop4): open_ctree failed 07:10:34 executing program 4: stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getegid() getgroups(0x6, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0x0, 0x0]) setgroups(0x3, &(0x7f00000001c0)=[r0, r1, r2]) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000240)) [ 401.964440] BTRFS error (device loop4): unsupported checksum algorithm 3786 [ 401.971902] BTRFS error (device loop4): superblock checksum mismatch [ 401.981317] BTRFS error (device loop4): open_ctree failed 07:10:34 executing program 7: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000040)="670a564457611ff1e69e67421bc9a7a350f873a8d1caa0693304cac0a5519373", 0x20) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r2, 0x4008af14, &(0x7f00000000c0)={0x2, 0x5}) r3 = dup2(r0, r2) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r3, 0x4008af23, &(0x7f0000000000)={0x0, 0x800}) 07:10:34 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x700}], 0x1) [ 402.107944] binder: 26382:26389 got transaction to invalid handle [ 402.114374] binder: 26382:26389 transaction failed 29201/-22, size 0-2035988992 line 2852 07:10:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:10:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x8d3) [ 402.162364] binder: 26382:26389 ioctl c0306201 200000c0 returned -14 [ 402.178085] binder: 26382:26389 got transaction to invalid handle [ 402.184593] binder: 26382:26389 transaction failed 29201/-22, size 0-2035988992 line 2852 [ 402.195109] binder: 26382:26389 ioctl c0306201 200000c0 returned -14 07:10:34 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = gettid() socket$inet_icmp_raw(0x2, 0x3, 0x1) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x9}, 0x1c) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f00000001c0)={0xc, 0x8, 0xfa0e, {&(0x7f0000000280)}}, 0x10) dup3(r0, r2, 0x0) tkill(r1, 0x1002000000016) 07:10:34 executing program 0: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)) msgrcv(0x0, &(0x7f00000017c0)=ANY=[], 0x0, 0xc80dd42839240bda, 0x0) msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0300000000100000"], 0x8, 0x0) r0 = socket$inet6(0xa, 0x1000000000007, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="025cc83d6d345f8f762070") clone(0x0, &(0x7f0000000080), &(0x7f0000000040), &(0x7f0000000180), &(0x7f0000000000)) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000700)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) [ 402.222549] BTRFS error (device loop4): unsupported checksum algorithm 3786 [ 402.229827] BTRFS error (device loop4): superblock checksum mismatch [ 402.239461] BTRFS error (device loop4): open_ctree failed 07:10:34 executing program 4: stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getegid() getgroups(0x6, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0x0, 0x0]) setgroups(0x3, &(0x7f00000001c0)=[r0, r1, r2]) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x54d) 07:10:34 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x900}], 0x1) 07:10:34 executing program 7: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'\x00', 0xc201}) ioctl$TUNSETPERSIST(r0, 0x401054d6, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400200, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f00000000c0)=0x1, r2, 0x0, 0x2, 0x4}}, 0x20) 07:10:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) [ 402.562341] BTRFS error (device loop4): unsupported checksum algorithm 3786 [ 402.569695] BTRFS error (device loop4): superblock checksum mismatch [ 402.590870] BTRFS error (device loop4): open_ctree failed 07:10:35 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0xb) fallocate(r0, 0x0, 0x7fff, 0xe58c) fallocate(r0, 0x1, 0x0, 0x1000000a) 07:10:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x0, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0xfffffffffffffff9, 0x8000) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f00000002c0)="3e83261a6100f3e1c70fc75da166b80500000066b9000000800f01d9c18e0a00820f300f20020f06b848000f00d867f20f2bbd00000000", 0x37}], 0x1, 0x20, &(0x7f0000000340), 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='\x00', 0xffffffffffffff9c}, 0x10) ioctl$LOOP_SET_FD(r3, 0x4c00, r0) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000001800fdff000000000000000001000000080003009c00000066e9f0b6601656f3da1eac61fbc5611e8b3c52740acd9a957000481cb3b3fb10f95d0324004c586a0524a7c2d43865429aa99522"], 0x1c}, 0x1}, 0x0) ioctl$TCSBRK(r2, 0x5409, 0x2) 07:10:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x8e0) 07:10:35 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x40, 0x0, 0x200, 0x0, 0x0, {0xa}, [@IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback={0x0, 0x1}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}]}]}, 0x40}, 0x1}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400000, 0x0) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffb) syz_emit_ethernet(0xfffffffffffffc80, &(0x7f00000001c0)=ANY=[@ANYBLOB="0180093a0400000000000000ff0200003544000000000000000000010000000000089078dd52f7b77b172b2efc28cb629552552fc5568b8016119c7285ed3ee4590989f74b833345"], &(0x7f0000000100)={0x0, 0x2, [0x0, 0xee2]}) 07:10:35 executing program 4: stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = getegid() getgroups(0x6, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0x0, 0x0]) setgroups(0x3, &(0x7f00000001c0)=[r0, r1, r2]) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:35 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x14a}], 0x1) 07:10:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:10:35 executing program 7: perf_event_open(&(0x7f0000000c80)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000003c0)={@dev, @local, 0x0}, &(0x7f0000000400)=0xc) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={r1, @empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x55) connect(r0, &(0x7f0000000340)=@l2={0x1f, 0x4152, {0x5, 0x8001, 0x8, 0x0, 0x3d, 0x9}, 0x1, 0x81}, 0x80) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000000)=""/58) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000080)="a9ffa1cb84f6008904271940d6680fff", 0x10) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x200000) sendto$inet6(r2, &(0x7f0000000440)="d76d0fdb4907ae1f591635ce48f7de87f156bc247cd351b45711e629fd6f0396c90187c6856571a47be35f31eded375129bfe4", 0x33, 0x1, &(0x7f0000000480)={0xa, 0x4e23, 0x4, @loopback={0x0, 0x1}, 0x401}, 0x1c) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f00000004c0)={0x2, 0x3f}) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000240)={0xffffffffffffffff}) r4 = socket(0xa, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x5c, 0x4, &(0x7f0000000100)="0b1c1ce853994c51a6f54b11f13a9a2591c1b27adc4aa8af7f9907e54511f5d89c51d92d9aba863411b1a4e5189fc88e9eec3fc0f78c9a893c5b6615f1f87ad7c711e45546f025070029973a9c3a84de92a869c2ee4e418b47809b78", &(0x7f0000000180)=""/4}, 0x28) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f00000001c0)={0x2, 'veth1_to_bond\x00'}, 0x18) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000540)='/dev/hwrng\x00', 0xc0, 0x0) getsockopt$inet_mreq(r3, 0x0, 0x24, &(0x7f0000000c00)={@local, @loopback}, &(0x7f0000000c40)=0x8) sendmmsg$nfc_llcp(r5, &(0x7f0000000b80)=[{&(0x7f0000000580)={0x27, 0x0, 0x1, 0x3, 0xf72f, 0x9, "6402297ffa68971e226701043bdac5c9b6dd2d4daecde3d673981e8fda4a2f040d8802de7e75c42e3a9d3cfaa9c008bca9edc3d0ca717937b78e82063f66fc", 0x9}, 0x60, &(0x7f00000006c0)=[{&(0x7f0000000600)="673d3eef506851fe818fcf29f838f36be58403cfe641aff9c967d85fc303325304ccbd86f2e8bfb5e0f086033b3cf32105df97a7650891c464d7964ac6926ccc24ffe4bd51f7a0d2b80d083bd228e0796208d02796b4bd60ca046e05888dbef6e497b03272c4964ce4f089822f13a0e50c422d845e41f009d48cc61aa410c5ac2b52c76829e2faef80d1ca9b98b9a78829", 0x91}], 0x1, &(0x7f0000000700)=ANY=[@ANYBLOB="68000000000000000301000001000000f75b358367dc3df585c71eb5baaa9bdf9e1635e91be8ab44c2fcb1edc9301bae81a9182f43bdbc0da8d70ac0c84cc28eac3acbea4f84eec21ee0ea472d3c1f9343c06d0e00f8bc7a0a78b44bd83d49e185a4f1497cd64900"], 0x68, 0x800}, {&(0x7f0000000780)={0x27, 0x0, 0x0, 0x7, 0x7, 0x8, "f21d4b43ec959a927cdfd01e02f181e3f08af1ff5b1f66620fdb22ae1540610697a06ec1e15fea38a0315d5314f7aaf6eff620098c80d876447b6633498f7f", 0x1a}, 0x60, &(0x7f0000000a40)=[{&(0x7f0000000800)="e8e2d014a566ea12d4484ef1ce52a68b7c7a73b6a6fb2557cb27f127d763fe51003292a560e572f01813135c762dd98ded8f549f6b6431fb8986f0f9b2e98b07c7dceb9a729e9982db148bd8537085a5466e765c6af3f30a9c82d4a8103c7dd756d9ddd6d485253192f404a08b10543ccc91fa1fadc153fd9ff7879f43bee4d8ec64ada252253da5e6016ed2ecf99e83a19b01c41b5ec1c93f7340fb09d26717e42212b9007a26a07b9b6edfdcb7d972c9ad12ed4fc0b7c65c9cfc8f4ea6a63615ee1be2c6d120b3c891e4617c70e5c181ec5921e16ff6a71fc58f3b55c8266acc851071e50bd280cf58fc44e79e", 0xee}, {&(0x7f0000000900)="8cbddc692a3f26c9f9e3b271c9bec7c6adcd65b5d85ea8b0c04667b72ebaa01c2f98db9a7c7ec6ae15069c53be8cd899733b2f53a6", 0x35}, {&(0x7f0000000940)="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", 0xfe}], 0x3, &(0x7f0000000a80)=ANY=[@ANYBLOB="d000000000000000160100000100000021506fb4adc49fcf55a0a7e03f0f3bc1aea6eea174e626598b105f10d19f6791b8d7f18b64fcf3fff412b7233871f8038db0000000f3796a5f8bdac2168f1f71dd936155734c41490f643e43ea90c00eaced4397d58bb8dc34f9c38b31b6fa607265ecdf2273e573a63f329ad19f13bd01698d7c052cf8ad6642bdbc9487c5d418b3c0a05306995ad3d29f642326eb3da6a8c1c8f9e08fc4bd4a6a3cf0252c4177a9242003da0cea44a92e3f62e9b1eaceff6d7d3efffae38fa97ed500000000"], 0xd0, 0x1}], 0x2, 0x4000000) setsockopt$IP_VS_SO_SET_STOPDAEMON(r4, 0x0, 0x48c, &(0x7f00000000c0)={0x2, "697036746e6c3000000000008c0400"}, 0x18) 07:10:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0xa5b) [ 403.212727] BTRFS error (device loop4): unsupported checksum algorithm 3786 [ 403.220172] BTRFS error (device loop4): superblock checksum mismatch 07:10:35 executing program 6: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x8000, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4) r1 = eventfd2(0x200000005, 0x80800) readv(r1, &(0x7f0000001600)=[{&(0x7f0000000100)=""/8, 0x8}, {&(0x7f0000001500)=""/231, 0xe7}], 0x2) 07:10:35 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000001180)={0x0, 0x0, 0x5, 0x7b46, @buffer={0x0, 0x1000, &(0x7f0000000100)=""/4096}, &(0x7f0000000000)="9d6e00a1c8", &(0x7f0000001100)=""/66, 0x6629c9d8, 0x2, 0x1, &(0x7f0000000080)}) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000040)=0xfffffffffffffffd) 07:10:35 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x37f}], 0x1) 07:10:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:10:35 executing program 4: stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) getegid() getgroups(0x6, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0x0, 0x0]) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000240)) [ 403.273516] BTRFS error (device loop4): open_ctree failed 07:10:35 executing program 3: r0 = socket$nl_generic(0xa, 0x5, 0x84) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000001c0)={"62760000965f0b11424e7b5e28000001", &(0x7f0000000100)=ANY=[]}) r1 = accept(r0, 0x0, &(0x7f0000000040)) getpeername$packet(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x14) 07:10:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x573) 07:10:35 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x800000008912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xe3c2, 0x4000) ioctl$GIO_CMAP(r1, 0x4b70, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f0000000100)) clock_settime(0x0, &(0x7f0000000000)={0x0, 0x1c9c380}) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000140)=@req3={0x7, 0x8, 0x3, 0x1000, 0x1, 0x4, 0x10000}, 0x1c) 07:10:35 executing program 6: r0 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") ioctl$BLKPG(r0, 0x40140921, &(0x7f0000000000)={0x0, 0x800000000000001, 0x0, &(0x7f0000000440)}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='attr\x00') r3 = geteuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x104000, &(0x7f00000001c0)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@allow_other='allow_other', 0x2c}]}}) [ 403.525873] BTRFS error (device loop4): unsupported checksum algorithm 3786 [ 403.529045] IPVS: stopping backup sync thread 26527 ... [ 403.533121] BTRFS error (device loop4): superblock checksum mismatch 07:10:35 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x6a}], 0x1) [ 403.573496] BTRFS error (device loop4): open_ctree failed 07:10:35 executing program 4: stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) getegid() syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x855) 07:10:35 executing program 7: stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) getegid() getgroups(0x6, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0x0, 0x0]) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:10:35 executing program 6: pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x2, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0xb, &(0x7f00000015c0)=[{&(0x7f0000000100)="7bb08ba068c3343ef7c60f76353b1bc931646ca659da2688eb96f5abe3c6ba8d7ebfacc3600991267a48f468b37f6e83ca43fe8526735cb46ff7b82de1eaf5830a289cf60e2bee03ab3e3049ac62e1e20b76678dee67ba4f5d7a20f1ce26eac5b3a17042d09df7923cb741f11e5a1a243dc184f3bceeedd5057a4d07e46bd296a9561ef7181b67c8be6affd0c42cfad302821832c0ec259402f5dc4b38e8927325ce7ab8b56b95f59c6135ecbe5f22bb9f60", 0x0, 0x80000000}, {&(0x7f0000000200)="f7b6828dd28b772ae3821f45c8a31f985adb372323348249322b76cbd47f6a15a596d4ffc077977ac5e0d59ff0", 0x0, 0x7fffffff}, {&(0x7f0000000240)="5bb6db714e7b98d1bd431a4698a0a59cfdcc3c6756a14eb189692631666dcfae6b3c6756ca17f6a91e79a39598870b7e23acdc5144866e224c641151995c67fdeae5d34c63fc9a74c8312af374f6fc77b8064f3a6163ab32968768c01f6597653b01b85227a7ac15b12de688d526ac8e8253252c581804", 0x0, 0x80000000}, {&(0x7f00000002c0)="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", 0x0, 0x100}, {&(0x7f00000012c0)="00f85a20fc3459610d6bb1077e9c0b31a4e1fdd4a1931d4422824b163a6dc74bb4fe895943e9131fa6fa0aad6a7e1cbafb76bef07718b55b6fddbd3af15617684603df1b7b9bdb7039ef38403db56e0026cdd8c2b5f543", 0x0, 0x100000000}, {&(0x7f0000001340)="92ec9159387e663b53c4d361684f35736ef03f9e533703959a56c649663b3f83b87815e2641e62b317689aaccc6ac2b8e7ca33c7e5434ae9541269cce87e3e885af22cd763454445d2f717f67f805286c5e8d607182f80f6a976639ba0f60dd52e81df6f2bc4167c262a3bc1150005b808ded307a8892af13a6d189d00d1a2576a58aa85b240063d1a7b0e03fca1427af726d9cfe03db9f21cf1b6cd597b4b413d0c59f1365f39", 0x0, 0x8}, {&(0x7f0000001400)="7600edcf259d035534f69ce1b901948c98dfe33d3cee998e0afe21772392a75e9b88699247c4b6255c923c927444d130c9375943de9c3176a79a37212ff55db758435139b779ce77fb9f1ecee515f539519176a6ad32aeb25fd9ee577f68e1aa82f52722095e1d04659a093d8fa0740d9103ca4d85ec9670f56dbaa53ae8cb19e62ef46c6c4c633c3fca96c62ce0f5019b218fe5175317e53f916e4dfc42393c70022f531814efc7cf5554ed5d113840a58348d3afab29bf3336a1ae84b23df73e9a377a0014eb25b2", 0x0, 0x8004}, {&(0x7f0000001500)="5e0e7ff531289867daf8d9c369e6223e86eee46a9ded98d6c68c7ad1eb3fc29f0ad94bd2a0b756cd1c37b41b119e105f94fe8cbeecd578189bd96cb84f163ddee5c2a035d1fa0b3475ea7578e79f39ea690d49e2c87954f3d295a010c85cfb0ef1998c15a893e76433f8121da1dd0806dedc92f44b0461df08350aec0233480de19a51321199caac5500", 0x0, 0xfff}], 0x1149002, &(0x7f0000000000)=ANY=[]) mount(&(0x7f0000434ff8)='./file0\x00', &(0x7f0000abf000)='./file0\x00', &(0x7f0000000080)='ocfs2_dlmfs\x00', 0x10233ff, 0x0) unlink(&(0x7f00003b3000)='./file0\x00') dup2(r0, r1) 07:10:35 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0xfff, 0x80000) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000380)={0x0, 0x5}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0fff5)='/dev/audio\x00', 0x42801, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000480)={0x1}) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x24, &(0x7f0000000500)=0xffffffffffff0001, 0x4) ioctl(r2, 0x4000008912, &(0x7f0000000100)="2957e1311f16f477671070") ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000540)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000580)={@mcast1={0xff, 0x1, [], 0x1}, @remote={0xfe, 0x80, [], 0xbb}, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x9, 0x81, 0xa7, 0x400, 0xffff, 0xa00010, r3}) ioctl$int_in(r1, 0x5421, &(0x7f0000003ff8)=0x80) openat$rfkill(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/rfkill\x00', 0x400000, 0x0) write$vnet(r1, &(0x7f0000000140)={0x1, {&(0x7f0000000000)=""/53, 0x35, &(0x7f0000000040)=""/82}}, 0x68) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x2d, &(0x7f00000003c0)={0xca, {{0xa, 0x4e20, 0x9e7b, @mcast2={0xff, 0x2, [], 0x1}, 0xffffffffffffff18}}}, 0x88) close(r1) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f00000001c0)) 07:10:36 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00', 0x1}, 0x38) r1 = getpid() sched_setattr(r1, &(0x7f0000000180)={0x0, 0x2, 0x4, 0x0, 0x3}, 0x0) nanosleep(&(0x7f0000000000)={0x77359400}, &(0x7f00000001c0)) semtimedop(0x0, &(0x7f0000000140)=[{0x3, 0xfffffffffffffff9}], 0x1, &(0x7f0000efe000)={0x2000}) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x40, 0x0) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000080)={0x4, 0x1ff, 0x3}) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000003000)=[0x0, 0x0, 0x0, 0x7fff]) ioctl$TCSETA(r2, 0x5406, &(0x7f00000000c0)={0x6, 0x10000, 0x1, 0x3ff, 0x100, 0x8, 0x100, 0x57b, 0x800, 0x5a59}) 07:10:36 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x129}], 0x1) [ 403.845689] BTRFS error (device loop4): unsupported checksum algorithm 3786 [ 403.853141] BTRFS error (device loop4): superblock checksum mismatch [ 403.863799] BTRFS error (device loop4): open_ctree failed 07:10:36 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x9) [ 403.926932] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 403.934268] BTRFS error (device loop7): superblock checksum mismatch [ 403.951707] BTRFS error (device loop7): open_ctree failed 07:10:36 executing program 4: stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:36 executing program 7: stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) getegid() getgroups(0x6, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0x0, 0x0]) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:36 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x6, 0xfffffffffffffffc, 0x400003ffff9, 0x0, 0x8000000000000}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="bc00000000000000000000200000000002009500000000000000"], &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x450, &(0x7f000000cf3d)=""/195}, 0x48) 07:10:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)="746872656164656410", 0x9) 07:10:36 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1003}], 0x1) 07:10:36 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0xc5c) [ 404.141262] BTRFS error (device loop4): unsupported checksum algorithm 3786 [ 404.148516] BTRFS error (device loop4): superblock checksum mismatch [ 404.155752] BTRFS error (device loop4): open_ctree failed 07:10:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:36 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bpf$MAP_CREATE(0x0, &(0x7f0000000280), 0x7) r1 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0), 0x9}, 0x20) r2 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x10000) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f0000000300)=r2, 0xa0) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000140)=@nfc_llcp, 0x80, &(0x7f0000000000)=[{&(0x7f0000000280)=""/103, 0x67}], 0x1, &(0x7f0000000340)=""/171, 0xab}, 0x0) sendmsg$kcm(r1, &(0x7f0000000100)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x2a, &(0x7f0000000000), 0x1}, 0x0) [ 404.227600] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 404.234925] BTRFS error (device loop7): superblock checksum mismatch 07:10:36 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xb) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x4, 0x3b}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={r1, 0x9, 0x5, 0x60f7, 0x1, 0x5}, 0x14) 07:10:36 executing program 7: stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) getegid() getgroups(0x6, &(0x7f0000000180)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0x0, 0x0]) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000240)) [ 404.277875] BTRFS error (device loop7): open_ctree failed 07:10:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)="74687265616465648b", 0x9) [ 404.405446] BTRFS error (device loop4): unsupported checksum algorithm 3786 [ 404.412736] BTRFS error (device loop4): superblock checksum mismatch [ 404.428677] BTRFS error (device loop4): open_ctree failed [ 404.480268] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 404.487567] BTRFS error (device loop7): superblock checksum mismatch [ 404.496736] BTRFS error (device loop7): open_ctree failed 07:10:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) write$P9_RLCREATE(r0, &(0x7f0000000000)={0x18, 0xf, 0x2, {{0x8, 0x3, 0x5}, 0x9}}, 0x18) 07:10:37 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1068}], 0x1) 07:10:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x3}}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x101100, 0x120) ioctl$SG_SET_DEBUG(r2, 0x227e, &(0x7f0000000140)) clone(0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f0000000340)=""/4096) 07:10:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x1, 0x5d, &(0x7f0000000580), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000a000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000000)="0f20d86635080000000f22d866b9120400000f320f01dfbaf80c66b8b0f20d8166efbafc0c66b80400000066ef0f20d86635200000000f22d86600ef66b8810000000f23c00f21f8663500000f000f23f8b82d010f00d0f08246f4000f07", 0x5e}], 0x1, 0x0, &(0x7f0000000140), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) getpeername(r2, &(0x7f0000000180)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000200)=0x80) setsockopt$inet6_MCAST_LEAVE_GROUP(r3, 0x29, 0x2d, &(0x7f00000002c0)={0x3, {{0xa, 0x4e20, 0x5, @remote={0xfe, 0x80, [], 0xbb}, 0x9}}}, 0x88) 07:10:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000240)) 07:10:37 executing program 7: stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) getegid() syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:37 executing program 6: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x1c3}, 0xfffffffffffffd8f) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x6, 0x200402) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000040)={0x3f, 0xa6, 0x9}) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x80, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 07:10:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:10:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x40000, 0x0) close(r1) readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) 07:10:37 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x3b9}], 0x1) 07:10:37 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000100)=[{0x5, 0x77, 0x9, 0x100}]}, 0x10) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) getuid() write$sndseq(r4, &(0x7f0000011fd2), 0xfff6) fallocate(r4, 0x8, 0x0, 0x8000) creat(&(0x7f0000000000)='./file0\x00', 0x0) dup2(r1, r3) [ 405.063194] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 405.070487] BTRFS error (device loop7): superblock checksum mismatch 07:10:37 executing program 6: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000140)={0x1a, 0x33f, 0x0, 0x9c0, 0x0, 0x6d73}, 0x10) 07:10:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000240)) 07:10:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={r1, 0xfffffffffffffffa, 0x1, 0x4, 0xef94, 0x67}, &(0x7f00000000c0)=0x14) readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) [ 405.110344] BTRFS error (device loop7): open_ctree failed 07:10:37 executing program 7: stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)="74687265616465647f", 0x9) 07:10:37 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1c5}], 0x1) 07:10:37 executing program 6: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="025cc83d6d345f8f760070") r1 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000180)={0x4, 0x0, &(0x7f0000005fd4)=ANY=[@ANYBLOB="11634840"], 0x0, 0x0, &(0x7f0000002000)}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000000)=[@register_looper={0x630b}], 0x1, 0x0, &(0x7f0000000040)="f0"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000300)={0x4c, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='\x00c@@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000080)=ANY=[], @ANYPTR=&(0x7f0000000180)=ANY=[], @ANYBLOB="cc09000000000000d0004245d87d6dd477e3"], 0x0, 0x0, &(0x7f0000000280)}) 07:10:37 executing program 3: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x3}}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x101100, 0x120) ioctl$SG_SET_DEBUG(r2, 0x227e, &(0x7f0000000140)) clone(0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f0000000340)=""/4096) 07:10:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000000)=0x1000, 0xffffffffffffff0c) 07:10:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000240)) [ 405.373251] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 405.380495] BTRFS error (device loop7): superblock checksum mismatch [ 405.403471] BTRFS error (device loop7): open_ctree failed 07:10:37 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) [ 405.542204] binder: 26737:26746 ERROR: BC_REGISTER_LOOPER called without request [ 405.584829] binder: 26737:26746 got new transaction with bad transaction stack, transaction 100 has target 26737:26746 [ 405.595955] binder: 26737:26746 transaction failed 29201/-71, size 0-0 line 2879 07:10:37 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x41b}], 0x1) 07:10:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) signalfd4(r0, &(0x7f0000000000)={0x200000010000000}, 0x8, 0x80800) 07:10:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) [ 405.657369] BTRFS error (device loop7): unsupported checksum algorithm 3786 [ 405.664742] BTRFS error (device loop7): superblock checksum mismatch [ 405.697457] BTRFS error (device loop7): open_ctree failed [ 405.700104] binder_alloc: binder_alloc_mmap_handler: 26737 20001000-20004000 already mapped failed -16 [ 405.730906] binder: BINDER_SET_CONTEXT_MGR already set [ 405.759484] binder: 26737:26765 ERROR: BC_REGISTER_LOOPER called without request [ 405.760768] binder: 26737:26746 ioctl 40046207 0 returned -16 [ 405.793464] binder_alloc: 26737: binder_alloc_buf, no vma [ 405.799233] binder: 26737:26760 transaction failed 29189/-3, size 0-0 line 2967 [ 405.808456] binder_alloc: 26737: binder_alloc_buf, no vma [ 405.814140] binder: 26737:26767 transaction failed 29189/-3, size 0-0 line 2967 [ 405.822421] binder: release 26737:26746 transaction 100 out, still active [ 405.829479] binder: undelivered TRANSACTION_COMPLETE [ 405.834646] binder: undelivered TRANSACTION_ERROR: 29201 [ 405.868618] binder: undelivered TRANSACTION_ERROR: 29189 [ 405.874411] binder: undelivered TRANSACTION_ERROR: 29189 [ 405.886899] binder: release 26737:26746 transaction 100 in, still active [ 405.893923] binder: send failed reply for transaction 100, target dead 07:10:38 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@loopback={0x0, 0x1}}) getrlimit(0x0, &(0x7f00000000c0)) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0c0583b, &(0x7f0000000040)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2000, 0x0) 07:10:38 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000240)) 07:10:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)="96b2fdbcc9443f521c8e20358f32b82ced0967453c19f5dc154312235f16c02b5b0cc69961d011e3665c40e261a65466e84d2370abc4f1888d36e57070") readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) 07:10:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:38 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1bc}], 0x1) 07:10:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:10:38 executing program 3: socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000000)='dev ', 0x0) ftruncate(r2, 0x40001) sendfile(r1, r2, &(0x7f0000001000), 0x400000000fee) recvmmsg(r0, &(0x7f0000000800)=[{{&(0x7f00000000c0)=@nfc, 0x0, &(0x7f0000000940)=[{&(0x7f0000000880)=""/123}], 0x0, &(0x7f0000000680)=""/108}}, {{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000700)=""/164}], 0x3c3}}], 0x1b1, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)) ioctl$fiemap(r3, 0xc0189436, &(0x7f00000002c0)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000200000080000000056c08474cafc5a448bfdfc8c49c64f32a3a79285bebf1bd6b7b6489e6b7782674b4a0baeb16ec6fcdfe3c5d11530f3df146c71bfb0615d91eb4cfefda69fb6c8ddc3c28d9536e04e817dc5073362f4a0aa0073f3c51b0209eb8d10cf445e79b3b2d7c1fdbde8d5af53815a07adccaab3631cbe7f0e545019f7f79d9be66b685f81cf8cd2cec7f26765f8be0637a36a7c1b77200226212f468c856d8ccced9e5a0f0243aab02b90611cdb3059ef1ceb993353fef87f2e0d18775227f508"]) 07:10:38 executing program 1: socket$pppoe(0x18, 0x1, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='wlan1#vboxnet1selinuxwlan0posix_acl_access+}+self\x00'}, 0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x8, 0x7ff, 0x40, 0x7f, 0x7c7}, &(0x7f0000000140)=0x14) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={r1, 0x7, 0x30}, 0xc) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) gettid() r2 = getpid() r3 = syz_open_procfs(r2, &(0x7f0000000100)="6e462343ca707800") readv(r3, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) 07:10:38 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000240)) [ 406.250350] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 406.257842] BTRFS error (device loop6): superblock checksum mismatch 07:10:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:38 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0xdd}], 0x1) [ 406.295477] BTRFS error (device loop6): open_ctree failed 07:10:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:10:38 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f0000000240)="640fbe0af0f75100ba420066ed360faa66b9800000c00f326635000800000f308221990fc71e27000f216d260f2134baf80c66b82735ea8166efbafc0cb06cee", 0x40}], 0x1, 0x8000000022, &(0x7f00000000c0)=[@cr4={0x1, 0xb987a233691e0619}], 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x10004, 0x0, 0x0, 0x2000, &(0x7f0000017000/0x2000)=nil}) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000040)=ANY=[@ANYBLOB="0200000004897300"]) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:10:38 executing program 3: syz_emit_ethernet(0x32, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb0800460000240000000000219078ac1414bbac1414aaffff00000401907800e5704400cd98e812cbb58a697ca2593d197bbb60040e01f795be99fff8c0687a42ba14c7981aca7266d209e93a2d78c828dfa74c8c157d84e318e3331313d51c6f91f01ac625065bb8bbec46e553dd01f4d1963d261ae2969cf06b27174f99fc9d7505035905c51abd98c00beeaf27e22aefa01747528907b1"], &(0x7f0000000100)) 07:10:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_names\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) 07:10:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:38 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000240)) 07:10:38 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x218}], 0x1) 07:10:38 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x80000, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@ipmr_delroute={0x24, 0x19, 0x300, 0x70bd2a, 0x25dfdbff, {0x80, 0xb4, 0x0, 0xaf6, 0x0, 0x5, 0x0, 0x0, 0x400}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x4) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0xe0000304, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x3, {0x2, 0x0, @multicast2=0xe0000002}, 'lo\x00'}) [ 406.591263] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 406.598614] BTRFS error (device loop6): superblock checksum mismatch 07:10:38 executing program 3: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='posix_acl_access\x00'}, 0x10) r1 = socket$inet6(0xa, 0x3, 0xff) bind$rds(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet6(r1, &(0x7f0000000100), 0x300, 0x0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x9}, 0x1c) 07:10:38 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) sigaltstack(&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000000)) 07:10:38 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614c672ecdecd385a1a7b8cac7cca0eb0cdbf1c", 0xca, 0x10000}], 0x0, &(0x7f0000000240)) [ 406.648283] BTRFS error (device loop6): open_ctree failed 07:10:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:10:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:39 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:39 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000014c0)={0x0, @in6={{0xa, 0x4e24, 0x1b, @local={0xfe, 0x80, [], 0xaa}, 0x9}}, 0x7, 0x80, 0x8, 0x9}, &(0x7f0000000080)=0x98) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000003c0)={r1, 0x1000, "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"}, &(0x7f0000000240)=0x1008) syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0x9e, 0x600201) r2 = socket$inet(0x2, 0x3, 0x2) syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0x3, 0x101140) getsockopt(r2, 0x0, 0xd0, &(0x7f00000002c0)=""/203, &(0x7f0000000000)=0x27b) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000100)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000000000000000000000000000000000000007a8a21a7a5e9c94274130e5a9cee0000000000000000000000f574ddbd000000000000021789174399ec581e2cc9f53bb09a272ee27c918dc6f018638f9df740e69f63386e6f3d409a7f258b7233b57a101acbbf21e2376f959e8304d01f368e65ee608c5ecc08206ea82c5653ed6628e3c824e07aa920e93c6b6c74396a4fe01c98037242c8066c22fb3ffa85e754147646f1231fb7e3d952a92193dc51af3d3ceca5458251b1d74ebc3d8ce75ce9d8"], 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000000, 0x8010, r3, 0x0) [ 406.876609] BTRFS error (device loop6): unsupported checksum algorithm 3786 [ 406.883871] BTRFS error (device loop6): superblock checksum mismatch 07:10:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000001280)=[{&(0x7f0000000000)=""/79, 0x4f}, {&(0x7f0000000080)=""/91, 0x5b}, {&(0x7f0000000100)=""/104, 0x68}, {&(0x7f0000001200)=""/110, 0x6e}, {&(0x7f0000000180)=""/49, 0x31}], 0x5) 07:10:39 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x7fff, 0x80) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000240)) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000200)={0x7, 0x4d}, 0x7) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@noextend='noextend', 0x2c}]}}) r3 = socket$inet6(0xa, 0x1, 0x0) ioctl(r3, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") write$P9_RREADDIR(r2, &(0x7f0000000480)={0x2a, 0x29, 0x1, {0x0, [{{}, 0x0, 0x0, 0x7, './file0'}]}}, 0x2a) write$P9_RGETATTR(r2, &(0x7f0000000140)={0xa0, 0x19, 0x1}, 0xa0) write$P9_RWALK(r2, &(0x7f0000000500)={0x9, 0x6f, 0x1}, 0x9) write$P9_RREADDIR(r2, &(0x7f0000000600)={0x2a, 0x29, 0x1, {0x0, [{{}, 0x0, 0x0, 0xfffffffffffffd34, './file0'}]}}, 0x2a) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000900)='9p\x00', 0x0, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c}) r4 = open$dir(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) close(r4) 07:10:39 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0xa00}], 0x1) [ 406.962989] BTRFS error (device loop6): open_ctree failed 07:10:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:39 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000240)) 07:10:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:10:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0x401) readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) 07:10:39 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:39 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f00000000c0), &(0x7f0000000100)=0x10) ioctl$int_in(r0, 0x5421, &(0x7f00000007c0)=0x100000001) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x84000, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000080)=0x4f) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000140)={0x1, r1}) accept(r0, &(0x7f0000000180)=@pptp={0x0, 0x0, {0x0, @broadcast}}, &(0x7f0000000040)=0x80) syz_open_dev$rtc(&(0x7f0000000200)='/dev/rtc#\x00', 0xffffffffffffffff, 0x100) 07:10:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:39 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000240)) 07:10:39 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x107a}], 0x1) 07:10:39 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r0, 0x400454ce, r1) readv(0xffffffffffffffff, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x50000, 0x0) syz_open_pts(r2, 0x100) 07:10:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:10:39 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000180)={0x1d}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000400)=0x2, 0x4) sendmsg$can_bcm(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x1d}, 0x10, &(0x7f0000000380)={&(0x7f0000000300)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "388dbba2b150d176"}}, 0x48}, 0x1}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000005d40)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x1d, r2}, 0x10, &(0x7f0000000040)={&(0x7f00000000c0)={0x5, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x8, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981ae211e6951"}}, 0x20000108}, 0x1}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000002c0)={&(0x7f0000000080)={0x1d}, 0x10, &(0x7f0000000240)={&(0x7f00000001c0)={0x7, 0x0, 0x0, {0x77359400}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "c61f2323d752075b"}}, 0x48}, 0x1}, 0x0) 07:10:39 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000014, &(0x7f0000000080)=0x80000000002, 0x4) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x1, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000000000)=ANY=[@ANYRES16=0x0], 0x2) recvfrom$inet(r0, &(0x7f0000000780)=""/240, 0xf0, 0x2, &(0x7f00000001c0)={0x2, 0x0, @multicast2=0xe0000002}, 0x930000) 07:10:39 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000240)) 07:10:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000100)={0x214, 0x101}) readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) write$binfmt_elf32(r0, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xa37, 0x5, 0x81, 0x800, 0x94e4025fbd5083d2, 0x3e, 0xffffffffffffffc0, 0x3d1, 0x38, 0x23c, 0x100000000, 0x0, 0x20, 0x1, 0x9e, 0x7fffffff, 0xff}, [{0x7, 0x8, 0x2, 0x400, 0x80, 0x7, 0x8, 0x5}, {0x6, 0x6, 0x2, 0xf11d, 0x1, 0x9, 0xced, 0x7fffffff}], "2297eea0f11b564d3eacbbe270c7588c2e8ede9f42f4b61870d68c0ff9dff41ac28e295b230d446cfa", [[], [], [], [], [], [], []]}, 0x7a1) getsockopt(r0, 0x7fff, 0x100000000, &(0x7f0000000480)=""/253, &(0x7f0000000580)=0xfd) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x100d}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r1, 0x0, 0x2, 0x4}}, 0x20) readv(r0, &(0x7f0000000400)=[{&(0x7f0000000140)=""/63, 0x3f}, {&(0x7f0000000200)=""/69, 0x45}, {&(0x7f0000000180)=""/35, 0x23}, {&(0x7f0000000280)=""/184, 0xb8}, {&(0x7f0000000340)=""/142, 0x8e}], 0x5) 07:10:39 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x200, 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000080)={0x0, 0x9, 0x8, 0x1, 0x6, 0x3, 0x9, 0x4, 0x309, 0x4a, 0x8000, 0x6}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r2 = getpgrp(0x0) r3 = gettid() rt_tgsigqueueinfo(r2, r3, 0x16, &(0x7f0000000100)={0x5, 0x9, 0x3, 0x9}) ioctl$TIOCGPTPEER(r1, 0x5406, 0xfffffffffffffffc) ioctl$TCSETS(r0, 0x5402, &(0x7f00000000c0)={0x0, 0x2e3d, 0x0, 0x8000, 0x9e4, 0x1, 0x5, 0xfffffffffffffffd, 0xdb, 0x6, 0x10000, 0x8}) 07:10:39 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)=0x0) getpriority(0x0, r0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x4a02, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0x4008af12, &(0x7f00000001c0)={0x3, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x29, &(0x7f0000000000)={0xfffffffffffffffd, @rand_addr, 0x0, 0x82040000, 'lblcr\x00'}, 0x2c) r3 = memfd_create(&(0x7f0000000100)='lblcr\x00', 0x1) ioctl$TIOCMBIC(r3, 0x5417, &(0x7f0000000140)=0x81) 07:10:39 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x83}], 0x1) 07:10:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:10:39 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:40 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') getsockname$inet(r0, &(0x7f0000000000)={0x0, 0x0, @dev}, &(0x7f0000000040)=0x10) r1 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r1, &(0x7f0000fdbff8)=[{&(0x7f0000000180)="290000002100190000003fffffffda260200000000e80001040000040d001000ea1100000025000000", 0x29}], 0x1) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) 07:10:40 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) [ 407.962781] netlink: 'syz-executor1': attribute type 16 has an invalid length. 07:10:40 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000100)={0x214, 0x101}) readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) write$binfmt_elf32(r0, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xa37, 0x5, 0x81, 0x800, 0x94e4025fbd5083d2, 0x3e, 0xffffffffffffffc0, 0x3d1, 0x38, 0x23c, 0x100000000, 0x0, 0x20, 0x1, 0x9e, 0x7fffffff, 0xff}, [{0x7, 0x8, 0x2, 0x400, 0x80, 0x7, 0x8, 0x5}, {0x6, 0x6, 0x2, 0xf11d, 0x1, 0x9, 0xced, 0x7fffffff}], "2297eea0f11b564d3eacbbe270c7588c2e8ede9f42f4b61870d68c0ff9dff41ac28e295b230d446cfa", [[], [], [], [], [], [], []]}, 0x7a1) getsockopt(r0, 0x7fff, 0x100000000, &(0x7f0000000480)=""/253, &(0x7f0000000580)=0xfd) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0x100d}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000000), r1, 0x0, 0x2, 0x4}}, 0x20) readv(r0, &(0x7f0000000400)=[{&(0x7f0000000140)=""/63, 0x3f}, {&(0x7f0000000200)=""/69, 0x45}, {&(0x7f0000000180)=""/35, 0x23}, {&(0x7f0000000280)=""/184, 0xb8}, {&(0x7f0000000340)=""/142, 0x8e}], 0x5) 07:10:40 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x59}], 0x1) 07:10:40 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)="7468726561646564ff", 0x9) [ 408.013269] netlink: 'syz-executor1': attribute type 16 has an invalid length. 07:10:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:40 executing program 1: r0 = userfaultfd(0x800) fchdir(r0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) r2 = syz_open_procfs(r1, &(0x7f0000000180)='net/snmp\x00') readv(r2, &(0x7f0000000000)=[{&(0x7f0000000200)=""/4096, 0x232}], 0x1) 07:10:40 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:43 executing program 0: socketpair(0x1e, 0x5, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x13f) connect$vsock_stream(r1, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @any=0xffffffff}, 0x10) recvmsg$kcm(r1, &(0x7f00000017c0)={&(0x7f0000000240)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000001680)=[{&(0x7f0000001640)=""/47, 0x2f}], 0x1, &(0x7f0000001740)=""/108, 0x6c}, 0x0) 07:10:43 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') getsockname$inet(r0, &(0x7f0000000000)={0x0, 0x0, @dev}, &(0x7f0000000040)=0x10) r1 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r1, &(0x7f0000fdbff8)=[{&(0x7f0000000180)="290000002100190000003fffffffda260200000000e80001040000040d001000ea1100000025000000", 0x29}], 0x1) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) 07:10:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f87357", 0x4c, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:43 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x3a0}], 0x1) 07:10:43 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:43 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:43 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000004b00)=[{{&(0x7f0000000000)=@nfc_llcp, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/20, 0x14}], 0x1, &(0x7f0000000100)=""/102, 0x66, 0x100}, 0x6}, {{&(0x7f0000000200)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @remote}}}, 0x80, &(0x7f00000046c0)=[{&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/109, 0x6d}, {&(0x7f00000003c0)=""/109, 0x6d}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000180)=""/52, 0x34}, {&(0x7f0000001440)=""/231, 0xe7}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000003580)=""/4096, 0x1000}, {&(0x7f0000004580)=""/96, 0x60}, {&(0x7f0000004600)=""/182, 0xb6}], 0xa, &(0x7f0000004780)=""/106, 0x6a, 0x8}, 0x3}, {{&(0x7f0000004800)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004a00)=[{&(0x7f0000004880)=""/144, 0x90}, {&(0x7f0000004940)=""/174, 0xae}], 0x2, &(0x7f0000004a40)=""/161, 0xa1, 0x8001}, 0x1}], 0x3, 0x20, &(0x7f0000004bc0)={0x0, 0x1c9c380}) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000004c40)={0x0, &(0x7f0000004c00)}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r1, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) 07:10:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)="7468726561646564e4", 0x9) 07:10:43 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:43 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="6e65742f726f7574650039f138cd6797d685f181ed2b8bb3615b4a916d7bcb562b93afc37553ffe1824080c96c412ad820333e0ad0f0b2bec625feb3df76c1c25bd6cc4f94b6c83cc09a72208b104aa1d5968da6d3f8db22ef076c1897259f1a39a8") readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) 07:10:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)="746872656164656403", 0x9) 07:10:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f87357", 0x4c, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:43 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0xf7}], 0x1) 07:10:43 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') getsockname$inet(r0, &(0x7f0000000000)={0x0, 0x0, @dev}, &(0x7f0000000040)=0x10) r1 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) writev(r1, &(0x7f0000fdbff8)=[{&(0x7f0000000180)="290000002100190000003fffffffda260200000000e80001040000040d001000ea1100000025000000", 0x29}], 0x1) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) [ 410.939259] netlink: 'syz-executor3': attribute type 16 has an invalid length. 07:10:43 executing program 1: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, @loopback}, &(0x7f0000000040)=0x1c, 0x80000) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x1) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r1, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) 07:10:43 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:43 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f87357", 0x4c, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:43 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x313}], 0x1) 07:10:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:10:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, &(0x7f0000000240)) [ 411.301650] netlink: 'syz-executor3': attribute type 16 has an invalid length. 07:10:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="6e65742f726f75747100f7476d83c959c9e12e302241601de08c1fafaaa6fe1a1e2dd5752193af3d2dd213ad0db252692001000080906ac1d8d9efc73583a81a065f62cce6cd90c8dddbb033af48d82c15db5605233acb5318d67773a53f399af6e678246c3b22b0855224c69eb2a11897ac3e1636891892146f2a56f86925052838a889bb5a5cb4f25310f734421d7aeb92") readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) 07:10:43 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:43 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:43 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x298}], 0x1) 07:10:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f87357", 0x4c, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:43 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000000400)={0x3, 0x0, [{0x0, 0x0, 0x1a}, {0x217}, {0x0, 0x0, 0x21050c69}]}) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x78) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)=ANY=[@ANYRES32=0x0, @ANYBLOB="8a000000f668c5066a6338d2ffcfe01337bb651656414e0fb0a41e82b497cb4ea8aa32d6ab7ffba19da8f86180ab4d3bf2529d071500005561b3d98d40d2d35b33313b49e32e81c3b5488bcad5dfae17f9f153a6d96ec66b76f9f5a39510b71ff0af9ed4f7db7bdfce5590c61319fe55c7b44f14969f141f4c7277f97914f9d3b4f6cac7da29d188"], &(0x7f00000002c0)=0x92) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000300)={0x1ff, 0x2, 0x8209, 0x0, 0x9, 0x7, 0x1, 0x9, r1}, &(0x7f0000000340)=0x20) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000180)={0x6, 0xffffffffffff7fff}) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000380)={@multicast1=0xe0000001, @broadcast=0xffffffff}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') ioctl$VT_RESIZE(r0, 0x5609, &(0x7f00000003c0)={0x5, 0x8, 0x81}) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x1) readv(r2, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) 07:10:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:10:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, &(0x7f0000000240)) [ 411.730444] print_req_error: I/O error, dev loop6, sector 128 07:10:44 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f87357", 0x4c, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:44 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000240)) 07:10:44 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1ca}], 0x1) 07:10:44 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7fc, 0x4800) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/sockstat\x00') readv(r1, &(0x7f0000002540)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000080)=0x6) 07:10:44 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:10:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000240)) 07:10:44 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:44 executing program 1: readv(0xffffffffffffffff, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) uselib(&(0x7f0000000080)='./file0\x00') 07:10:44 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:44 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x33c}], 0x1) 07:10:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000240)) 07:10:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000240)) 07:10:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:10:44 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:44 executing program 1: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) r1 = socket$inet6(0xa, 0x5, 0x8) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r1}) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r2, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) r3 = dup3(r2, r2, 0x80000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x20, 0x7}, &(0x7f0000000180)=0x90) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={r4, 0x2}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000040)=0x8) 07:10:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:44 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:44 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1a8}], 0x1) 07:10:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:44 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:45 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000240)) 07:10:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:10:45 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x20002400}], 0x1) 07:10:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000000)=0x7) readv(r0, &(0x7f0000002540), 0x0) 07:10:45 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:45 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f87357", 0x4c, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:45 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="025cc83d6d345f8f762070") prctl$intptr(0x34, 0x0) r1 = getpid() r2 = syz_open_procfs(r1, &(0x7f00000002c0)="9455b62b726f75746500fabb915fe41569fdbe261f8c437ba9e1e0f9f088f4fcd33dee6b171d2976c585eac1c58e640f14d4992ffcf14ad8b374b1909740bb632b360ad449eb1e32d399c81bff0f000000000000a68f0b50dbdcea8a37a824e8b97606a45a7e62e622c99f67d56e62ed5ef0f32b941944d80ed3441c6aef59f483de4e0d3debf28088e1f4ee1b40a161") ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r2, 0x408c5333, &(0x7f0000000080)={0x6, 0x1, 0x3, 'queue0\x00'}) readv(r2, &(0x7f0000002540), 0x0) 07:10:45 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000240)) 07:10:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\b', 0x9) 07:10:45 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:45 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x8a}], 0x1) 07:10:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80002, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 07:10:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a22997", 0x26, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:45 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:45 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:45 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x327}], 0x1) 07:10:45 executing program 1: readv(0xffffffffffffffff, &(0x7f0000002540), 0x31b) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={r0, 0x2c, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0x3, @mcast2={0xff, 0x2, [], 0x1}, 0x6}, @in={0x2, 0x4e20, @broadcast=0xffffffff}]}, &(0x7f0000000140)=0x10) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x14480, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f00000001c0)={r0, @in={{0x2, 0x4e20, @broadcast=0xffffffff}}, 0x4, 0x9, 0x0, 0x4737, 0x8}, &(0x7f0000000280)=0x98) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000000)) 07:10:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)="7468726561646564ff", 0x9) 07:10:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a22997", 0x26, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:46 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000000c0)=0x2a8, 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x68) 07:10:46 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a22997", 0x26, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:46 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x228}], 0x1) 07:10:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)="7468726561646564f0", 0x9) 07:10:46 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:46 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x40000, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='nem/ud06\x00') readv(r1, &(0x7f0000000100)=[{&(0x7f0000001540)=""/4096, 0xffffffd3}], 0x1) 07:10:46 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001", 0x39, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:46 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x70}], 0x1) 07:10:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000000)) 07:10:46 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:46 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001", 0x39, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:10:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) 07:10:46 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1ad}], 0x1) 07:10:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:46 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:46 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000040)={0x3, 0x1000, &(0x7f0000000180)="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"}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) r2 = syz_open_procfs(r1, &(0x7f0000000140)='smaps_rollup\x00') ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000080)) 07:10:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001", 0x39, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:47 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x3e8}], 0x1) 07:10:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:10:47 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:47 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') r1 = gettid() setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x4, 0x0, 0x9a, 0x101, 0x0, 0x2, 0x3, 0x0, 0x0, 0x20, 0x3ff}, 0xb) r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/tcp\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000280)={0x8, 0x8, 0x8, 0x9, 0x0, 0x6, 0x3, 0x6, 0x0}, &(0x7f00000002c0)=0x20) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000300)={r3, 0x8, 0x6, 0xffffffffffff60e2, 0x4, 0x30}, &(0x7f0000000340)=0x14) socket$pppoe(0x18, 0x1, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)={0x0, 0x6d}, &(0x7f0000000080)=0x36a) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000000c0)={r4, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x1, 0x6}, 0x90) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) 07:10:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248", 0x43, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:47 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x203}], 0x1) 07:10:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:10:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:47 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r1, 0x2}}, 0x18) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bridge_slave_1\x00') 07:10:47 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248", 0x43, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000040)=0x4) 07:10:47 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x45}], 0x1) 07:10:47 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)="7468726561646564ff", 0x9) 07:10:47 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f87357", 0x4c, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="29000006000000000000000300000000000000000000000000000000"], 0x29) 07:10:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:47 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:47 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x2cc}], 0x1) 07:10:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248", 0x43, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:48 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)="7468726561646564f0", 0x9) 07:10:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) ioctl$VHOST_SET_VRING_NUM(r0, 0x4008af10, &(0x7f0000000000)={0x2, 0x7ff}) 07:10:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 07:10:48 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:48 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0xf6}], 0x1) 07:10:48 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:10:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) getsockname(r0, &(0x7f0000000000)=@rc, &(0x7f0000000080)=0x80) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x400000, 0xa8, 0x7f, 0x6, 0x7}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000200)={r1, @in={{0x2, 0x4e23, @loopback=0x7f000001}}, 0x6, 0xa7d4}, &(0x7f0000000140)=0x90) 07:10:48 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 07:10:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:48 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:48 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x2f9}], 0x1) 07:10:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) 07:10:48 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 07:10:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:10:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 07:10:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x40fffe, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) 07:10:48 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:48 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 07:10:48 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1200}], 0x1) 07:10:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:10:49 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ptype\x00') setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000080)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r1, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000000)) 07:10:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:49 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:49 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 07:10:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='maps\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x3bd) 07:10:49 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x451}], 0x1) 07:10:49 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:10:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/228, 0xff00}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000000140)}, {&(0x7f0000001200)=""/152, 0x98}], 0x4) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x840) 07:10:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380), 0x0, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:49 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:10:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:49 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x29}], 0x1) 07:10:49 executing program 7 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, &(0x7f0000000240)) [ 417.606511] FAULT_INJECTION: forcing a failure. [ 417.606511] name failslab, interval 1, probability 0, space 0, times 0 [ 417.617831] CPU: 1 PID: 28050 Comm: syz-executor7 Not tainted 4.18.0-rc5+ #149 [ 417.625199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 417.634554] Call Trace: [ 417.637156] dump_stack+0x1c9/0x2b4 [ 417.640801] ? dump_stack_print_info.cold.2+0x52/0x52 [ 417.646018] should_fail.cold.4+0xa/0x1a [ 417.650094] ? fault_create_debugfs_attr+0x1f0/0x1f0 07:10:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') readv(r0, &(0x7f0000000000), 0x0) [ 417.655214] ? lock_downgrade+0x8f0/0x8f0 [ 417.659377] ? proc_fail_nth_write+0x9e/0x210 [ 417.663883] ? proc_cwd_link+0x1d0/0x1d0 [ 417.667962] ? find_held_lock+0x36/0x1c0 [ 417.672054] ? check_same_owner+0x340/0x340 [ 417.676396] ? rcu_note_context_switch+0x730/0x730 [ 417.681338] __should_failslab+0x124/0x180 [ 417.685586] should_failslab+0x9/0x14 [ 417.689481] __kmalloc+0x2c8/0x760 [ 417.693028] ? strncpy_from_user+0x510/0x510 [ 417.697444] ? fput+0x130/0x1a0 [ 417.700735] ? __x64_sys_memfd_create+0x142/0x4f0 07:10:49 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:49 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x183}], 0x1) [ 417.705597] __x64_sys_memfd_create+0x142/0x4f0 [ 417.710278] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 417.715827] ? memfd_fcntl+0x1400/0x1400 [ 417.719898] ? do_syscall_64+0x9a/0x820 [ 417.723888] do_syscall_64+0x1b9/0x820 [ 417.728044] ? finish_task_switch+0x1d3/0x870 [ 417.732643] ? syscall_return_slowpath+0x5e0/0x5e0 [ 417.737583] ? syscall_return_slowpath+0x31d/0x5e0 [ 417.742530] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 417.747901] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 417.752778] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 417.757972] RIP: 0033:0x455ab9 [ 417.761164] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 417.780534] RSP: 002b:00007fc3c351fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 417.788259] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000455ab9 [ 417.795535] RDX: 0000000020000158 RSI: 0000000000000000 RDI: 00000000004ba6a1 07:10:50 executing program 4 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)="746872656164656401", 0x9) [ 417.802899] RBP: 000000000072bea0 R08: 0000000020000158 R09: 00000000fbad8001 [ 417.810176] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 417.817450] R13: 00000000004c21cd R14: 00000000004d3c48 R15: 0000000000000000 07:10:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:50 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)}, {&(0x7f0000000080)=""/181, 0xb5}, {&(0x7f0000000140)=""/119, 0x77}, {&(0x7f0000000200)=""/219, 0xdb}, {&(0x7f0000000300)=""/21, 0x15}, {&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/174, 0xae}], 0x7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r1, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) syz_extract_tcp_res(&(0x7f0000000040), 0x8, 0x2800000000000) 07:10:50 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 07:10:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) [ 417.968549] FAULT_INJECTION: forcing a failure. [ 417.968549] name failslab, interval 1, probability 0, space 0, times 0 [ 417.979945] CPU: 1 PID: 28080 Comm: syz-executor4 Not tainted 4.18.0-rc5+ #149 [ 417.987316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 417.996674] Call Trace: [ 417.999282] dump_stack+0x1c9/0x2b4 [ 418.002926] ? dump_stack_print_info.cold.2+0x52/0x52 [ 418.008134] should_fail.cold.4+0xa/0x1a [ 418.012234] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 418.017352] ? lock_downgrade+0x8f0/0x8f0 [ 418.021514] ? proc_fail_nth_write+0x9e/0x210 [ 418.026017] ? proc_cwd_link+0x1d0/0x1d0 [ 418.030092] ? find_held_lock+0x36/0x1c0 [ 418.034184] ? check_same_owner+0x340/0x340 [ 418.038517] ? rcu_note_context_switch+0x730/0x730 [ 418.043461] __should_failslab+0x124/0x180 [ 418.047708] should_failslab+0x9/0x14 [ 418.051520] __kmalloc+0x2c8/0x760 [ 418.055066] ? strncpy_from_user+0x510/0x510 [ 418.059485] ? fput+0x130/0x1a0 [ 418.062778] ? __x64_sys_memfd_create+0x142/0x4f0 [ 418.067637] __x64_sys_memfd_create+0x142/0x4f0 [ 418.072324] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 418.077870] ? memfd_fcntl+0x1400/0x1400 [ 418.081943] ? do_syscall_64+0x9a/0x820 [ 418.085934] do_syscall_64+0x1b9/0x820 [ 418.089835] ? syscall_return_slowpath+0x5e0/0x5e0 [ 418.094779] ? syscall_return_slowpath+0x31d/0x5e0 [ 418.099732] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 418.105108] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 418.109965] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 418.115158] RIP: 0033:0x455ab9 07:10:50 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x3fe}], 0x1) [ 418.118345] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 418.137730] RSP: 002b:00007f4e3debea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 418.145454] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000455ab9 [ 418.152817] RDX: 0000000020000158 RSI: 0000000000000000 RDI: 00000000004ba6a1 [ 418.160096] RBP: 000000000072bea0 R08: 0000000020000158 R09: 00000000fbad8001 07:10:50 executing program 7 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 418.167374] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 418.174651] R13: 00000000004c21cd R14: 00000000004d3c48 R15: 0000000000000000 07:10:50 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x10001) readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) 07:10:50 executing program 4 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:50 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 07:10:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:10:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:50 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1100}], 0x1) 07:10:50 executing program 1: getpid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) r0 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x6, 0x0) r1 = gettid() ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000200)={0x7, 0x2}) r2 = syz_open_procfs(r1, &(0x7f0000000040)='cpuset\x00') readv(r2, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={{0x93e9, 0xffff, 0x8, 0x3, 0x400, 0xa36}, 0x3}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000140)=0x8) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000001c0)) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000180)={r3, 0xffe8}, 0x8) [ 418.377112] FAULT_INJECTION: forcing a failure. [ 418.377112] name failslab, interval 1, probability 0, space 0, times 0 [ 418.388448] CPU: 0 PID: 28120 Comm: syz-executor4 Not tainted 4.18.0-rc5+ #149 [ 418.395830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 418.405176] Call Trace: [ 418.407799] dump_stack+0x1c9/0x2b4 [ 418.411430] ? dump_stack_print_info.cold.2+0x52/0x52 [ 418.416636] ? print_usage_bug+0xc0/0xc0 [ 418.420702] should_fail.cold.4+0xa/0x1a [ 418.424750] ? trace_hardirqs_on+0x10/0x10 [ 418.428975] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 418.434066] ? find_held_lock+0x36/0x1c0 [ 418.438119] ? find_held_lock+0x36/0x1c0 [ 418.442179] ? check_same_owner+0x340/0x340 [ 418.446490] ? rcu_note_context_switch+0x730/0x730 [ 418.451408] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 418.456424] __should_failslab+0x124/0x180 [ 418.460687] should_failslab+0x9/0x14 [ 418.464475] kmem_cache_alloc+0x2af/0x760 [ 418.468613] __d_alloc+0xc8/0xd50 [ 418.472070] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 418.477074] ? do_raw_spin_unlock+0xa7/0x2f0 [ 418.481467] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 418.486046] ? __lock_is_held+0xb5/0x140 [ 418.490105] ? _raw_spin_unlock+0x22/0x30 [ 418.494242] ? __alloc_fd+0x34e/0x710 [ 418.498042] ? exit_files+0xb0/0xb0 [ 418.501670] d_alloc_pseudo+0x1d/0x30 [ 418.505462] __shmem_file_setup+0x1f3/0x700 [ 418.509778] ? check_same_owner+0x340/0x340 [ 418.514097] ? shmem_fill_super+0xa50/0xa50 [ 418.518408] ? get_unused_fd_flags+0x122/0x1a0 [ 418.522984] ? __alloc_fd+0x710/0x710 [ 418.526776] shmem_file_setup+0x2f/0x40 [ 418.530737] __x64_sys_memfd_create+0x2af/0x4f0 [ 418.535393] ? memfd_fcntl+0x1400/0x1400 [ 418.539443] ? do_syscall_64+0x9a/0x820 [ 418.543404] do_syscall_64+0x1b9/0x820 [ 418.547284] ? finish_task_switch+0x1d3/0x870 [ 418.551782] ? syscall_return_slowpath+0x5e0/0x5e0 [ 418.556706] ? syscall_return_slowpath+0x31d/0x5e0 [ 418.561624] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 418.566994] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 418.572009] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 418.577202] RIP: 0033:0x455ab9 [ 418.580385] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 418.599614] RSP: 002b:00007f4e3debea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 418.607311] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000455ab9 [ 418.614566] RDX: 0000000020000158 RSI: 0000000000000000 RDI: 00000000004ba6a1 07:10:50 executing program 4 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 418.621819] RBP: 000000000072bea0 R08: 0000000020000158 R09: 00000000fbad8001 [ 418.629084] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 418.636349] R13: 00000000004c21cd R14: 00000000004d3c48 R15: 0000000000000001 [ 418.689748] FAULT_INJECTION: forcing a failure. [ 418.689748] name failslab, interval 1, probability 0, space 0, times 0 [ 418.701136] CPU: 1 PID: 28122 Comm: syz-executor7 Not tainted 4.18.0-rc5+ #149 [ 418.708501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 418.717845] Call Trace: [ 418.720437] dump_stack+0x1c9/0x2b4 [ 418.724075] ? dump_stack_print_info.cold.2+0x52/0x52 [ 418.729255] ? print_usage_bug+0xc0/0xc0 [ 418.733322] should_fail.cold.4+0xa/0x1a [ 418.737380] ? trace_hardirqs_on+0x10/0x10 [ 418.741603] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 418.746699] ? find_held_lock+0x36/0x1c0 [ 418.750767] ? find_held_lock+0x36/0x1c0 [ 418.754838] ? check_same_owner+0x340/0x340 [ 418.759151] ? rcu_note_context_switch+0x730/0x730 [ 418.764073] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 418.769085] __should_failslab+0x124/0x180 [ 418.773310] should_failslab+0x9/0x14 [ 418.777107] kmem_cache_alloc+0x2af/0x760 [ 418.781247] __d_alloc+0xc8/0xd50 [ 418.784694] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 418.789700] ? do_raw_spin_unlock+0xa7/0x2f0 [ 418.794096] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 418.798669] ? __lock_is_held+0xb5/0x140 [ 418.802722] ? _raw_spin_unlock+0x22/0x30 [ 418.806860] ? __alloc_fd+0x34e/0x710 [ 418.810676] ? exit_files+0xb0/0xb0 [ 418.814293] d_alloc_pseudo+0x1d/0x30 [ 418.818084] __shmem_file_setup+0x1f3/0x700 [ 418.822392] ? check_same_owner+0x340/0x340 [ 418.826709] ? shmem_fill_super+0xa50/0xa50 [ 418.831029] ? get_unused_fd_flags+0x122/0x1a0 [ 418.835613] ? __alloc_fd+0x710/0x710 [ 418.839405] shmem_file_setup+0x2f/0x40 [ 418.843375] __x64_sys_memfd_create+0x2af/0x4f0 [ 418.848038] ? memfd_fcntl+0x1400/0x1400 [ 418.852114] ? do_syscall_64+0x9a/0x820 [ 418.856077] do_syscall_64+0x1b9/0x820 [ 418.859959] ? finish_task_switch+0x1d3/0x870 [ 418.864449] ? syscall_return_slowpath+0x5e0/0x5e0 [ 418.869366] ? syscall_return_slowpath+0x31d/0x5e0 [ 418.874286] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 418.879644] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 418.884476] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 418.889651] RIP: 0033:0x455ab9 [ 418.892822] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 418.912040] RSP: 002b:00007fc3c351fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 418.919749] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000455ab9 [ 418.927017] RDX: 0000000020000158 RSI: 0000000000000000 RDI: 00000000004ba6a1 07:10:51 executing program 7 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 418.934278] RBP: 000000000072bea0 R08: 0000000020000158 R09: 00000000fbad8001 [ 418.941534] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 418.948791] R13: 00000000004c21cd R14: 00000000004d3c48 R15: 0000000000000001 [ 419.143176] FAULT_INJECTION: forcing a failure. [ 419.143176] name failslab, interval 1, probability 0, space 0, times 0 [ 419.154628] CPU: 1 PID: 28146 Comm: syz-executor4 Not tainted 4.18.0-rc5+ #149 [ 419.162004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 419.171362] Call Trace: [ 419.173958] dump_stack+0x1c9/0x2b4 [ 419.177606] ? dump_stack_print_info.cold.2+0x52/0x52 [ 419.182849] ? __kernel_text_address+0xd/0x40 [ 419.187382] should_fail.cold.4+0xa/0x1a 07:10:51 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 07:10:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') ioctl$KIOCSOUND(r0, 0x4b2f, 0xff) readv(r0, &(0x7f0000000040)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) r1 = getpgid(0xffffffffffffffff) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000080)="7c03326b25171c4094f97079b204e5facf004a2526cd9e0dceb7c6d1c7b288709a1759329461c5966ad208c5eec8350ad47edb308378a117d671862c9765c76822a49f0ad4c9e9862ea25860095928c637ca2a33865524202bb7f955c847f46cb5553b17a3237c89cbaf204ae73a14ee11b9f7dad26d1e48dc003b8f4351de722827c90e211906cbf09836dfc3b3b7e18d", &(0x7f0000000140)="309fee3c48b1cf15e151db3df46cc75ccb549389fdf655d090b659e70e4cc9db5c287389e89addb1354b4483a5b5ad367e5f5b4b8482cd387d09c10c204703ad87d9f0360100839fb4d89d7727b293", 0x2}, 0x20) socket$bt_rfcomm(0x1f, 0x3, 0x3) sched_setaffinity(r1, 0x8, &(0x7f0000000000)=0xa270) [ 419.191462] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 419.196583] ? save_stack+0xa9/0xd0 [ 419.200230] ? save_stack+0x43/0xd0 [ 419.203868] ? kasan_kmalloc+0xc4/0xe0 [ 419.207769] ? kasan_slab_alloc+0x12/0x20 [ 419.211929] ? kmem_cache_alloc+0x12e/0x760 [ 419.216261] ? __d_alloc+0xc8/0xd50 [ 419.219901] ? d_alloc_pseudo+0x1d/0x30 [ 419.223886] ? __shmem_file_setup+0x1f3/0x700 [ 419.228418] ? shmem_file_setup+0x2f/0x40 [ 419.232589] ? find_held_lock+0x36/0x1c0 [ 419.236686] ? check_same_owner+0x340/0x340 [ 419.241021] ? rcu_note_context_switch+0x730/0x730 [ 419.245960] ? kasan_check_read+0x11/0x20 [ 419.250223] __should_failslab+0x124/0x180 [ 419.254735] should_failslab+0x9/0x14 [ 419.259443] kmem_cache_alloc+0x2af/0x760 [ 419.263613] ? rcu_read_lock_sched_held+0x108/0x120 [ 419.268662] ? kmem_cache_alloc+0x5fa/0x760 [ 419.272998] ? shmem_destroy_callback+0xc0/0xc0 [ 419.277686] shmem_alloc_inode+0x1b/0x40 [ 419.281762] alloc_inode+0x63/0x190 [ 419.285407] new_inode_pseudo+0x71/0x1a0 [ 419.289481] ? prune_icache_sb+0x1b0/0x1b0 [ 419.293698] FAULT_INJECTION: forcing a failure. [ 419.293698] name failslab, interval 1, probability 0, space 0, times 0 [ 419.293735] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 419.309922] new_inode+0x1c/0x40 [ 419.313292] shmem_get_inode+0xf1/0x910 [ 419.317270] ? shmem_encode_fh+0x340/0x340 [ 419.321499] ? _raw_spin_unlock+0x22/0x30 [ 419.325643] ? __alloc_fd+0x34e/0x710 [ 419.329444] ? exit_files+0xb0/0xb0 [ 419.333091] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 419.338628] __shmem_file_setup+0x259/0x700 [ 419.342942] ? check_same_owner+0x340/0x340 [ 419.347259] ? shmem_fill_super+0xa50/0xa50 [ 419.351575] ? get_unused_fd_flags+0x122/0x1a0 [ 419.356152] ? __alloc_fd+0x710/0x710 [ 419.359953] shmem_file_setup+0x2f/0x40 [ 419.363925] __x64_sys_memfd_create+0x2af/0x4f0 [ 419.368610] ? memfd_fcntl+0x1400/0x1400 [ 419.372669] ? do_syscall_64+0x9a/0x820 [ 419.376646] do_syscall_64+0x1b9/0x820 [ 419.380528] ? finish_task_switch+0x1d3/0x870 [ 419.385022] ? syscall_return_slowpath+0x5e0/0x5e0 [ 419.389951] ? syscall_return_slowpath+0x31d/0x5e0 [ 419.394880] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 419.400248] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 419.405093] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 419.410272] RIP: 0033:0x455ab9 [ 419.413449] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 419.432765] RSP: 002b:00007f4e3debea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 419.440478] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000455ab9 [ 419.447738] RDX: 0000000020000158 RSI: 0000000000000000 RDI: 00000000004ba6a1 [ 419.454999] RBP: 000000000072bea0 R08: 0000000020000158 R09: 00000000fbad8001 [ 419.462261] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 419.469522] R13: 00000000004c21cd R14: 00000000004d3c48 R15: 0000000000000002 [ 419.476805] CPU: 0 PID: 28151 Comm: syz-executor7 Not tainted 4.18.0-rc5+ #149 [ 419.484171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 07:10:51 executing program 4 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 419.493521] Call Trace: [ 419.496144] dump_stack+0x1c9/0x2b4 [ 419.499783] ? dump_stack_print_info.cold.2+0x52/0x52 [ 419.504984] ? __kernel_text_address+0xd/0x40 [ 419.509499] should_fail.cold.4+0xa/0x1a [ 419.513568] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 419.518684] ? save_stack+0xa9/0xd0 [ 419.522308] ? save_stack+0x43/0xd0 [ 419.525932] ? kasan_kmalloc+0xc4/0xe0 [ 419.529812] ? kasan_slab_alloc+0x12/0x20 [ 419.533944] ? kmem_cache_alloc+0x12e/0x760 [ 419.538251] ? __d_alloc+0xc8/0xd50 [ 419.541875] ? d_alloc_pseudo+0x1d/0x30 [ 419.545835] ? __shmem_file_setup+0x1f3/0x700 [ 419.550314] ? shmem_file_setup+0x2f/0x40 [ 419.554801] ? find_held_lock+0x36/0x1c0 [ 419.558857] ? check_same_owner+0x340/0x340 [ 419.563179] ? rcu_note_context_switch+0x730/0x730 [ 419.568103] ? kasan_check_read+0x11/0x20 [ 419.572240] __should_failslab+0x124/0x180 [ 419.576465] should_failslab+0x9/0x14 [ 419.580252] kmem_cache_alloc+0x2af/0x760 [ 419.584386] ? rcu_read_lock_sched_held+0x108/0x120 [ 419.589398] ? kmem_cache_alloc+0x5fa/0x760 [ 419.593722] ? shmem_destroy_callback+0xc0/0xc0 [ 419.598384] shmem_alloc_inode+0x1b/0x40 [ 419.602449] alloc_inode+0x63/0x190 [ 419.606081] new_inode_pseudo+0x71/0x1a0 [ 419.610136] ? prune_icache_sb+0x1b0/0x1b0 [ 419.614376] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 419.619387] new_inode+0x1c/0x40 [ 419.622740] shmem_get_inode+0xf1/0x910 [ 419.626714] ? shmem_encode_fh+0x340/0x340 [ 419.630943] ? _raw_spin_unlock+0x22/0x30 [ 419.635079] ? __alloc_fd+0x34e/0x710 [ 419.638878] ? exit_files+0xb0/0xb0 [ 419.642509] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 419.648044] __shmem_file_setup+0x259/0x700 [ 419.652355] ? check_same_owner+0x340/0x340 [ 419.656666] ? shmem_fill_super+0xa50/0xa50 [ 419.660973] ? get_unused_fd_flags+0x122/0x1a0 [ 419.665552] ? __alloc_fd+0x710/0x710 [ 419.669357] shmem_file_setup+0x2f/0x40 [ 419.673333] __x64_sys_memfd_create+0x2af/0x4f0 [ 419.677987] ? memfd_fcntl+0x1400/0x1400 [ 419.682044] ? do_syscall_64+0x9a/0x820 [ 419.686024] do_syscall_64+0x1b9/0x820 [ 419.689903] ? finish_task_switch+0x1d3/0x870 [ 419.694383] ? syscall_return_slowpath+0x5e0/0x5e0 [ 419.699309] ? syscall_return_slowpath+0x31d/0x5e0 [ 419.704242] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 419.709602] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 419.714452] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 419.719628] RIP: 0033:0x455ab9 [ 419.722809] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:10:52 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1004}], 0x1) 07:10:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) [ 419.742096] RSP: 002b:00007fc3c351fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 419.749803] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000455ab9 [ 419.757071] RDX: 0000000020000158 RSI: 0000000000000000 RDI: 00000000004ba6a1 [ 419.764333] RBP: 000000000072bea0 R08: 0000000020000158 R09: 00000000fbad8001 [ 419.771606] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 419.778964] R13: 00000000004c21cd R14: 00000000004d3c48 R15: 0000000000000002 07:10:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)="7468726561646564f0", 0x9) 07:10:52 executing program 7 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:52 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') recvfrom$unix(r0, &(0x7f0000000500)=""/125, 0x74, 0x1, &(0x7f0000000480)=@file={0x0, './file0\x00'}, 0x6e) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000380)={0x0, 0x1}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000400)={0x0, 0x0, 0x3, 0x7, 0x100, 0x6}, &(0x7f0000000440)=0x14) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000100)={r1, @in6={{0xa, 0x4e24, 0x9, @empty, 0xffffffff}}}, &(0x7f0000000340)=0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000240)={r2, 0x6a, "7bc70b489c2f92ee01a93543063f5bec025a8b684e9f619c1535255818967774e019cab37946e1607bbfec345cb20c5087a8aaf67758824c8f802eebe0c3a6488e569222825424d530e9cd4f0fb56e2ce3640b16f1bda5ba2052b6d4cac6db4a720b0e9477170df2144f"}, &(0x7f00000002c0)=0x72) readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@int=0x4, 0x4) 07:10:52 executing program 6 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 420.047486] FAULT_INJECTION: forcing a failure. [ 420.047486] name failslab, interval 1, probability 0, space 0, times 0 [ 420.058927] CPU: 0 PID: 28178 Comm: syz-executor4 Not tainted 4.18.0-rc5+ #149 [ 420.066298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 420.075665] Call Trace: [ 420.078277] dump_stack+0x1c9/0x2b4 [ 420.081933] ? dump_stack_print_info.cold.2+0x52/0x52 [ 420.087144] ? __lock_acquire+0x7fc/0x5020 [ 420.091412] should_fail.cold.4+0xa/0x1a [ 420.095495] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 420.100617] ? find_held_lock+0x36/0x1c0 [ 420.104693] ? graph_lock+0x170/0x170 [ 420.108514] ? find_held_lock+0x36/0x1c0 [ 420.112610] ? check_same_owner+0x340/0x340 [ 420.116933] ? graph_lock+0x170/0x170 [ 420.120737] ? rcu_note_context_switch+0x730/0x730 [ 420.125681] ? kasan_check_read+0x11/0x20 [ 420.129849] __should_failslab+0x124/0x180 [ 420.134091] should_failslab+0x9/0x14 [ 420.137910] kmem_cache_alloc+0x2af/0x760 [ 420.142068] ? find_held_lock+0x36/0x1c0 [ 420.146136] get_empty_filp+0x12d/0x530 [ 420.150110] ? proc_nr_files+0x60/0x60 [ 420.154007] ? kasan_check_read+0x11/0x20 [ 420.158180] ? do_raw_spin_unlock+0xa7/0x2f0 [ 420.162579] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 420.167152] ? kasan_check_write+0x14/0x20 [ 420.171375] ? do_raw_spin_lock+0xc1/0x200 [ 420.175611] alloc_file+0x24/0x3e0 [ 420.179147] ? clear_nlink.part.9+0x65/0x80 [ 420.183467] __shmem_file_setup+0x313/0x700 [ 420.187790] ? check_same_owner+0x340/0x340 [ 420.192119] ? shmem_fill_super+0xa50/0xa50 [ 420.196473] ? get_unused_fd_flags+0x122/0x1a0 [ 420.201065] ? __alloc_fd+0x710/0x710 [ 420.204864] shmem_file_setup+0x2f/0x40 [ 420.208840] __x64_sys_memfd_create+0x2af/0x4f0 [ 420.213498] ? memfd_fcntl+0x1400/0x1400 [ 420.217557] ? do_syscall_64+0x9a/0x820 [ 420.221550] do_syscall_64+0x1b9/0x820 [ 420.225425] ? finish_task_switch+0x1d3/0x870 [ 420.229907] ? syscall_return_slowpath+0x5e0/0x5e0 [ 420.234835] ? syscall_return_slowpath+0x31d/0x5e0 [ 420.239768] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 420.245134] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 420.249973] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 420.255152] RIP: 0033:0x455ab9 [ 420.258342] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 420.277630] RSP: 002b:00007f4e3debea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 420.285329] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000455ab9 07:10:52 executing program 4 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 420.292589] RDX: 0000000020000158 RSI: 0000000000000000 RDI: 00000000004ba6a1 [ 420.300199] RBP: 000000000072bea0 R08: 0000000020000158 R09: 00000000fbad8001 [ 420.307465] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 420.314721] R13: 00000000004c21cd R14: 00000000004d3c48 R15: 0000000000000003 07:10:52 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') ioctl$LOOP_SET_FD(r0, 0x4c00, r0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x145000, 0x0) ioctl$TIOCNXCL(r0, 0x540d) readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x545}], 0x1) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x5) [ 420.383752] FAULT_INJECTION: forcing a failure. [ 420.383752] name failslab, interval 1, probability 0, space 0, times 0 [ 420.395078] CPU: 1 PID: 28188 Comm: syz-executor7 Not tainted 4.18.0-rc5+ #149 [ 420.402452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 420.411822] Call Trace: [ 420.414407] dump_stack+0x1c9/0x2b4 [ 420.418050] ? dump_stack_print_info.cold.2+0x52/0x52 [ 420.423254] ? __lock_acquire+0x7fc/0x5020 [ 420.427520] should_fail.cold.4+0xa/0x1a [ 420.431603] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 420.436819] ? find_held_lock+0x36/0x1c0 [ 420.440890] ? graph_lock+0x170/0x170 [ 420.444715] ? find_held_lock+0x36/0x1c0 [ 420.448811] ? check_same_owner+0x340/0x340 [ 420.453145] ? graph_lock+0x170/0x170 [ 420.457060] ? rcu_note_context_switch+0x730/0x730 [ 420.462002] ? kasan_check_read+0x11/0x20 [ 420.466166] __should_failslab+0x124/0x180 [ 420.470416] should_failslab+0x9/0x14 [ 420.474247] kmem_cache_alloc+0x2af/0x760 [ 420.478405] ? find_held_lock+0x36/0x1c0 [ 420.482483] get_empty_filp+0x12d/0x530 [ 420.486473] ? proc_nr_files+0x60/0x60 [ 420.490377] ? kasan_check_read+0x11/0x20 [ 420.494534] ? do_raw_spin_unlock+0xa7/0x2f0 [ 420.498953] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 420.503546] ? kasan_check_write+0x14/0x20 [ 420.507789] ? do_raw_spin_lock+0xc1/0x200 [ 420.512036] alloc_file+0x24/0x3e0 [ 420.514518] FAULT_INJECTION: forcing a failure. [ 420.514518] name failslab, interval 1, probability 0, space 0, times 0 [ 420.515579] ? clear_nlink.part.9+0x65/0x80 [ 420.515603] __shmem_file_setup+0x313/0x700 [ 420.515620] ? check_same_owner+0x340/0x340 [ 420.515639] ? shmem_fill_super+0xa50/0xa50 [ 420.515662] ? get_unused_fd_flags+0x122/0x1a0 [ 420.548704] ? __alloc_fd+0x710/0x710 [ 420.552516] shmem_file_setup+0x2f/0x40 [ 420.556491] __x64_sys_memfd_create+0x2af/0x4f0 [ 420.561152] ? memfd_fcntl+0x1400/0x1400 [ 420.565209] ? do_syscall_64+0x9a/0x820 [ 420.569184] do_syscall_64+0x1b9/0x820 [ 420.573086] ? finish_task_switch+0x1d3/0x870 [ 420.577591] ? syscall_return_slowpath+0x5e0/0x5e0 [ 420.582521] ? syscall_return_slowpath+0x31d/0x5e0 [ 420.587452] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 420.592815] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 420.597656] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 420.602839] RIP: 0033:0x455ab9 [ 420.606015] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 420.625330] RSP: 002b:00007fc3c351fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 420.633035] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000455ab9 [ 420.640295] RDX: 0000000020000158 RSI: 0000000000000000 RDI: 00000000004ba6a1 [ 420.647557] RBP: 000000000072bea0 R08: 0000000020000158 R09: 00000000fbad8001 [ 420.654817] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 420.662077] R13: 00000000004c21cd R14: 00000000004d3c48 R15: 0000000000000003 [ 420.669360] CPU: 0 PID: 28201 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #149 [ 420.676731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 420.686174] Call Trace: [ 420.688762] dump_stack+0x1c9/0x2b4 [ 420.692385] ? dump_stack_print_info.cold.2+0x52/0x52 [ 420.697756] should_fail.cold.4+0xa/0x1a [ 420.701817] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 420.706919] ? lock_downgrade+0x8f0/0x8f0 [ 420.711066] ? proc_fail_nth_write+0x9e/0x210 [ 420.715548] ? proc_cwd_link+0x1d0/0x1d0 [ 420.719610] ? find_held_lock+0x36/0x1c0 [ 420.723679] ? check_same_owner+0x340/0x340 [ 420.727996] ? rcu_note_context_switch+0x730/0x730 [ 420.732927] __should_failslab+0x124/0x180 [ 420.737153] should_failslab+0x9/0x14 [ 420.740948] __kmalloc+0x2c8/0x760 [ 420.744500] ? strncpy_from_user+0x510/0x510 [ 420.748898] ? fput+0x130/0x1a0 [ 420.752175] ? __x64_sys_memfd_create+0x142/0x4f0 [ 420.757018] __x64_sys_memfd_create+0x142/0x4f0 [ 420.761685] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 420.767214] ? memfd_fcntl+0x1400/0x1400 [ 420.771274] ? do_syscall_64+0x9a/0x820 [ 420.775254] do_syscall_64+0x1b9/0x820 [ 420.779135] ? finish_task_switch+0x1d3/0x870 [ 420.783614] ? syscall_return_slowpath+0x5e0/0x5e0 [ 420.788535] ? syscall_return_slowpath+0x31d/0x5e0 [ 420.793475] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 420.798833] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 420.803668] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 420.808850] RIP: 0033:0x455ab9 [ 420.812026] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:10:53 executing program 7 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:53 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x44b}], 0x1) [ 420.831223] RSP: 002b:00007f9ab9648a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 420.838931] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000455ab9 [ 420.846191] RDX: 0000000020000158 RSI: 0000000000000000 RDI: 00000000004ba6a1 [ 420.853455] RBP: 000000000072bea0 R08: 0000000020000158 R09: 00000000fbad8001 [ 420.860716] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 420.867984] R13: 00000000004c21cd R14: 00000000004d3c48 R15: 0000000000000000 07:10:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:53 executing program 6 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 420.970672] FAULT_INJECTION: forcing a failure. [ 420.970672] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 420.983087] CPU: 0 PID: 28209 Comm: syz-executor4 Not tainted 4.18.0-rc5+ #149 [ 420.990465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 420.999808] Call Trace: [ 421.002389] dump_stack+0x1c9/0x2b4 [ 421.006009] ? dump_stack_print_info.cold.2+0x52/0x52 [ 421.011194] ? __radix_tree_lookup+0x3dd/0x6e0 [ 421.015778] should_fail.cold.4+0xa/0x1a [ 421.019842] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 421.024967] ? graph_lock+0x170/0x170 [ 421.028767] ? find_held_lock+0x36/0x1c0 [ 421.032831] ? find_held_lock+0x36/0x1c0 [ 421.036882] ? __lock_is_held+0xb5/0x140 [ 421.040959] ? check_same_owner+0x340/0x340 [ 421.045279] ? rcu_note_context_switch+0x730/0x730 [ 421.050214] __alloc_pages_nodemask+0x36e/0xdb0 [ 421.054908] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 421.059929] ? trace_hardirqs_on+0x10/0x10 [ 421.064166] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 421.069186] ? percpu_counter_add_batch+0xf2/0x150 [ 421.074119] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 421.079130] ? __vm_enough_memory+0x590/0x980 [ 421.083612] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 421.089138] alloc_pages_vma+0xdd/0x540 [ 421.093108] shmem_alloc_page+0xa8/0x190 [ 421.097161] ? shmem_swapin+0x230/0x230 [ 421.101132] ? print_usage_bug+0xc0/0xc0 [ 421.105191] shmem_alloc_and_acct_page+0x1f1/0x820 [ 421.110118] ? shmem_alloc_hugepage+0x4e0/0x4e0 [ 421.114781] shmem_getpage_gfp+0x6ea/0x41e0 [ 421.119097] ? print_usage_bug+0xc0/0xc0 [ 421.123149] ? shmem_writepage+0x1380/0x1380 [ 421.127543] ? print_usage_bug+0xc0/0xc0 [ 421.131592] ? __lock_acquire+0x7fc/0x5020 [ 421.135820] ? print_usage_bug+0xc0/0xc0 [ 421.140234] ? __lock_acquire+0x7fc/0x5020 [ 421.144489] ? print_usage_bug+0xc0/0xc0 [ 421.148538] ? __lock_acquire+0x7fc/0x5020 [ 421.152763] ? __lock_acquire+0x7fc/0x5020 [ 421.156983] ? check_noncircular+0x20/0x20 [ 421.161204] ? __lock_acquire+0x7fc/0x5020 [ 421.165430] ? __lock_acquire+0x7fc/0x5020 [ 421.169667] ? trace_hardirqs_on+0x10/0x10 [ 421.173886] ? print_usage_bug+0xc0/0xc0 [ 421.177947] ? __lock_acquire+0x7fc/0x5020 [ 421.182168] ? print_usage_bug+0xc0/0xc0 [ 421.186214] ? print_usage_bug+0xc0/0xc0 [ 421.190260] ? graph_lock+0x170/0x170 [ 421.194058] ? print_usage_bug+0xc0/0xc0 [ 421.198125] ? __lock_acquire+0x7fc/0x5020 [ 421.202364] ? __lock_acquire+0x7fc/0x5020 [ 421.206601] ? graph_lock+0x170/0x170 [ 421.210403] ? find_held_lock+0x36/0x1c0 [ 421.214453] ? print_usage_bug+0xc0/0xc0 [ 421.218503] ? lock_downgrade+0x8f0/0x8f0 [ 421.222635] ? kasan_check_read+0x11/0x20 [ 421.226772] ? lock_release+0xa30/0xa30 [ 421.230735] ? mark_held_locks+0xc9/0x160 [ 421.234878] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 421.240410] ? iov_iter_fault_in_readable+0x23d/0x460 [ 421.245592] ? copy_page_from_iter+0x890/0x890 [ 421.250259] ? __sanitizer_cov_trace_pc+0x4d/0x50 [ 421.255094] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 421.260288] shmem_write_begin+0x110/0x1e0 [ 421.264511] generic_perform_write+0x3ae/0x6c0 [ 421.269092] ? add_page_wait_queue+0x2c0/0x2c0 [ 421.273674] ? file_update_time+0xe4/0x640 [ 421.277940] ? current_time+0x1b0/0x1b0 [ 421.281934] ? down_write+0x8f/0x130 [ 421.285736] __generic_file_write_iter+0x26e/0x630 [ 421.290674] generic_file_write_iter+0x438/0x870 [ 421.295426] ? __generic_file_write_iter+0x630/0x630 [ 421.300522] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 421.306053] ? iov_iter_init+0xc9/0x1f0 [ 421.310031] __vfs_write+0x6c6/0x9f0 [ 421.313732] ? kernel_read+0x120/0x120 [ 421.317607] ? __lock_is_held+0xb5/0x140 [ 421.321679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 421.327209] ? __sb_start_write+0x17f/0x300 [ 421.331522] vfs_write+0x1f8/0x560 [ 421.335052] ksys_pwrite64+0x181/0x1b0 [ 421.338927] ? __ia32_sys_pread64+0xf0/0xf0 [ 421.343233] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 421.348767] ? fput+0x130/0x1a0 [ 421.352041] ? do_sys_ftruncate+0x44e/0x560 [ 421.356351] __x64_sys_pwrite64+0x97/0xf0 [ 421.360496] do_syscall_64+0x1b9/0x820 [ 421.364368] ? finish_task_switch+0x1d3/0x870 [ 421.368856] ? syscall_return_slowpath+0x5e0/0x5e0 [ 421.373772] ? syscall_return_slowpath+0x31d/0x5e0 [ 421.378691] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 421.384052] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 421.388896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 421.394074] RIP: 0033:0x40fd77 [ 421.397248] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 07:10:53 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)="746872656164656404", 0x9) [ 421.416769] RSP: 002b:00007f4e3debea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 421.424482] RAX: ffffffffffffffda RBX: 0000000020000150 RCX: 000000000040fd77 [ 421.432352] RDX: 0000000000000048 RSI: 0000000020000380 RDI: 0000000000000014 [ 421.439626] RBP: 0000000000000000 R08: 0000000020000158 R09: 00000000fbad8001 [ 421.446889] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000014 [ 421.454149] R13: 0000000000000001 R14: 00000000004d3c48 R15: 0000000000000004 07:10:53 executing program 4 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) restart_syscall() getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000000)={@broadcast, @empty, 0x0}, &(0x7f0000000040)=0xc) bind$bt_hci(r0, &(0x7f0000000080)={0x1f, r1, 0x1}, 0xc) [ 421.584606] FAULT_INJECTION: forcing a failure. [ 421.584606] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 421.596540] CPU: 1 PID: 28220 Comm: syz-executor7 Not tainted 4.18.0-rc5+ #149 [ 421.603937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.613299] Call Trace: [ 421.615906] dump_stack+0x1c9/0x2b4 [ 421.619548] ? dump_stack_print_info.cold.2+0x52/0x52 [ 421.624744] ? __radix_tree_lookup+0x3dd/0x6e0 [ 421.629432] should_fail.cold.4+0xa/0x1a [ 421.633515] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 421.638631] ? graph_lock+0x170/0x170 [ 421.642441] ? find_held_lock+0x36/0x1c0 [ 421.646519] ? find_held_lock+0x36/0x1c0 [ 421.650603] ? __lock_is_held+0xb5/0x140 [ 421.654687] ? check_same_owner+0x340/0x340 [ 421.659016] ? rcu_note_context_switch+0x730/0x730 [ 421.663968] __alloc_pages_nodemask+0x36e/0xdb0 [ 421.668648] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 421.673677] ? trace_hardirqs_on+0x10/0x10 [ 421.677931] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 421.682961] ? percpu_counter_add_batch+0xf2/0x150 [ 421.687910] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 421.692941] ? __vm_enough_memory+0x590/0x980 [ 421.697458] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 421.703017] alloc_pages_vma+0xdd/0x540 [ 421.707040] shmem_alloc_page+0xa8/0x190 [ 421.711123] ? shmem_swapin+0x230/0x230 [ 421.715124] ? print_usage_bug+0xc0/0xc0 [ 421.719227] shmem_alloc_and_acct_page+0x1f1/0x820 [ 421.724176] ? shmem_alloc_hugepage+0x4e0/0x4e0 [ 421.728868] shmem_getpage_gfp+0x6ea/0x41e0 [ 421.733212] ? print_usage_bug+0xc0/0xc0 [ 421.737282] ? shmem_writepage+0x1380/0x1380 [ 421.741698] ? print_usage_bug+0xc0/0xc0 [ 421.745769] ? __lock_acquire+0x7fc/0x5020 [ 421.750017] ? print_usage_bug+0xc0/0xc0 [ 421.754091] ? __lock_acquire+0x7fc/0x5020 [ 421.758332] ? print_usage_bug+0xc0/0xc0 [ 421.762403] ? __lock_acquire+0x7fc/0x5020 [ 421.766643] ? __lock_acquire+0x7fc/0x5020 [ 421.770888] ? check_noncircular+0x20/0x20 [ 421.775146] ? __lock_acquire+0x7fc/0x5020 [ 421.779391] ? __lock_acquire+0x7fc/0x5020 [ 421.783645] ? trace_hardirqs_on+0x10/0x10 [ 421.787902] ? print_usage_bug+0xc0/0xc0 [ 421.791970] ? __lock_acquire+0x7fc/0x5020 [ 421.796210] ? print_usage_bug+0xc0/0xc0 [ 421.800286] ? print_usage_bug+0xc0/0xc0 [ 421.804445] ? graph_lock+0x170/0x170 [ 421.808338] ? print_usage_bug+0xc0/0xc0 [ 421.812409] ? __lock_acquire+0x7fc/0x5020 [ 421.816658] ? __lock_acquire+0x7fc/0x5020 [ 421.820899] ? graph_lock+0x170/0x170 [ 421.824710] ? find_held_lock+0x36/0x1c0 [ 421.828774] ? print_usage_bug+0xc0/0xc0 [ 421.832841] ? lock_downgrade+0x8f0/0x8f0 [ 421.837096] ? kasan_check_read+0x11/0x20 [ 421.841259] ? lock_release+0xa30/0xa30 [ 421.845263] ? mark_held_locks+0xc9/0x160 [ 421.849418] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 421.854974] ? iov_iter_fault_in_readable+0x23d/0x460 [ 421.860171] ? copy_page_from_iter+0x890/0x890 [ 421.864758] ? __sanitizer_cov_trace_pc+0x4d/0x50 [ 421.869607] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 421.874804] shmem_write_begin+0x110/0x1e0 [ 421.879052] generic_perform_write+0x3ae/0x6c0 [ 421.883667] ? add_page_wait_queue+0x2c0/0x2c0 [ 421.888255] ? file_update_time+0xe4/0x640 [ 421.892498] ? current_time+0x1b0/0x1b0 [ 421.896484] ? down_write+0x8f/0x130 [ 421.900205] __generic_file_write_iter+0x26e/0x630 [ 421.905151] generic_file_write_iter+0x438/0x870 [ 421.910093] ? __generic_file_write_iter+0x630/0x630 [ 421.915211] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 421.920744] ? iov_iter_init+0xc9/0x1f0 [ 421.924723] __vfs_write+0x6c6/0x9f0 [ 421.928434] ? kernel_read+0x120/0x120 [ 421.932325] ? __lock_is_held+0xb5/0x140 [ 421.936380] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 421.941996] ? __sb_start_write+0x17f/0x300 [ 421.946309] vfs_write+0x1f8/0x560 [ 421.949838] ksys_pwrite64+0x181/0x1b0 [ 421.953709] ? __ia32_sys_pread64+0xf0/0xf0 [ 421.958028] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 421.963565] ? fput+0x130/0x1a0 [ 421.966846] ? do_sys_ftruncate+0x44e/0x560 [ 421.971173] __x64_sys_pwrite64+0x97/0xf0 [ 421.975322] do_syscall_64+0x1b9/0x820 [ 421.979217] ? finish_task_switch+0x1d3/0x870 [ 421.983705] ? syscall_return_slowpath+0x5e0/0x5e0 [ 421.988620] ? syscall_return_slowpath+0x31d/0x5e0 [ 421.993545] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 421.998918] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 422.003759] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 422.008941] RIP: 0033:0x40fd77 [ 422.012113] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 422.031306] RSP: 002b:00007fc3c351fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 422.039006] RAX: ffffffffffffffda RBX: 0000000020000150 RCX: 000000000040fd77 [ 422.046271] RDX: 0000000000000048 RSI: 0000000020000380 RDI: 0000000000000014 [ 422.053527] RBP: 0000000000000000 R08: 0000000020000158 R09: 00000000fbad8001 [ 422.060781] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000014 [ 422.068135] R13: 0000000000000001 R14: 00000000004d3c48 R15: 0000000000000004 07:10:54 executing program 7 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 422.177735] FAULT_INJECTION: forcing a failure. [ 422.177735] name failslab, interval 1, probability 0, space 0, times 0 [ 422.189080] CPU: 1 PID: 28232 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #149 [ 422.196463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 422.205826] Call Trace: [ 422.208431] dump_stack+0x1c9/0x2b4 [ 422.212078] ? dump_stack_print_info.cold.2+0x52/0x52 [ 422.217282] ? print_usage_bug+0xc0/0xc0 [ 422.221369] should_fail.cold.4+0xa/0x1a [ 422.225441] ? trace_hardirqs_on+0x10/0x10 [ 422.229690] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 422.234815] ? find_held_lock+0x36/0x1c0 [ 422.238903] ? find_held_lock+0x36/0x1c0 [ 422.242996] ? check_same_owner+0x340/0x340 [ 422.247433] ? rcu_note_context_switch+0x730/0x730 [ 422.252375] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 422.257417] __should_failslab+0x124/0x180 [ 422.261674] should_failslab+0x9/0x14 [ 422.265488] kmem_cache_alloc+0x2af/0x760 [ 422.269658] __d_alloc+0xc8/0xd50 [ 422.273129] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 422.278152] ? do_raw_spin_unlock+0xa7/0x2f0 [ 422.282576] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 422.287519] ? __lock_is_held+0xb5/0x140 [ 422.291599] ? _raw_spin_unlock+0x22/0x30 [ 422.295756] ? __alloc_fd+0x34e/0x710 [ 422.299565] ? exit_files+0xb0/0xb0 [ 422.303193] d_alloc_pseudo+0x1d/0x30 [ 422.307018] __shmem_file_setup+0x1f3/0x700 [ 422.311343] ? check_same_owner+0x340/0x340 [ 422.315665] ? shmem_fill_super+0xa50/0xa50 [ 422.320003] ? get_unused_fd_flags+0x122/0x1a0 [ 422.324687] ? __alloc_fd+0x710/0x710 [ 422.328490] shmem_file_setup+0x2f/0x40 [ 422.332456] __x64_sys_memfd_create+0x2af/0x4f0 [ 422.337117] ? memfd_fcntl+0x1400/0x1400 [ 422.341168] ? do_syscall_64+0x9a/0x820 [ 422.345139] do_syscall_64+0x1b9/0x820 [ 422.349022] ? syscall_return_slowpath+0x5e0/0x5e0 [ 422.353940] ? syscall_return_slowpath+0x31d/0x5e0 [ 422.358871] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 422.364223] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 422.369071] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 422.374246] RIP: 0033:0x455ab9 [ 422.377417] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 422.396643] RSP: 002b:00007f9ab9648a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 422.404339] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000455ab9 [ 422.411594] RDX: 0000000020000158 RSI: 0000000000000000 RDI: 00000000004ba6a1 [ 422.418858] RBP: 000000000072bea0 R08: 0000000020000158 R09: 00000000fbad8001 [ 422.426116] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 422.433396] R13: 00000000004c21cd R14: 00000000004d3c48 R15: 0000000000000001 [ 422.473927] FAULT_INJECTION: forcing a failure. [ 422.473927] name failslab, interval 1, probability 0, space 0, times 0 [ 422.485734] CPU: 0 PID: 28251 Comm: syz-executor4 Not tainted 4.18.0-rc5+ #149 [ 422.493104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 422.502468] Call Trace: [ 422.505072] dump_stack+0x1c9/0x2b4 [ 422.508717] ? dump_stack_print_info.cold.2+0x52/0x52 [ 422.513931] should_fail.cold.4+0xa/0x1a [ 422.518016] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 422.523143] ? __lock_acquire+0x7fc/0x5020 [ 422.527392] ? print_usage_bug+0xc0/0xc0 [ 422.531477] ? print_usage_bug+0xc0/0xc0 [ 422.535546] ? trace_hardirqs_on+0x10/0x10 [ 422.539790] ? lock_downgrade+0x8f0/0x8f0 [ 422.543953] ? __lock_acquire+0x7fc/0x5020 [ 422.548199] ? kasan_unpoison_shadow+0x35/0x50 [ 422.552793] ? print_usage_bug+0xc0/0xc0 [ 422.556870] ? get_page_from_freelist+0xfe4/0x4620 [ 422.561824] __should_failslab+0x124/0x180 [ 422.566074] should_failslab+0x9/0x14 [ 422.569888] kmem_cache_alloc+0x47/0x760 07:10:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:54 executing program 6 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 07:10:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) ioctl$RTC_PIE_ON(r0, 0x7005) [ 422.573962] ? radix_tree_node_alloc.constprop.19+0x310/0x310 [ 422.579854] radix_tree_node_alloc.constprop.19+0x1e6/0x310 [ 422.585567] __radix_tree_create+0x4d6/0x840 [ 422.589984] ? radix_tree_maybe_preload_order+0x110/0x110 [ 422.595522] ? find_held_lock+0x36/0x1c0 [ 422.599584] ? graph_lock+0x170/0x170 [ 422.603369] ? __lock_is_held+0xb5/0x140 [ 422.607428] ? print_usage_bug+0xc0/0xc0 [ 422.611503] ? find_held_lock+0x36/0x1c0 [ 422.615554] __radix_tree_insert+0x107/0x8f0 [ 422.619951] ? graph_lock+0x170/0x170 [ 422.623739] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 422.628743] ? __radix_tree_create+0x840/0x840 [ 422.633327] ? lock_acquire+0x1e4/0x540 [ 422.637304] ? shmem_add_to_page_cache+0x49c/0xe00 [ 422.642231] ? lock_release+0xa30/0xa30 [ 422.646197] ? kasan_check_write+0x14/0x20 [ 422.650417] ? do_raw_spin_lock+0xc1/0x200 [ 422.654649] shmem_add_to_page_cache+0x988/0xe00 [ 422.659388] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 422.663800] ? shmem_put_link+0x280/0x280 [ 422.667941] ? percpu_ref_put_many+0x131/0x240 [ 422.672521] ? percpu_ref_tryget+0x2d0/0x2d0 [ 422.676940] ? mem_cgroup_try_charge+0x548/0xa70 [ 422.681703] ? mem_cgroup_protected+0xa60/0xa60 [ 422.686364] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 422.691897] ? shmem_alloc_and_acct_page+0x31a/0x820 [ 422.696999] ? shmem_alloc_hugepage+0x4e0/0x4e0 [ 422.701676] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 422.706688] ? __radix_tree_preload+0x173/0x1d0 [ 422.711344] shmem_getpage_gfp+0x81b/0x41e0 [ 422.715659] ? shmem_writepage+0x1380/0x1380 [ 422.720054] ? print_usage_bug+0xc0/0xc0 [ 422.724101] ? __lock_acquire+0x7fc/0x5020 [ 422.728324] ? print_usage_bug+0xc0/0xc0 [ 422.732405] ? __lock_acquire+0x7fc/0x5020 [ 422.736625] ? print_usage_bug+0xc0/0xc0 [ 422.740668] ? __lock_acquire+0x7fc/0x5020 [ 422.744888] ? __lock_acquire+0x7fc/0x5020 [ 422.749196] ? check_noncircular+0x20/0x20 [ 422.753429] ? __lock_acquire+0x7fc/0x5020 [ 422.757671] ? __lock_acquire+0x7fc/0x5020 [ 422.761906] ? trace_hardirqs_on+0x10/0x10 [ 422.766132] ? print_usage_bug+0xc0/0xc0 [ 422.770187] ? __lock_acquire+0x7fc/0x5020 [ 422.774419] ? print_usage_bug+0xc0/0xc0 [ 422.778485] ? print_usage_bug+0xc0/0xc0 [ 422.782536] ? graph_lock+0x170/0x170 [ 422.786324] ? print_usage_bug+0xc0/0xc0 [ 422.791769] ? __lock_acquire+0x7fc/0x5020 [ 422.796011] ? __lock_acquire+0x7fc/0x5020 [ 422.800254] ? graph_lock+0x170/0x170 [ 422.804045] ? find_held_lock+0x36/0x1c0 [ 422.808100] ? print_usage_bug+0xc0/0xc0 [ 422.812163] ? lock_downgrade+0x8f0/0x8f0 [ 422.816305] ? kasan_check_read+0x11/0x20 [ 422.820438] ? lock_release+0xa30/0xa30 [ 422.824409] ? mark_held_locks+0xc9/0x160 [ 422.828560] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 422.834106] ? iov_iter_fault_in_readable+0x23d/0x460 [ 422.839299] ? copy_page_from_iter+0x890/0x890 [ 422.843954] ? __sanitizer_cov_trace_pc+0x4d/0x50 [ 422.848802] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 422.853992] shmem_write_begin+0x110/0x1e0 [ 422.858238] generic_perform_write+0x3ae/0x6c0 [ 422.862819] ? add_page_wait_queue+0x2c0/0x2c0 [ 422.867410] ? file_update_time+0xe4/0x640 [ 422.871764] ? current_time+0x1b0/0x1b0 [ 422.875758] ? down_write+0x8f/0x130 [ 422.879497] __generic_file_write_iter+0x26e/0x630 [ 422.884430] generic_file_write_iter+0x438/0x870 [ 422.889179] ? __generic_file_write_iter+0x630/0x630 [ 422.894277] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 422.899816] ? iov_iter_init+0xc9/0x1f0 [ 422.903780] __vfs_write+0x6c6/0x9f0 [ 422.907483] ? kernel_read+0x120/0x120 [ 422.911368] ? __lock_is_held+0xb5/0x140 [ 422.915439] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 422.920973] ? __sb_start_write+0x17f/0x300 [ 422.925312] vfs_write+0x1f8/0x560 [ 422.928872] ksys_pwrite64+0x181/0x1b0 [ 422.932782] ? __ia32_sys_pread64+0xf0/0xf0 [ 422.937095] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 422.942627] ? fput+0x130/0x1a0 [ 422.945890] ? do_sys_ftruncate+0x44e/0x560 [ 422.950205] __x64_sys_pwrite64+0x97/0xf0 [ 422.954348] do_syscall_64+0x1b9/0x820 [ 422.958227] ? syscall_return_slowpath+0x5e0/0x5e0 [ 422.963145] ? syscall_return_slowpath+0x31d/0x5e0 [ 422.968065] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 422.973425] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 422.978273] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 422.983454] RIP: 0033:0x40fd77 [ 422.986637] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 423.005864] RSP: 002b:00007f4e3debea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 423.013560] RAX: ffffffffffffffda RBX: 0000000020000150 RCX: 000000000040fd77 07:10:55 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1005}], 0x1) [ 423.020819] RDX: 0000000000000048 RSI: 0000000020000380 RDI: 0000000000000014 [ 423.028083] RBP: 0000000000000000 R08: 0000000020000158 R09: 00000000fbad8001 [ 423.035344] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000014 [ 423.042665] R13: 0000000000000001 R14: 00000000004d3c48 R15: 0000000000000005 [ 423.076218] FAULT_INJECTION: forcing a failure. [ 423.076218] name failslab, interval 1, probability 0, space 0, times 0 [ 423.087461] CPU: 0 PID: 28255 Comm: syz-executor7 Not tainted 4.18.0-rc5+ #149 [ 423.094807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 423.104145] Call Trace: [ 423.106723] dump_stack+0x1c9/0x2b4 [ 423.110361] ? dump_stack_print_info.cold.2+0x52/0x52 [ 423.115569] should_fail.cold.4+0xa/0x1a [ 423.119622] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 423.124726] ? __lock_acquire+0x7fc/0x5020 [ 423.128954] ? print_usage_bug+0xc0/0xc0 [ 423.133013] ? print_usage_bug+0xc0/0xc0 [ 423.137084] ? trace_hardirqs_on+0x10/0x10 [ 423.141321] ? lock_downgrade+0x8f0/0x8f0 [ 423.145470] ? __lock_acquire+0x7fc/0x5020 [ 423.149694] ? print_usage_bug+0xc0/0xc0 [ 423.153755] __should_failslab+0x124/0x180 [ 423.157982] should_failslab+0x9/0x14 [ 423.161774] kmem_cache_alloc+0x47/0x760 [ 423.165821] ? radix_tree_node_alloc.constprop.19+0x310/0x310 [ 423.171723] radix_tree_node_alloc.constprop.19+0x1e6/0x310 [ 423.177441] __radix_tree_create+0x4d6/0x840 [ 423.181862] ? radix_tree_maybe_preload_order+0x110/0x110 [ 423.187397] ? find_held_lock+0x36/0x1c0 [ 423.191448] ? graph_lock+0x170/0x170 [ 423.195230] ? __lock_is_held+0xb5/0x140 [ 423.199285] ? print_usage_bug+0xc0/0xc0 [ 423.203349] ? find_held_lock+0x36/0x1c0 [ 423.207402] __radix_tree_insert+0x107/0x8f0 [ 423.211807] ? graph_lock+0x170/0x170 [ 423.215602] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 423.220608] ? __radix_tree_create+0x840/0x840 [ 423.225181] ? lock_acquire+0x1e4/0x540 [ 423.229143] ? shmem_add_to_page_cache+0x49c/0xe00 [ 423.234073] ? lock_release+0xa30/0xa30 [ 423.238131] ? kasan_check_write+0x14/0x20 [ 423.242359] ? do_raw_spin_lock+0xc1/0x200 [ 423.246581] shmem_add_to_page_cache+0x988/0xe00 [ 423.251322] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 423.255719] ? shmem_put_link+0x280/0x280 [ 423.259864] ? percpu_ref_put_many+0x131/0x240 [ 423.264433] ? percpu_ref_tryget+0x2d0/0x2d0 [ 423.268835] ? mem_cgroup_try_charge+0x548/0xa70 [ 423.273770] ? mem_cgroup_protected+0xa60/0xa60 [ 423.278531] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 423.284056] ? shmem_alloc_and_acct_page+0x31a/0x820 [ 423.289147] ? shmem_alloc_hugepage+0x4e0/0x4e0 [ 423.293803] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 423.298807] ? __radix_tree_preload+0x173/0x1d0 [ 423.303466] shmem_getpage_gfp+0x81b/0x41e0 [ 423.307786] ? shmem_writepage+0x1380/0x1380 [ 423.312180] ? print_usage_bug+0xc0/0xc0 [ 423.316241] ? __lock_acquire+0x7fc/0x5020 [ 423.320465] ? print_usage_bug+0xc0/0xc0 [ 423.324520] ? __lock_acquire+0x7fc/0x5020 [ 423.328744] ? print_usage_bug+0xc0/0xc0 [ 423.332792] ? __lock_acquire+0x7fc/0x5020 [ 423.337019] ? __lock_acquire+0x7fc/0x5020 [ 423.341243] ? check_noncircular+0x20/0x20 [ 423.345464] ? __lock_acquire+0x7fc/0x5020 [ 423.349696] ? __lock_acquire+0x7fc/0x5020 [ 423.353938] ? trace_hardirqs_on+0x10/0x10 [ 423.358158] ? print_usage_bug+0xc0/0xc0 [ 423.362218] ? __lock_acquire+0x7fc/0x5020 [ 423.366439] ? print_usage_bug+0xc0/0xc0 [ 423.370484] ? print_usage_bug+0xc0/0xc0 [ 423.374529] ? graph_lock+0x170/0x170 [ 423.378317] ? print_usage_bug+0xc0/0xc0 [ 423.382362] ? __lock_acquire+0x7fc/0x5020 [ 423.386588] ? __lock_acquire+0x7fc/0x5020 [ 423.390820] ? graph_lock+0x170/0x170 [ 423.394622] ? find_held_lock+0x36/0x1c0 [ 423.398672] ? print_usage_bug+0xc0/0xc0 [ 423.402727] ? lock_downgrade+0x8f0/0x8f0 [ 423.406860] ? kasan_check_read+0x11/0x20 [ 423.410996] ? lock_release+0xa30/0xa30 [ 423.414964] ? mark_held_locks+0xc9/0x160 [ 423.419100] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 423.424626] ? iov_iter_fault_in_readable+0x23d/0x460 [ 423.430496] ? copy_page_from_iter+0x890/0x890 [ 423.435066] ? __sanitizer_cov_trace_pc+0x4d/0x50 [ 423.439897] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 423.445078] shmem_write_begin+0x110/0x1e0 [ 423.449302] generic_perform_write+0x3ae/0x6c0 [ 423.453898] ? add_page_wait_queue+0x2c0/0x2c0 [ 423.458473] ? file_update_time+0xe4/0x640 [ 423.462693] ? current_time+0x1b0/0x1b0 [ 423.466675] ? down_write+0x8f/0x130 [ 423.470378] __generic_file_write_iter+0x26e/0x630 [ 423.475295] generic_file_write_iter+0x438/0x870 [ 423.480054] ? __generic_file_write_iter+0x630/0x630 [ 423.485156] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 423.490677] ? iov_iter_init+0xc9/0x1f0 [ 423.494648] __vfs_write+0x6c6/0x9f0 [ 423.498349] ? kernel_read+0x120/0x120 [ 423.502238] ? __lock_is_held+0xb5/0x140 [ 423.506291] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 423.511812] ? __sb_start_write+0x17f/0x300 [ 423.516120] vfs_write+0x1f8/0x560 [ 423.519646] ksys_pwrite64+0x181/0x1b0 [ 423.523528] ? __ia32_sys_pread64+0xf0/0xf0 [ 423.527834] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 423.533355] ? fput+0x130/0x1a0 [ 423.536624] ? do_sys_ftruncate+0x44e/0x560 [ 423.540942] __x64_sys_pwrite64+0x97/0xf0 [ 423.545080] do_syscall_64+0x1b9/0x820 [ 423.548962] ? finish_task_switch+0x1d3/0x870 [ 423.553443] ? syscall_return_slowpath+0x5e0/0x5e0 [ 423.558360] ? syscall_return_slowpath+0x31d/0x5e0 [ 423.563292] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 423.568646] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 423.573479] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 423.578654] RIP: 0033:0x40fd77 [ 423.581825] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 423.601052] RSP: 002b:00007fc3c351fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 423.608745] RAX: ffffffffffffffda RBX: 0000000020000150 RCX: 000000000040fd77 [ 423.615997] RDX: 0000000000000048 RSI: 0000000020000380 RDI: 0000000000000014 07:10:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 423.623254] RBP: 0000000000000000 R08: 0000000020000158 R09: 00000000fbad8001 [ 423.630506] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000014 [ 423.637761] R13: 0000000000000001 R14: 00000000004d3c48 R15: 0000000000000005 07:10:55 executing program 7 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:56 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)="7468726561646564fe", 0x9) [ 423.872122] FAULT_INJECTION: forcing a failure. [ 423.872122] name failslab, interval 1, probability 0, space 0, times 0 [ 423.883480] CPU: 0 PID: 28275 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #149 [ 423.890844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 423.900198] Call Trace: [ 423.902791] dump_stack+0x1c9/0x2b4 [ 423.906423] ? dump_stack_print_info.cold.2+0x52/0x52 [ 423.911621] ? __kernel_text_address+0xd/0x40 [ 423.916113] should_fail.cold.4+0xa/0x1a [ 423.920162] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 423.925266] ? save_stack+0xa9/0xd0 [ 423.928911] ? save_stack+0x43/0xd0 [ 423.932543] ? kasan_kmalloc+0xc4/0xe0 [ 423.936415] ? kasan_slab_alloc+0x12/0x20 [ 423.940559] ? kmem_cache_alloc+0x12e/0x760 [ 423.944879] ? __d_alloc+0xc8/0xd50 [ 423.948499] ? d_alloc_pseudo+0x1d/0x30 [ 423.952461] ? __shmem_file_setup+0x1f3/0x700 [ 423.956939] ? shmem_file_setup+0x2f/0x40 [ 423.961080] ? find_held_lock+0x36/0x1c0 [ 423.965162] ? check_same_owner+0x340/0x340 [ 423.969492] ? rcu_note_context_switch+0x730/0x730 [ 423.974593] ? kasan_check_read+0x11/0x20 [ 423.978735] __should_failslab+0x124/0x180 [ 423.982971] should_failslab+0x9/0x14 [ 423.986770] kmem_cache_alloc+0x2af/0x760 [ 423.990908] ? rcu_read_lock_sched_held+0x108/0x120 [ 423.995921] ? kmem_cache_alloc+0x5fa/0x760 [ 424.000231] ? shmem_destroy_callback+0xc0/0xc0 [ 424.004886] shmem_alloc_inode+0x1b/0x40 [ 424.008937] alloc_inode+0x63/0x190 [ 424.012562] new_inode_pseudo+0x71/0x1a0 [ 424.016610] ? prune_icache_sb+0x1b0/0x1b0 [ 424.020846] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 424.025867] new_inode+0x1c/0x40 [ 424.029225] shmem_get_inode+0xf1/0x910 [ 424.033201] ? shmem_encode_fh+0x340/0x340 [ 424.037428] ? _raw_spin_unlock+0x22/0x30 [ 424.041559] ? __alloc_fd+0x34e/0x710 [ 424.045354] ? exit_files+0xb0/0xb0 [ 424.048982] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 424.054516] __shmem_file_setup+0x259/0x700 [ 424.058823] ? check_same_owner+0x340/0x340 [ 424.063142] ? shmem_fill_super+0xa50/0xa50 [ 424.067466] ? get_unused_fd_flags+0x122/0x1a0 [ 424.072042] ? __alloc_fd+0x710/0x710 [ 424.075839] shmem_file_setup+0x2f/0x40 [ 424.079802] __x64_sys_memfd_create+0x2af/0x4f0 [ 424.084458] ? memfd_fcntl+0x1400/0x1400 [ 424.088507] ? do_syscall_64+0x9a/0x820 [ 424.092482] do_syscall_64+0x1b9/0x820 [ 424.096379] ? finish_task_switch+0x1d3/0x870 [ 424.100882] ? syscall_return_slowpath+0x5e0/0x5e0 [ 424.105808] ? syscall_return_slowpath+0x31d/0x5e0 [ 424.110746] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 424.116099] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 424.120938] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 424.126110] RIP: 0033:0x455ab9 [ 424.129292] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 424.148481] RSP: 002b:00007f9ab9648a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 424.156193] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000455ab9 [ 424.163458] RDX: 0000000020000158 RSI: 0000000000000000 RDI: 00000000004ba6a1 [ 424.170721] RBP: 000000000072bea0 R08: 0000000020000158 R09: 00000000fbad8001 [ 424.177983] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 424.185251] R13: 00000000004c21cd R14: 00000000004d3c48 R15: 0000000000000002 07:10:56 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) socket$pppoe(0x18, 0x1, 0x0) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='net/softnet_stat\x00') getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000000)={0x0, 0xe713, 0x6, [0x20, 0x8823, 0x1, 0x1, 0x1, 0x5]}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000140)={r2, 0x1ff, 0x7}, 0x8) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(r1, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) 07:10:56 executing program 6 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 07:10:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btr.s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 424.371173] FAULT_INJECTION: forcing a failure. [ 424.371173] name failslab, interval 1, probability 0, space 0, times 0 [ 424.382501] CPU: 0 PID: 28301 Comm: syz-executor7 Not tainted 4.18.0-rc5+ #149 [ 424.389879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 424.399229] Call Trace: [ 424.401818] dump_stack+0x1c9/0x2b4 [ 424.405451] ? dump_stack_print_info.cold.2+0x52/0x52 [ 424.410648] ? add_page_wait_queue+0x2c0/0x2c0 [ 424.415237] should_fail.cold.4+0xa/0x1a [ 424.419292] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 424.424838] ? up_write+0x7b/0x220 [ 424.428369] ? up_read+0x110/0x110 [ 424.431905] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 424.437439] ? __generic_file_write_iter+0x1bd/0x630 [ 424.442538] ? find_held_lock+0x36/0x1c0 [ 424.446615] ? check_same_owner+0x340/0x340 [ 424.450947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 424.456584] ? rcu_note_context_switch+0x730/0x730 [ 424.461515] ? lock_downgrade+0x8f0/0x8f0 [ 424.465660] __should_failslab+0x124/0x180 [ 424.469884] should_failslab+0x9/0x14 [ 424.473682] kmem_cache_alloc+0x2af/0x760 [ 424.477835] getname_flags+0xd0/0x5a0 [ 424.481636] ? __sb_end_write+0xac/0xe0 [ 424.485597] getname+0x19/0x20 [ 424.488785] do_sys_open+0x3a2/0x760 [ 424.492505] ? filp_open+0x80/0x80 [ 424.496049] ? do_sys_ftruncate+0x44e/0x560 [ 424.500377] __x64_sys_open+0x7e/0xc0 [ 424.504168] do_syscall_64+0x1b9/0x820 [ 424.508056] ? syscall_return_slowpath+0x5e0/0x5e0 [ 424.512991] ? syscall_return_slowpath+0x31d/0x5e0 [ 424.517928] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 424.523290] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 424.528125] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 424.533316] RIP: 0033:0x40fd11 [ 424.536493] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 424.555844] RSP: 002b:00007fc3c351fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 424.563542] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 000000000040fd11 07:10:56 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x16}], 0x1) 07:10:56 executing program 7 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 424.570800] RDX: 00007fc3c351fafa RSI: 0000000000000002 RDI: 00007fc3c351faf0 [ 424.578057] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 424.585321] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000014 [ 424.592585] R13: 0000000000000001 R14: 00000000004d3c48 R15: 0000000000000006 07:10:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000200)) r1 = semget$private(0x0, 0x1, 0x22) semop(r1, &(0x7f0000000000)=[{0x2, 0x4, 0x1000}, {0x0, 0x5, 0x1000}, {0x0, 0x9, 0x1800}, {0x0, 0xb3, 0x800}, {0x0, 0x7ff, 0x800}, {0x1, 0x8}, {0x7, 0x3, 0x1800}, {0x3, 0x101, 0x1000}], 0x8) semctl$GETZCNT(r1, 0x1, 0xf, &(0x7f0000000040)=""/248) [ 424.772458] FAULT_INJECTION: forcing a failure. [ 424.772458] name failslab, interval 1, probability 0, space 0, times 0 [ 424.783732] CPU: 0 PID: 28309 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #149 [ 424.791104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 424.800457] Call Trace: [ 424.803064] dump_stack+0x1c9/0x2b4 [ 424.806695] ? dump_stack_print_info.cold.2+0x52/0x52 [ 424.811884] ? __lock_acquire+0x7fc/0x5020 [ 424.816117] should_fail.cold.4+0xa/0x1a [ 424.820176] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 424.825294] ? find_held_lock+0x36/0x1c0 [ 424.829358] ? graph_lock+0x170/0x170 [ 424.833176] ? find_held_lock+0x36/0x1c0 [ 424.837934] ? check_same_owner+0x340/0x340 [ 424.842242] ? graph_lock+0x170/0x170 [ 424.846039] ? rcu_note_context_switch+0x730/0x730 [ 424.850961] ? kasan_check_read+0x11/0x20 [ 424.855097] __should_failslab+0x124/0x180 [ 424.859333] should_failslab+0x9/0x14 [ 424.863124] kmem_cache_alloc+0x2af/0x760 [ 424.867264] ? find_held_lock+0x36/0x1c0 [ 424.871329] get_empty_filp+0x12d/0x530 [ 424.875303] ? proc_nr_files+0x60/0x60 [ 424.879193] ? kasan_check_read+0x11/0x20 [ 424.883340] ? do_raw_spin_unlock+0xa7/0x2f0 [ 424.887756] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 424.892348] ? kasan_check_write+0x14/0x20 [ 424.896601] ? do_raw_spin_lock+0xc1/0x200 [ 424.900838] alloc_file+0x24/0x3e0 [ 424.904374] ? clear_nlink.part.9+0x65/0x80 [ 424.908713] __shmem_file_setup+0x313/0x700 [ 424.913035] ? check_same_owner+0x340/0x340 [ 424.917357] ? shmem_fill_super+0xa50/0xa50 [ 424.921670] ? get_unused_fd_flags+0x122/0x1a0 [ 424.926240] ? __alloc_fd+0x710/0x710 [ 424.930044] shmem_file_setup+0x2f/0x40 [ 424.934035] __x64_sys_memfd_create+0x2af/0x4f0 [ 424.938698] ? memfd_fcntl+0x1400/0x1400 [ 424.942769] ? do_syscall_64+0x9a/0x820 [ 424.946740] do_syscall_64+0x1b9/0x820 [ 424.950612] ? syscall_return_slowpath+0x5e0/0x5e0 [ 424.955527] ? syscall_return_slowpath+0x31d/0x5e0 [ 424.960447] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 424.965810] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 424.970648] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 424.975821] RIP: 0033:0x455ab9 [ 424.978993] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 424.998209] RSP: 002b:00007f9ab9648a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 425.005908] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000455ab9 [ 425.013174] RDX: 0000000020000158 RSI: 0000000000000000 RDI: 00000000004ba6a1 07:10:57 executing program 6 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 425.020431] RBP: 000000000072bea0 R08: 0000000020000158 R09: 00000000fbad8001 [ 425.027696] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 425.034967] R13: 00000000004c21cd R14: 00000000004d3c48 R15: 0000000000000003 07:10:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 07:10:57 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\t', 0x9) [ 425.203635] FAULT_INJECTION: forcing a failure. [ 425.203635] name failslab, interval 1, probability 0, space 0, times 0 [ 425.214968] CPU: 1 PID: 28332 Comm: syz-executor7 Not tainted 4.18.0-rc5+ #149 [ 425.222339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 425.231699] Call Trace: [ 425.234297] dump_stack+0x1c9/0x2b4 [ 425.237948] ? dump_stack_print_info.cold.2+0x52/0x52 [ 425.243168] should_fail.cold.4+0xa/0x1a [ 425.247245] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 425.252363] ? trace_hardirqs_on+0x10/0x10 [ 425.256610] ? do_writepages+0x1a0/0x1a0 [ 425.261274] ? set_page_dirty+0x36f/0x6f0 [ 425.265444] ? find_held_lock+0x36/0x1c0 [ 425.269537] ? check_same_owner+0x340/0x340 [ 425.273876] ? rcu_note_context_switch+0x730/0x730 [ 425.278860] ? graph_lock+0x170/0x170 [ 425.282677] __should_failslab+0x124/0x180 [ 425.286929] should_failslab+0x9/0x14 [ 425.290752] kmem_cache_alloc+0x2af/0x760 [ 425.294918] ? trace_hardirqs_on+0x10/0x10 [ 425.299167] ? find_held_lock+0x36/0x1c0 [ 425.303243] get_empty_filp+0x12d/0x530 [ 425.307228] ? proc_nr_files+0x60/0x60 [ 425.311132] ? lock_downgrade+0x8f0/0x8f0 [ 425.315300] ? graph_lock+0x170/0x170 [ 425.319110] ? kasan_check_read+0x11/0x20 [ 425.323264] ? rcu_is_watching+0x8c/0x150 [ 425.327424] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 425.331850] path_openat+0x11e/0x4e10 [ 425.335666] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 425.340692] ? path_lookupat.isra.45+0xbf0/0xbf0 [ 425.345470] ? find_held_lock+0x36/0x1c0 [ 425.349554] ? lock_downgrade+0x8f0/0x8f0 [ 425.353711] ? do_sys_open+0x3a2/0x760 [ 425.357623] ? kasan_check_read+0x11/0x20 [ 425.361784] ? do_raw_spin_unlock+0xa7/0x2f0 [ 425.366208] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 425.370804] ? __lock_is_held+0xb5/0x140 [ 425.374896] ? _raw_spin_unlock+0x22/0x30 [ 425.379066] ? __alloc_fd+0x34e/0x710 [ 425.382882] ? usercopy_warn+0x120/0x120 [ 425.386971] do_filp_open+0x255/0x380 [ 425.390786] ? may_open_dev+0x100/0x100 [ 425.394768] ? strncpy_from_user+0x3be/0x510 [ 425.399183] ? mpi_free.cold.1+0x19/0x19 [ 425.403253] ? get_unused_fd_flags+0x122/0x1a0 [ 425.407850] ? getname_flags+0x26e/0x5a0 [ 425.411917] ? __sb_end_write+0xac/0xe0 [ 425.415991] do_sys_open+0x584/0x760 [ 425.419715] ? filp_open+0x80/0x80 [ 425.422441] FAULT_INJECTION: forcing a failure. [ 425.422441] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 425.423259] ? do_sys_ftruncate+0x44e/0x560 [ 425.423280] __x64_sys_open+0x7e/0xc0 [ 425.423299] do_syscall_64+0x1b9/0x820 [ 425.423314] ? finish_task_switch+0x1d3/0x870 [ 425.423331] ? syscall_return_slowpath+0x5e0/0x5e0 [ 425.423348] ? syscall_return_slowpath+0x31d/0x5e0 [ 425.423374] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 425.467854] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 425.472704] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 425.477885] RIP: 0033:0x40fd11 [ 425.481062] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 425.500379] RSP: 002b:00007fc3c351fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 425.508082] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 000000000040fd11 [ 425.515346] RDX: 00007fc3c351fafa RSI: 0000000000000002 RDI: 00007fc3c351faf0 [ 425.522607] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 425.529869] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000014 [ 425.537137] R13: 0000000000000001 R14: 00000000004d3c48 R15: 0000000000000007 [ 425.544433] CPU: 0 PID: 28340 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #149 [ 425.551801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 425.561158] Call Trace: [ 425.563757] dump_stack+0x1c9/0x2b4 [ 425.567400] ? dump_stack_print_info.cold.2+0x52/0x52 [ 425.572591] ? __radix_tree_lookup+0x3dd/0x6e0 [ 425.577170] should_fail.cold.4+0xa/0x1a [ 425.581234] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 425.586338] ? graph_lock+0x170/0x170 [ 425.590136] ? find_held_lock+0x36/0x1c0 [ 425.594199] ? find_held_lock+0x36/0x1c0 [ 425.598274] ? __lock_is_held+0xb5/0x140 [ 425.602331] ? check_same_owner+0x340/0x340 [ 425.606643] ? rcu_note_context_switch+0x730/0x730 [ 425.611586] __alloc_pages_nodemask+0x36e/0xdb0 [ 425.616263] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 425.621287] ? trace_hardirqs_on+0x10/0x10 [ 425.625514] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 425.630535] ? percpu_counter_add_batch+0xf2/0x150 [ 425.635466] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 425.640485] ? __vm_enough_memory+0x590/0x980 [ 425.644997] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 425.650550] alloc_pages_vma+0xdd/0x540 [ 425.654535] shmem_alloc_page+0xa8/0x190 [ 425.658587] ? shmem_swapin+0x230/0x230 [ 425.662560] ? print_usage_bug+0xc0/0xc0 [ 425.666640] shmem_alloc_and_acct_page+0x1f1/0x820 [ 425.671579] ? shmem_alloc_hugepage+0x4e0/0x4e0 [ 425.676252] shmem_getpage_gfp+0x6ea/0x41e0 [ 425.680567] ? print_usage_bug+0xc0/0xc0 [ 425.684625] ? shmem_writepage+0x1380/0x1380 [ 425.689029] ? print_usage_bug+0xc0/0xc0 [ 425.693103] ? __lock_acquire+0x7fc/0x5020 [ 425.697342] ? print_usage_bug+0xc0/0xc0 [ 425.701400] ? __lock_acquire+0x7fc/0x5020 [ 425.705636] ? print_usage_bug+0xc0/0xc0 [ 425.709691] ? __lock_acquire+0x7fc/0x5020 [ 425.713920] ? __lock_acquire+0x7fc/0x5020 [ 425.718150] ? check_noncircular+0x20/0x20 [ 425.722388] ? __lock_acquire+0x7fc/0x5020 [ 425.726620] ? __lock_acquire+0x7fc/0x5020 [ 425.730859] ? trace_hardirqs_on+0x10/0x10 [ 425.735257] ? print_usage_bug+0xc0/0xc0 [ 425.739323] ? __lock_acquire+0x7fc/0x5020 [ 425.743565] ? print_usage_bug+0xc0/0xc0 [ 425.747622] ? print_usage_bug+0xc0/0xc0 [ 425.751679] ? graph_lock+0x170/0x170 [ 425.755476] ? print_usage_bug+0xc0/0xc0 [ 425.759541] ? __lock_acquire+0x7fc/0x5020 [ 425.763776] ? __lock_acquire+0x7fc/0x5020 [ 425.768008] ? graph_lock+0x170/0x170 [ 425.771803] ? find_held_lock+0x36/0x1c0 [ 425.775851] ? print_usage_bug+0xc0/0xc0 [ 425.779914] ? lock_downgrade+0x8f0/0x8f0 [ 425.784064] ? kasan_check_read+0x11/0x20 [ 425.788212] ? lock_release+0xa30/0xa30 [ 425.792191] ? mark_held_locks+0xc9/0x160 [ 425.796339] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 425.801876] ? iov_iter_fault_in_readable+0x23d/0x460 [ 425.807063] ? copy_page_from_iter+0x890/0x890 [ 425.811645] ? __sanitizer_cov_trace_pc+0x4d/0x50 [ 425.816491] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 425.821682] shmem_write_begin+0x110/0x1e0 [ 425.825916] generic_perform_write+0x3ae/0x6c0 [ 425.830524] ? add_page_wait_queue+0x2c0/0x2c0 [ 425.835104] ? file_update_time+0xe4/0x640 [ 425.839329] ? current_time+0x1b0/0x1b0 [ 425.843290] ? down_write+0x8f/0x130 [ 425.847007] __generic_file_write_iter+0x26e/0x630 [ 425.851943] generic_file_write_iter+0x438/0x870 [ 425.856708] ? __generic_file_write_iter+0x630/0x630 [ 425.861817] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 425.867346] ? iov_iter_init+0xc9/0x1f0 [ 425.871335] __vfs_write+0x6c6/0x9f0 [ 425.875060] ? kernel_read+0x120/0x120 [ 425.878936] ? __lock_is_held+0xb5/0x140 [ 425.882987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 425.888522] ? __sb_start_write+0x17f/0x300 [ 425.892827] vfs_write+0x1f8/0x560 [ 425.896352] ksys_pwrite64+0x181/0x1b0 [ 425.900234] ? __ia32_sys_pread64+0xf0/0xf0 [ 425.904558] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 425.910099] ? fput+0x130/0x1a0 [ 425.913381] ? do_sys_ftruncate+0x44e/0x560 [ 425.917714] __x64_sys_pwrite64+0x97/0xf0 [ 425.921874] do_syscall_64+0x1b9/0x820 [ 425.925762] ? finish_task_switch+0x1d3/0x870 [ 425.930255] ? syscall_return_slowpath+0x5e0/0x5e0 [ 425.935181] ? syscall_return_slowpath+0x31d/0x5e0 [ 425.940113] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 425.945483] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 425.950344] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 425.955531] RIP: 0033:0x40fd77 [ 425.958709] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 425.977922] RSP: 002b:00007f9ab9648a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 425.985623] RAX: ffffffffffffffda RBX: 0000000020000150 RCX: 000000000040fd77 [ 425.992884] RDX: 0000000000000048 RSI: 0000000020000380 RDI: 0000000000000014 [ 426.000144] RBP: 0000000000000000 R08: 0000000020000158 R09: 00000000fbad8001 07:10:57 executing program 7 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:58 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1de}], 0x1) [ 426.007411] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000014 [ 426.014665] R13: 0000000000000001 R14: 00000000004d3c48 R15: 0000000000000004 07:10:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000000000), 0x0) 07:10:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btr/s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:58 executing program 6 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 426.173216] FAULT_INJECTION: forcing a failure. [ 426.173216] name failslab, interval 1, probability 0, space 0, times 0 [ 426.184567] CPU: 0 PID: 28363 Comm: syz-executor7 Not tainted 4.18.0-rc5+ #149 [ 426.191939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.202002] Call Trace: [ 426.204608] dump_stack+0x1c9/0x2b4 [ 426.208224] ? dump_stack_print_info.cold.2+0x52/0x52 [ 426.213419] should_fail.cold.4+0xa/0x1a [ 426.217471] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 426.222576] ? trace_hardirqs_on+0x10/0x10 [ 426.226800] ? do_writepages+0x1a0/0x1a0 [ 426.230851] ? set_page_dirty+0x36f/0x6f0 [ 426.234987] ? find_held_lock+0x36/0x1c0 [ 426.239052] ? check_same_owner+0x340/0x340 [ 426.243361] ? rcu_note_context_switch+0x730/0x730 [ 426.248368] ? graph_lock+0x170/0x170 [ 426.252167] __should_failslab+0x124/0x180 [ 426.256402] should_failslab+0x9/0x14 [ 426.260220] kmem_cache_alloc+0x2af/0x760 [ 426.264366] ? trace_hardirqs_on+0x10/0x10 [ 426.268590] ? find_held_lock+0x36/0x1c0 [ 426.272636] get_empty_filp+0x12d/0x530 [ 426.276606] ? proc_nr_files+0x60/0x60 [ 426.280489] ? lock_downgrade+0x8f0/0x8f0 [ 426.284635] ? graph_lock+0x170/0x170 [ 426.288423] ? kasan_check_read+0x11/0x20 [ 426.292564] ? rcu_is_watching+0x8c/0x150 [ 426.296697] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 426.301108] path_openat+0x11e/0x4e10 [ 426.304917] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 426.309921] ? path_lookupat.isra.45+0xbf0/0xbf0 [ 426.314684] ? find_held_lock+0x36/0x1c0 [ 426.318741] ? lock_downgrade+0x8f0/0x8f0 [ 426.322973] ? do_sys_open+0x3a2/0x760 [ 426.326863] ? kasan_check_read+0x11/0x20 [ 426.331023] ? do_raw_spin_unlock+0xa7/0x2f0 [ 426.335424] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 426.340001] ? __lock_is_held+0xb5/0x140 [ 426.344059] ? _raw_spin_unlock+0x22/0x30 [ 426.348189] ? __alloc_fd+0x34e/0x710 [ 426.351978] ? usercopy_warn+0x120/0x120 [ 426.356051] do_filp_open+0x255/0x380 [ 426.359836] ? may_open_dev+0x100/0x100 [ 426.363795] ? strncpy_from_user+0x3be/0x510 [ 426.368201] ? mpi_free.cold.1+0x19/0x19 [ 426.372247] ? get_unused_fd_flags+0x122/0x1a0 [ 426.376828] ? getname_flags+0x26e/0x5a0 [ 426.380879] ? __sb_end_write+0xac/0xe0 [ 426.384847] do_sys_open+0x584/0x760 [ 426.388550] ? filp_open+0x80/0x80 [ 426.392076] ? do_sys_ftruncate+0x44e/0x560 [ 426.396389] __x64_sys_open+0x7e/0xc0 [ 426.400173] do_syscall_64+0x1b9/0x820 [ 426.404052] ? finish_task_switch+0x1d3/0x870 [ 426.408541] ? syscall_return_slowpath+0x5e0/0x5e0 [ 426.413465] ? syscall_return_slowpath+0x31d/0x5e0 [ 426.418381] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 426.423756] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 426.428596] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.433768] RIP: 0033:0x40fd11 [ 426.436944] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 426.456143] RSP: 002b:00007fc3c351fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 426.463837] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 000000000040fd11 07:10:58 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:58 executing program 7 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:58 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) [ 426.471095] RDX: 00007fc3c351fafa RSI: 0000000000000002 RDI: 00007fc3c351faf0 [ 426.478357] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 426.485609] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000014 [ 426.492865] R13: 0000000000000001 R14: 00000000004d3c48 R15: 0000000000000008 07:10:58 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote={0xfe, 0x80, [], 0xbb}}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000380), 0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x4000000001c, &(0x7f00000001c0)={@remote={0xfe, 0x80, [], 0xbb}, r1}, 0x14) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') r3 = syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000080}, 0xc, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[@ANYBLOB=' \t\x00\x00', @ANYRES16=r3, @ANYBLOB="02002bbd7000ffdbdf250300000008000100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040080000000080007000000000008000100", @ANYRES32=r1, @ANYBLOB="f801020040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r1, @ANYBLOB="080007000000000044000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b000000140004000000ff0600000000080091018000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004006401000008000600", @ANYRES32=r1, @ANYBLOB="44000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b00000014000400070004012b00000005000103f1c400003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r1, @ANYBLOB="080007000000000038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400940100003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r1, @ANYBLOB="08080100", @ANYRES32=r1, @ANYBLOB="b000020038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400020000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000400000008000100", @ANYRES32=r1, @ANYBLOB="0400020008000100", @ANYRES32=r1, @ANYBLOB="dc01020038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000002000038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000700000038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000001000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000080000008000600", @ANYRES32=r1, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r1, @ANYBLOB="08000700000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="34000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b00000004000400400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000500000008000600", @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="a001020038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400000000003c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c000400000008ffff7f000038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000800000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r1, @ANYBLOB="080007000000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b00000008000400ffffffff08000600", @ANYRES32=r1, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000800000038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004008100000008000100", @ANYRES32=r1, @ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e67000000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r1, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400ffff00003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r1], 0x920}, 0x1, 0x0, 0x0, 0x10}, 0x4000) readv(r2, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) [ 426.762548] FAULT_INJECTION: forcing a failure. [ 426.762548] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 426.774456] CPU: 1 PID: 28387 Comm: syz-executor6 Not tainted 4.18.0-rc5+ #149 [ 426.781827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.791187] Call Trace: [ 426.793789] dump_stack+0x1c9/0x2b4 [ 426.797437] ? dump_stack_print_info.cold.2+0x52/0x52 [ 426.802640] ? __radix_tree_lookup+0x3dd/0x6e0 [ 426.807251] should_fail.cold.4+0xa/0x1a [ 426.811333] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 426.816455] ? graph_lock+0x170/0x170 [ 426.820275] ? find_held_lock+0x36/0x1c0 [ 426.824354] ? find_held_lock+0x36/0x1c0 [ 426.828434] ? __lock_is_held+0xb5/0x140 [ 426.832516] ? check_same_owner+0x340/0x340 [ 426.836851] ? rcu_note_context_switch+0x730/0x730 [ 426.841800] __alloc_pages_nodemask+0x36e/0xdb0 [ 426.846491] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 426.851524] ? trace_hardirqs_on+0x10/0x10 [ 426.855780] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 426.860817] ? percpu_counter_add_batch+0xf2/0x150 [ 426.865767] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 426.870798] ? __vm_enough_memory+0x590/0x980 [ 426.875305] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 426.880859] alloc_pages_vma+0xdd/0x540 [ 426.884853] shmem_alloc_page+0xa8/0x190 [ 426.888931] ? shmem_swapin+0x230/0x230 [ 426.890449] FAULT_INJECTION: forcing a failure. [ 426.890449] name failslab, interval 1, probability 0, space 0, times 0 [ 426.892945] shmem_alloc_and_acct_page+0x1f1/0x820 [ 426.892966] ? shmem_alloc_hugepage+0x4e0/0x4e0 [ 426.892993] ? print_usage_bug+0xc0/0xc0 [ 426.917805] shmem_getpage_gfp+0x6ea/0x41e0 [ 426.922137] ? print_usage_bug+0xc0/0xc0 [ 426.926198] ? shmem_writepage+0x1380/0x1380 [ 426.930604] ? print_usage_bug+0xc0/0xc0 [ 426.934664] ? __lock_acquire+0x7fc/0x5020 [ 426.938897] ? print_usage_bug+0xc0/0xc0 [ 426.942958] ? __lock_acquire+0x7fc/0x5020 [ 426.947192] ? print_usage_bug+0xc0/0xc0 [ 426.951248] ? __lock_acquire+0x7fc/0x5020 [ 426.955478] ? __lock_acquire+0x7fc/0x5020 [ 426.959709] ? check_noncircular+0x20/0x20 [ 426.963944] ? __lock_acquire+0x7fc/0x5020 [ 426.968176] ? __lock_acquire+0x7fc/0x5020 [ 426.972420] ? trace_hardirqs_on+0x10/0x10 [ 426.976647] ? print_usage_bug+0xc0/0xc0 [ 426.980707] ? __lock_acquire+0x7fc/0x5020 [ 426.984940] ? print_usage_bug+0xc0/0xc0 [ 426.988994] ? print_usage_bug+0xc0/0xc0 [ 426.993069] ? graph_lock+0x170/0x170 [ 426.996875] ? print_usage_bug+0xc0/0xc0 [ 427.000936] ? __lock_acquire+0x7fc/0x5020 [ 427.005169] ? __lock_acquire+0x7fc/0x5020 [ 427.009404] ? graph_lock+0x170/0x170 [ 427.013208] ? find_held_lock+0x36/0x1c0 [ 427.017270] ? print_usage_bug+0xc0/0xc0 [ 427.021334] ? lock_downgrade+0x8f0/0x8f0 [ 427.025480] ? kasan_check_read+0x11/0x20 [ 427.029626] ? lock_release+0xa30/0xa30 [ 427.033597] ? mark_held_locks+0xc9/0x160 [ 427.037744] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 427.043279] ? iov_iter_fault_in_readable+0x23d/0x460 [ 427.048467] ? copy_page_from_iter+0x890/0x890 [ 427.053049] ? __sanitizer_cov_trace_pc+0x4d/0x50 [ 427.057888] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 427.063082] shmem_write_begin+0x110/0x1e0 [ 427.067317] generic_perform_write+0x3ae/0x6c0 [ 427.071911] ? add_page_wait_queue+0x2c0/0x2c0 [ 427.076489] ? file_update_time+0xe4/0x640 [ 427.080719] ? current_time+0x1b0/0x1b0 [ 427.084696] ? down_write+0x8f/0x130 [ 427.088408] __generic_file_write_iter+0x26e/0x630 [ 427.093348] generic_file_write_iter+0x438/0x870 [ 427.098106] ? __generic_file_write_iter+0x630/0x630 [ 427.103204] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 427.108732] ? iov_iter_init+0xc9/0x1f0 [ 427.112706] __vfs_write+0x6c6/0x9f0 [ 427.116416] ? kernel_read+0x120/0x120 [ 427.120318] ? __lock_is_held+0xb5/0x140 [ 427.124388] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 427.129922] ? __sb_start_write+0x17f/0x300 [ 427.134241] vfs_write+0x1f8/0x560 [ 427.137781] ksys_pwrite64+0x181/0x1b0 [ 427.141664] ? __ia32_sys_pread64+0xf0/0xf0 [ 427.145982] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 427.151512] ? fput+0x130/0x1a0 [ 427.154786] ? do_sys_ftruncate+0x44e/0x560 [ 427.159107] __x64_sys_pwrite64+0x97/0xf0 [ 427.163250] do_syscall_64+0x1b9/0x820 [ 427.167138] ? syscall_return_slowpath+0x5e0/0x5e0 [ 427.172062] ? syscall_return_slowpath+0x31d/0x5e0 [ 427.176988] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 427.182351] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 427.187194] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.192375] RIP: 0033:0x40fd77 07:10:59 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x364}], 0x1) 07:10:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 427.195551] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 427.214867] RSP: 002b:00007f9ab9648a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 427.222574] RAX: ffffffffffffffda RBX: 0000000020000150 RCX: 000000000040fd77 [ 427.229834] RDX: 0000000000000048 RSI: 0000000020000380 RDI: 0000000000000014 [ 427.237097] RBP: 0000000000000000 R08: 0000000020000158 R09: 00000000fbad8001 [ 427.244358] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000014 [ 427.251619] R13: 0000000000000001 R14: 00000000004d3c48 R15: 0000000000000005 07:10:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 427.259464] CPU: 0 PID: 28388 Comm: syz-executor7 Not tainted 4.18.0-rc5+ #149 [ 427.266831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.276188] Call Trace: [ 427.278786] dump_stack+0x1c9/0x2b4 [ 427.282413] ? dump_stack_print_info.cold.2+0x52/0x52 [ 427.287615] should_fail.cold.4+0xa/0x1a [ 427.291686] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 427.296795] ? lock_release+0xa30/0xa30 [ 427.300775] ? check_same_owner+0x340/0x340 [ 427.305096] ? graph_lock+0x170/0x170 [ 427.308886] ? rcu_note_context_switch+0x730/0x730 [ 427.313819] ? find_held_lock+0x36/0x1c0 [ 427.317875] ? __lock_is_held+0xb5/0x140 [ 427.321937] ? check_same_owner+0x340/0x340 [ 427.326247] ? rcu_note_context_switch+0x730/0x730 [ 427.331173] __should_failslab+0x124/0x180 [ 427.335407] should_failslab+0x9/0x14 [ 427.339206] kmem_cache_alloc_trace+0x2cb/0x780 [ 427.343876] ? init_wait_entry+0x1c0/0x1c0 [ 427.348117] ? loop_get_status64+0x140/0x140 [ 427.352506] __kthread_create_on_node+0x127/0x4c0 [ 427.357332] ? __kthread_parkme+0x1b0/0x1b0 [ 427.361658] ? __lockdep_init_map+0x105/0x590 [ 427.366142] ? loop_get_status64+0x140/0x140 [ 427.370535] kthread_create_on_node+0xb1/0xe0 [ 427.375020] ? __kthread_create_on_node+0x4c0/0x4c0 [ 427.380036] ? kasan_check_read+0x11/0x20 [ 427.384175] lo_ioctl+0x7ce/0x1d10 [ 427.387718] ? lo_rw_aio_complete+0x450/0x450 [ 427.392213] blkdev_ioctl+0x9cd/0x2030 [ 427.396099] ? blkpg_ioctl+0xc40/0xc40 [ 427.399974] ? lock_downgrade+0x8f0/0x8f0 [ 427.404123] ? kasan_check_read+0x11/0x20 [ 427.408265] ? rcu_is_watching+0x8c/0x150 [ 427.412411] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 427.416827] ? __fget+0x414/0x670 [ 427.420271] ? expand_files.part.8+0x9c0/0x9c0 [ 427.425286] block_ioctl+0xee/0x130 [ 427.428911] ? blkdev_fallocate+0x400/0x400 [ 427.433236] do_vfs_ioctl+0x1de/0x1720 [ 427.437108] ? rcu_is_watching+0x8c/0x150 [ 427.441250] ? ioctl_preallocate+0x300/0x300 [ 427.445658] ? __fget_light+0x2f7/0x440 [ 427.449625] ? fget_raw+0x20/0x20 [ 427.453072] ? putname+0xf2/0x130 [ 427.456511] ? rcu_read_lock_sched_held+0x108/0x120 [ 427.461521] ? kmem_cache_free+0x25c/0x2d0 [ 427.465750] ? putname+0xf7/0x130 [ 427.469205] ? do_sys_open+0x3cb/0x760 [ 427.473096] ? security_file_ioctl+0x94/0xc0 [ 427.477501] ksys_ioctl+0xa9/0xd0 [ 427.480949] __x64_sys_ioctl+0x73/0xb0 [ 427.484824] do_syscall_64+0x1b9/0x820 [ 427.488705] ? finish_task_switch+0x1d3/0x870 [ 427.493186] ? syscall_return_slowpath+0x5e0/0x5e0 [ 427.498121] ? syscall_return_slowpath+0x31d/0x5e0 [ 427.503052] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 427.508402] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 427.513233] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.518412] RIP: 0033:0x455927 [ 427.521594] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 427.540921] RSP: 002b:00007fc3c351fa88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 427.548643] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 0000000000455927 [ 427.555912] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 07:10:59 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:59 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 427.563175] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 427.570451] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 427.577727] R13: 0000000000000001 R14: 00000000004d3c48 R15: 0000000000000009 07:10:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrf%\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:10:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000000200)=""/4096, 0x13a8}], 0x100000000000025d) 07:11:00 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) [ 427.888690] print_req_error: I/O error, dev loop6, sector 128 07:11:00 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btr.s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) 07:11:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btr.s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:00 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btr.s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:00 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x15f}], 0x1) 07:11:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrf0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:00 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:00 executing program 1: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x4, 0x4001) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000100)) r1 = fcntl$getown(0xffffffffffffff9c, 0x9) r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/route\x00') readv(r2, &(0x7f0000000000)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1000000000000358) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000080)={'lo\x00', {0x2, 0x4e21, @multicast1=0xe0000001}}) 07:11:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btr/s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:00 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btr/s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:00 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x10) 07:11:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfd\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:00 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btr/s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000040)={0x5, 0x200, [{0x0, 0x0, 0x9dd}, {0x4, 0x0, 0x5}, {0x0, 0x0, 0x20}, {0x8d, 0x0, 0x7}, {0x3, 0x0, 0x4}]}) r1 = getpgrp(0xffffffffffffffff) stat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000e00)) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000c00)) r3 = getegid() r4 = getpid() r5 = geteuid() getgroups(0x3, &(0x7f00000008c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee00]) r7 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000900)=0x0) getresuid(&(0x7f0000000940), &(0x7f0000000980)=0x0, &(0x7f00000009c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000a00)={0x0, 0x0, 0x0}, &(0x7f0000000a40)=0xc) sendmsg$unix(r0, &(0x7f0000000bc0)={&(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000740)=[{&(0x7f0000000200)="18e151a6c0515d12ed73df1ae3ca46661b55e9012c3ca73672fc63eaef651477913299fcc8d9f031cd029a62a450a7d0b4b5829c31c3dd86a3ac980db2b56422d81ba22bc138314847305ef41b5274733ccade9e00ef31e9ad8af9873b4f7c1d7c4cc0a331164ef251c467af67c560da3e476df017352d1bdad46ec82024be78f2c31b659679ce5a8848d0d450900d76c5a606cccfc235807aeb5da17c160c1f8306c52b84438d0a93586fe783d3b4a5dae47c45c53994a3afca02fd997268adf60e8550d987453ce1cfc4eb70d5d5cd006b7835fd844da04aac2f711e158c4187f224af8b1392c3ea3e581ece6b36aa4a1b2ca71ef151f51489136b", 0xfc}, {&(0x7f0000000300)="0be822b8106ea01cba82cebeb6ceef18cdf435ff53d73625af84ab46e8c3be0d747ee29eb40842aa4fd7d8077926dba8f327ccd70964c7c3a43ae86286d72eeef996f5c1d7b2e5a0145e208aa6dc9d6753359b4d2b9585fe9316fc51989fbc227facf238ca607d6b5f3afc7e06976381074263f9f2bb1f4b6f3bfef3b74851e5046dd7a54eda75345b7161c3dd749ad3abf52592940e0e6f47472f58db4859c3f781897bb9f458dbb20697dcd570a6fa245affbd1ec0cc295aad1200467c1ee8055b63cf622387c91d79d5baacf0865f2e86dfd32f1ab0b164b7f675a7c5e67a3d040080e6c49827fc122af43e156cfff495a2e1f53a", 0xf6}, {&(0x7f0000000400)="aa0c1f413fa094e9d3f39273adc7ff8e8dc7b98db0d69644e130ffd67ba1e32e5837108e0b7008ae22202825042f57cfb1c7553d256e845a3f1d5b08405d52613d60f4b12a05e993a2f8db6137c2e8ea58e51bbbf97a7d97bee9d116efc63e95984358a985e6b2e1646b17ecf3ece7e211808adc6b7c6a02899a02dc39f69d24a2d2365f68f6fc78f89975fcf6bb950f7c3c3e99555b98f8b6b82259417f9e53bafe", 0xa2}, {&(0x7f00000004c0)="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", 0xfa}, {&(0x7f0000000140)="49649ec4708349928fac7afa0c261fb3b1db89c4d76df87d3591d03b5d4355da56b4e0102e09191a7b296d15c8972543c4c1de9728c793c765", 0x39}, {&(0x7f00000005c0)="997b819a4657199f29c3009346ec99e8f0ab35adb42545bb2ab81e9fc03afeb3df094734dbc63b45da0fa3bb4d757a7e64faa4913ad33f53d3f83cb551d31e35b928d9a3d73bc03dab0c48ac78a4f17d3a323f3c1e0e06f73eac11a97886d1ac6e9fd7068de061afae9960f683e27ca37265f328b0b79af1b29b1b4378a63ea805bab76f1bf04569deed64e24413d05fc1d008e4420199fb1e05", 0x9a}, {&(0x7f0000002540)="52b980b61d8368be3c3128f50c7f802321a1fdbf709a1bf8c35ebcfaece12384c8fcdc74791437ddde4df02c03b46fd641e97b26a84149a9d71f641f983fee1b077c60c26ac14bbbb8f609840faa894e5ce94c7ec4284526665ae1904c8c980ba2b57d06a60c65bbc715fa20468d25408c60db7891541190178395b2f4845cf94afe0ff329704a8968b243408bbbe21d96444ac672355088ec6a3ec992d1ab71f282c1e2981ede2f569a64d0b8e4b95fcdf27bdf9709fff4be83ad3aec594ec76fbc47c23db48af420175b4a7a0ac1578299d0cce6333456127adf27f8a5ef54e7868c82f029ecc1d027b422876dc79462f042a6b58037451d5955d592a261ae70f1ebdf1834d19c167f935586684fbce82bf804de73ac91297638fc6f88c55e9e452d9e1b714dc068c0d241a92f6534208f0c5c2c46851b0305ec3dfcfc258e142dfd832ffff68389448d93464ab0769ce81e4347f9a444d31ef719fc83a90a23f654b742ed39db8d232154307516778c0eee34eb22ad51b842efaaa78a2c16e051d15ad94fd24ada7b215a2378ceee88f67909ff5090fe3a433c0717f9b35f5327158624b58a2bdea14a4ff89bebc6ec1cefd7aa304321f31778fcf8807780c4488d145a18a3464bd822d7fdedec94b309a5386e73623e1a65d2860299aa8191804dafd62e68101d4ebfba369c613dca6204f17c94ba27940f7a871bc32319678125fcce8e230f81dd9701e1da4fda52626f26115870f0aa1c77d1029812c842b9d766a4b57a39728a25e696d07e49401ae8a0030e9afd7703b184dcc472dedb5f371216e4b5a10c496ecb2b61df6aa1e48dbe5337e33985233fac990440022f1c9f3bc6b0b7e076fb1304987ca6cbac21b5c4515de6fd3a4a1d0d3654fade736882684923008b9fa86ff25e16616dff5b787a9b23f8a9693f9bba991193d56ae9b9e3ca4b0b48f444c84bb2a1470f489fa5d9ae69dbf186c03296db90a68e7b6a2296e30fec0b37ed38bf891ec003e1a0c01e696ba8bac9e18b175c59e63693c2fccfa8b9fccaf15da65e41e4b640c5dc46bfe526b6557a5b18518ce10e53c08b459d0f5ac311c1f9e0326cd422f00be260bc05ce83e2932f18845a2fa2be979a24acda9c4c91070667f2dcc3ef94611386be9ad80c8cb351b11e8c862466cfcc9dd8c9f0cf6b252c2538f2a458d5ce1d05ed924e29d2fb621e016e8d0f4f5b8dc3a6f325d4f9b81878c515e9c0282e28217daf7341e156aef8828c5eda4510d9bfd1369f1d4fbd0c8cc63d9b891b6e7fc4afaecf3f04918be66bef84a4759bfcdfa77992a681eef7d3e20449882fbe882c01dd6e90df66ec5dc5cf5bac6b059d57e8c7e8456914a714620cf108339d6a9f0eb99161a44d2698df4ab534a055b2fa996d3bb68336eb3baf8f2a486e2d0cccfc1f38b7360e2e65bd57f5440a68da626b75705195f6c4aa10ed78a7fa6faf62f0cd537cb7293af5d8b2e354e73898f7bbd4a915cfbbb506167146c455c73dd2931f3cdb66f7da8c698b87448014afc35cec02e829db730ce8baedc4efc8d4be1a6d8417647b9fb440fc15bebf57f31ad47cb55eaab0926300dcbd6862b2cbb3d5fe64157e1630ea7a5d28b103e1068ec53329acb36b7c958f520ba71b60f87ac3dfd19d94526e91698ab079647aa691db9363704b4d005712cccfee465a28bb33de5dcb2ca42da36ce7444cb84b5dc4f2b1954f06da7af0f5427527588dbb62a845ade57fb332b54ab706d07b9b20d2e831ba1c014cbc19f7f6ab2234fbcd2d96bc66e520c2d2a6d5c12300b257e7f096482b81ac7ad779185f9f058da90eb311d45161d755285a86a19406236592464600b95eb3a561fa7ff772e73587f8b760277d64deb146cc6370587d5718c40c7a4c1b07cdc49d38ce4e42c7095c5b6fa883a2586285f3c598cac940847a0e71cd753195d95e5bd220141f06caa2b8b01fa2ff98f1dac916be307e7c00fcd6778d714af51d857d22c73e4dbc131768c4299e3fb560051d9a2116777177e7fed144b3af3cc2c177a7840de38548828093232abd366cae6c01c5a0dc1f4ad31eceaf58b25784451df3b955a76d7be06cda7366f376a6b5d3fd7d541dbb37324c8d984763fca28c3ff9f2e640223efa60cf81b771beae8c3328097b9b21bd31db74a62863e7d41795b5aa1f4952be3b84e8cd05d80be898d79d48740b0a0b2a01f67af919ba767f698b6778a9c7a38e04a0ffd7625dabda3d4144342b133ce88292249cde009bcaecf65b8db8c7ab63e4c12cb3045216fb2a5b8fc3924c30e4bfc6e519d4384e273004b21072c3af34ddfe3e20f1e8be135433850369073e639a7385c9b7cf53a6e0df8804f4d4433dce6997ca4cb1ecf711e7ad4e82cdd1c2dac4b02b866991d41106550fda663a4ba6183ec8cb13b76175b8a39acca3dd3c9c540fd98868e6fe126dde82083ed11586f3cd146e316db42f9851e107ab4f816e320e9c13a7e2224a625088fc381c2fac106c69e4f84f111ea884a260a59de48c3c62e428bc0caee445f5d86ae17ce6ed0e5304f4908c01bb029cef6c019e1bff77996354dee66289cddfbe9b6397c78ca93b28df996da835b4436d482562c360edd2baf363aa68f33438f056600e0915184e8b81fec26e70c2b77e8d6b1f92547a095834b0cded7542ba2ec820f63e97d09b367aac8d7782b6a546179629427a23fef87fa58d200dd32bf8ea9f8f371afa9b022d96809a734350e0824bec084a49b6b2d119768a2fe036f0168c2a2d3283485384e9ef8499aad01e505fe149bd748d705ea472123495cdc2a0964595ecbcf70f717a42af15d09d5dff093ba88d1465170a8cb6ebd7f7d69e9e1ac2b74597d04d5274adffbd6c78c8fa73201a01f0c41ba6a6b9c6b8a2b66728a8281d78af66201b946b78b0a9e6d1f7b5b59ab59c67065b79d5aaf57458445de7e20bf673dd8dd9fa94b95f0622fd7ad296e45425f19e258126ada2289b8490871fc393e2a44378a2f0de91fdb0d3111491ea7ebc41b272551658231be100d14ca7a37a2280e1631c48a58abeb6c539d44af73412cab5f1f12cf703e92e4f0dbb242ee27afa60562a80cb625207560b268811c93f967903c8606d90cfd109a82eafd1c977fcba05e715a0e5bfa3c93c4670eaf3179c1d8bd2111f884bbb43e20093be47fc957e591cb7c646b99937c9def9e0087185afdec421238f9dd592314247091224deb1c9f783c8d38445596c6fdc9c7cf6c357b7e348be05137c532f35bfc6323fb98f2f5d082e7f5b3d820a05e4c5728789ef8802927de58e2cee10c9ca3c8e82b0d637c82d054246565fefac68513e040ff034bb1ddf1caf8f1e35960242f5c08fd5967492455526cbfb2a2d6cacfff5c7cd008450d42486d61ab58dfb7ef8d1c03642ff57d15ac00a4d027068a61a1485d4c04a7fd2736a7c5229d19bd7a1703ba94f5e9a61ab46577774707e851bb534eec4019374ff9a425eb61a309e2918ca1877c537d12f474e5f74c7c0044cd3d0316ad2d58ae3a0ee6ce9338408bb8f4d17c9184a93d52e91d2d90c420ee146f41424e73dc59971b284d6581614daa474b3465e5f9466df7e57de1e4b9152c8d7b0cb3f81b3a809755be5969d0f1fc4494841a668e169d632ccb2107e7d3abfb01733a2703cc44c1edd19509ad1816a96fa69cab2a84d83ec2bf84b715851f39abb62eeb404fc19e5f479b263ade90e526164e1bbda4b9577899255b00333b9dc357c503b4ae80c8ef3a4524be45c6615e2616bfd007d0a57cdcf6a28b11a5fd81baf18aa4d46b2046734e57b5e19f7a15ecf5403dfd89567f724bfb6effd920f602b750c3c8947cae7fe94331267c0f9ad90b4df2471af6d53734804ae5b6bca3d6e8e1e5aec104820ab1b6a3b26ccb5344eb3775f489a662840342ab91b86443e08f60f4d7d047d9f8dfe3a2589dca74a3fa4b29f17a1c8bdab5f6adf53711d777ca7ccef6438e826868eef15094f83dc97e0df67734cd2b1a256819126bce1d51a52c5f02c241a14cc45cfc679cf3e0934eb68b6f65d83e7bc1330a343071974bf8bed414522151e6e3f55837c2fa563b2e5b7888942725164564ee0a3ad660a45aca0c1edc8e8a7bf521ce343ed480c93847ebaa6258e98f98817bd6be5559ee4f4e9e28faaf968979aa7b634cb3510e4dd1dec949c12f4149d36ba6329e8d61aec331f8e67b49c8d2702abb08c67a5d5bebb62635542f4156b4033082e8dfa32e18803ab47ca22e16fc6fd801ba10d3cc660781af75e4b9013c28450aba1757ecd85eacac5ec8ff9db0bcb29562f939da258bb94d57cf10f0c8355dabeca6b4bd218b23a59007fd8dbfd94f71d8a953db378fb37b2975ded46923be8d981edae6c6bc20761b8bce4275f3c2074d3abee65e69b1fbef7f4210f54b00c6de362f071b00228a8e15a40d2270b47b7ba60d31e205421c47af43cb9d1a84b53df70a233995f92fe9d58e801656ea4edf5a7b0ad8e09971f949ab73dcf57a2f3047cae03c14207c403a8e9945a992802dfbf68979c36657cd5f1b308f2f9a9ce8698fe99e21a0679918ba6784b1fc8b58b4cb7d5c77fb506f147f23e2a36648cc2e3f51008a36ef148e647604f9c991d11ee662fe1060d03159a8d0920e15d59375025e713a62b1f5f93300c72dc7bf10a70ca81ac5e7f31bc104fb0ca085d39b65b09aadee1035fbc7b86431eeb15d46b5b202bf78961a7ad74c7dd8a58ffc25bf9235b0e640c7fd243795882b8089d0ecfa125ccb45c6d8af9f00fe07ac264b3dba1feb364a09c5d85f25b34dd8db4b82206a311c7a4f1668cb9abb27b7d652f37079f0e848c0aeb00822ccfdaf7ce2f7751829a0cab64b040ae69928c2b86c20ffa769eba2eb23461e086044826e0fd396717bab89f8aacbfbb1a389da142769e4b56d9e2587b9a4431088b6e284f32397eb6226b5c78caf5e1f558eecc2fbfd0f95896b5489daeb0990f216e23ad99556874cbafc8fd8a426f5f1ebb81efbcf6e24f1171b0066bac3435c054ad92691c2e43d3a8433d13733066c6d50564c8245dfea13bc534ce4a38525b7a95c5de8c19c40c41364553d2e6c6772619a2ce9d3ca82ea2d12cca8ee38eda0b74a1d098bf83d4285b6acb63573bdcd264a9138c9d2710967949fd84d5fcda0ad0f2f8517df9ba47391c8e6d9276b00f9c582004f51f554b21a4703f68b73fa99907fa6cea7f9b45372467d9471468b8b479bcdee3bd45a26e642194670da6b200fe31b075e112bd7926a65571353710b60a43edaa1819e36081e4ec92e3267f555ca24abd6baafaa6d36fd7fe02b0d7c208c0d56c1715b46afad0b3f64764fddcc1d6707e88622ed5dd3765ee6966c4622829475929b7d273cba573d6c9f846bd60af248d7f8577ed86f81eb4272e6a23342a68b6105dda21d5c8baeb7b858f8b90b180fa257e5642b77bc0886288c00757a8d49c22677a337f2c9b32356210442b9134cc1eae3ca5e6c65898036f3764acf2f67fd32aff48bafdfb6fca1758c46e1add0e4a8590c7365a4d34a0053843874d01fb5cdbbda6f69714b1b061c6e308b3402feca8b7f2cf19381cf20f3e6cf4011ec8f8e3a7c50a68e131c9cd7056c2485e04b071a20ff95e11a448886916b3dad3af2845b259d7ab99b1a513c4c56f2d4a90bbe0bed4c70e9e98445ea3e58493a9eacbf0370592d3f203cddda8a6f18012580724c1191a3a7f1d88d38f839fd1d1e71c4391e0093f18ecf2b18da55f61915f14e1575d1f8b618e0e67", 0x1000}, {&(0x7f0000000680)="33fffa7b6661def388ca2927409657b9556da81ed87cb952eccaaab0436a52be4b60aad890dac6f4f06814d0aad1ab6ea1ad104968d13077bdc29cfa50f0e4ff00217483de905f431192fb8d58581ccacdc82039537b6e3d5c2d2d62359f1dbc8c9278dcaf864bc49680929f8f1b9afd221367c5079e1202fac87eda28d77b69b1a5f0e85e8f7ae3", 0x88}, {&(0x7f0000003540)="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", 0x1000}, {&(0x7f0000000180)="f10d8514165c96e9e9a468dfdb650dd7a2061431450771f6996c38fc850afd52c50df050931ccc69839ffdeca3e467", 0x2f}], 0xa, &(0x7f0000000a80)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}, @cred={0x20, 0x1, 0x2, r4, r5, r6}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r7, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @rights={0x10, 0x1, 0x1}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}], 0x110}, 0x20040000) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000cc0)={'vcan0\x00', 0x0}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000d40)={@hci={0x1f, r11, 0x2}, {&(0x7f0000004540)=""/4096, 0x1000}, &(0x7f0000000d00), 0x2}, 0xa0) 07:11:00 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfl\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:01 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfu\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:01 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrf0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000002580)=""/4096, 0x1000}], 0x1000000000000065) 07:11:01 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0xce1) 07:11:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrf-\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:01 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:01 executing program 1: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) r1 = syz_open_procfs(r0, &(0x7f00000001c0)='net/route\x00') readv(r1, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) 07:11:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 07:11:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfd\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:01 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrf#\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:01 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrf+\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:01 executing program 1: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) 07:11:01 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x9) 07:11:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfX\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 07:11:01 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)="7468726561646564ff", 0x9) 07:11:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf%\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/route\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x100082000, 0x0) readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) 07:11:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrf.\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:01 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrf+\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000000240)) 07:11:02 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0xf62) 07:11:02 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfu\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:02 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:02 executing program 1: getpid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/icpu\x00') readv(r1, &(0x7f0000002540), 0x0) 07:11:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf+\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:02 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrf.\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:02 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0xc26) 07:11:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfc\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:02 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x80000, 0x0) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000100)=""/69) syz_open_procfs(r0, &(0x7f0000000080)='net/route\x00') 07:11:02 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:02 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfo\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:02 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200, 0x0) sendmsg$nfc_llcp(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x27, 0x0, 0x1, 0x1, 0x6, 0x1, "e2e225511bf73f39e8abcb1e9cc2cf1a755ce2c733f8bc5f4c1913e81e03da426f6e24c1ecbe0137d17a0a7cd34f0e407b6f3e15026bd0f526aa0473b827b0", 0x1}, 0x60, &(0x7f0000000300)=[{&(0x7f0000000380)="af3efc7065cca59fb0e403fcc29ce580155aae4db9f0babf286b44a76c4468a21fa0a5c93e1e5857edaec3235f33464b578016960e8391f286083873fa57e26c83bb4f96797117ddb97ca41aa2bff9431d17027e4b5882aa06a227200edf44661b7c2ea0122da8722552d16dafee8ccf1690c5b8c4068074d57b35ee6df894160dde5e5121c7aca6d2cd591bbd63eeaf87fa868c9a0b5d95402575f52532071e8fb4d21b83f757697c2788c23bba0d398eb5b704b787d70e35a7b8e8fcda7f328ec4eba423d267aca205c6268db6110999448e", 0xd3}, {&(0x7f0000000200)="2e2d0e518479350818018029d58357", 0xf}, {&(0x7f0000000240)="36b5bdca1df68a1559e02a56d58b62d98280b5d430001a8c17b5751918b948097321ca28130fc75957cd5f71a9a58ef6c367c71517725cbe72ae325ad17dad15f127a028208f46f67e8ace921381540a5bcb91003031ab02bab8951dba149af5a6f2e182baf4de3e83a9c9f5a17a051e8afeab4986158365f9f11886556bff3051fce028fa542c1a15fb677ddb71935c43b42f357fbead894f737a74a2c33fb93ac39f5825", 0xa5}], 0x3, 0x0, 0x0, 0x8000}, 0x2000c001) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r1, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f00000000c0), &(0x7f0000000100)=0x40) 07:11:02 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0xeb9) 07:11:02 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrf-\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfX\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfu\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:02 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)="7468726561646564ff", 0x9) 07:11:02 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:02 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0xc4b) 07:11:02 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfd\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/icmp6\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)={0x9, [0x6, 0x1, 0x5, 0xf05, 0x100000000, 0x401, 0xffffffffffffff76, 0x10000, 0x1]}, &(0x7f0000000040)=0x16) 07:11:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:03 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrf%\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 430.897123] FAULT_INJECTION: forcing a failure. [ 430.897123] name failslab, interval 1, probability 0, space 0, times 0 [ 430.908618] CPU: 0 PID: 28867 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 430.915990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.925357] Call Trace: [ 430.927962] dump_stack+0x1c9/0x2b4 [ 430.931609] ? dump_stack_print_info.cold.2+0x52/0x52 [ 430.936833] should_fail.cold.4+0xa/0x1a [ 430.940912] ? fault_create_debugfs_attr+0x1f0/0x1f0 07:11:03 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/ipv6_route\x00') readv(r1, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) [ 430.946028] ? lock_downgrade+0x8f0/0x8f0 [ 430.950194] ? proc_fail_nth_write+0x9e/0x210 [ 430.954698] ? proc_cwd_link+0x1d0/0x1d0 [ 430.958773] ? find_held_lock+0x36/0x1c0 [ 430.962859] ? check_same_owner+0x340/0x340 [ 430.967193] ? rcu_note_context_switch+0x730/0x730 [ 430.972138] __should_failslab+0x124/0x180 [ 430.976388] should_failslab+0x9/0x14 [ 430.980198] __kmalloc+0x2c8/0x760 [ 430.983739] ? strncpy_from_user+0x510/0x510 [ 430.988149] ? fput+0x130/0x1a0 [ 430.991430] ? __x64_sys_memfd_create+0x142/0x4f0 [ 430.996270] __x64_sys_memfd_create+0x142/0x4f0 [ 431.000932] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 431.006466] ? memfd_fcntl+0x1400/0x1400 [ 431.010523] ? do_syscall_64+0x9a/0x820 [ 431.014497] do_syscall_64+0x1b9/0x820 [ 431.018375] ? finish_task_switch+0x1d3/0x870 [ 431.022870] ? syscall_return_slowpath+0x5e0/0x5e0 [ 431.027800] ? syscall_return_slowpath+0x31d/0x5e0 [ 431.032736] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 431.038099] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 431.042939] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 431.048123] RIP: 0033:0x455ab9 [ 431.051312] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 431.070547] RSP: 002b:00007f5205df1a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 431.078265] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000455ab9 [ 431.085533] RDX: 0000000020000158 RSI: 0000000000000000 RDI: 00000000004ba6a1 07:11:03 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)="7468726561646564c0", 0x9) [ 431.092788] RBP: 000000000072bea0 R08: 0000000020000158 R09: 00000000fbad8001 [ 431.100050] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 431.107311] R13: 00000000004c21cd R14: 00000000004d3c48 R15: 0000000000000000 07:11:03 executing program 3 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrf*\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:03 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0xdff) 07:11:03 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfl\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) fcntl$getown(r0, 0x9) [ 431.383512] FAULT_INJECTION: forcing a failure. [ 431.383512] name failslab, interval 1, probability 0, space 0, times 0 [ 431.395445] CPU: 0 PID: 28907 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 431.402820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.412180] Call Trace: [ 431.414782] dump_stack+0x1c9/0x2b4 [ 431.418425] ? dump_stack_print_info.cold.2+0x52/0x52 [ 431.423694] ? print_usage_bug+0xc0/0xc0 [ 431.428577] should_fail.cold.4+0xa/0x1a [ 431.432653] ? trace_hardirqs_on+0x10/0x10 [ 431.436902] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 431.442031] ? find_held_lock+0x36/0x1c0 [ 431.446120] ? find_held_lock+0x36/0x1c0 [ 431.450212] ? check_same_owner+0x340/0x340 [ 431.454546] ? rcu_note_context_switch+0x730/0x730 [ 431.459488] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 431.464504] __should_failslab+0x124/0x180 [ 431.468745] should_failslab+0x9/0x14 [ 431.472547] kmem_cache_alloc+0x2af/0x760 [ 431.476698] __d_alloc+0xc8/0xd50 [ 431.480145] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 431.485148] ? do_raw_spin_unlock+0xa7/0x2f0 [ 431.489541] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 431.494115] ? __lock_is_held+0xb5/0x140 [ 431.498175] ? _raw_spin_unlock+0x22/0x30 [ 431.502311] ? __alloc_fd+0x34e/0x710 [ 431.506105] ? exit_files+0xb0/0xb0 [ 431.509736] d_alloc_pseudo+0x1d/0x30 [ 431.513544] __shmem_file_setup+0x1f3/0x700 [ 431.517866] ? check_same_owner+0x340/0x340 [ 431.522281] ? shmem_fill_super+0xa50/0xa50 [ 431.526603] ? get_unused_fd_flags+0x122/0x1a0 [ 431.531181] ? __alloc_fd+0x710/0x710 [ 431.534989] shmem_file_setup+0x2f/0x40 [ 431.538960] __x64_sys_memfd_create+0x2af/0x4f0 [ 431.543633] ? memfd_fcntl+0x1400/0x1400 [ 431.547696] ? do_syscall_64+0x9a/0x820 [ 431.551671] do_syscall_64+0x1b9/0x820 [ 431.555552] ? finish_task_switch+0x1d3/0x870 [ 431.560127] ? syscall_return_slowpath+0x5e0/0x5e0 [ 431.565067] ? syscall_return_slowpath+0x31d/0x5e0 [ 431.570010] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 431.575374] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 431.580224] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 431.585409] RIP: 0033:0x455ab9 [ 431.588591] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 431.607881] RSP: 002b:00007f5205df1a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 431.615600] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000455ab9 [ 431.622874] RDX: 0000000020000158 RSI: 0000000000000000 RDI: 00000000004ba6a1 [ 431.630134] RBP: 000000000072bea0 R08: 0000000020000158 R09: 00000000fbad8001 [ 431.637390] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 431.644645] R13: 00000000004c21cd R14: 00000000004d3c48 R15: 0000000000000001 07:11:03 executing program 3 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:03 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrf0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf#\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:04 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0xd04) 07:11:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfo\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:04 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfc\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000000040)=[{&(0x7f0000002580)=""/4096, 0xfffffffffffffe29}], 0x0) 07:11:04 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) [ 431.971100] FAULT_INJECTION: forcing a failure. [ 431.971100] name failslab, interval 1, probability 0, space 0, times 0 [ 431.982407] CPU: 1 PID: 28953 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 431.989768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.999124] Call Trace: [ 432.001708] dump_stack+0x1c9/0x2b4 [ 432.005350] ? dump_stack_print_info.cold.2+0x52/0x52 [ 432.010559] ? __kernel_text_address+0xd/0x40 [ 432.015077] should_fail.cold.4+0xa/0x1a [ 432.019176] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 432.024640] ? save_stack+0xa9/0xd0 [ 432.028282] ? save_stack+0x43/0xd0 [ 432.031920] ? kasan_kmalloc+0xc4/0xe0 [ 432.036084] ? kasan_slab_alloc+0x12/0x20 [ 432.040260] ? kmem_cache_alloc+0x12e/0x760 [ 432.044589] ? __d_alloc+0xc8/0xd50 [ 432.048225] ? d_alloc_pseudo+0x1d/0x30 [ 432.052199] ? __shmem_file_setup+0x1f3/0x700 [ 432.056692] ? shmem_file_setup+0x2f/0x40 [ 432.060854] ? find_held_lock+0x36/0x1c0 [ 432.064942] ? check_same_owner+0x340/0x340 [ 432.069276] ? rcu_note_context_switch+0x730/0x730 [ 432.074215] ? kasan_check_read+0x11/0x20 [ 432.078373] __should_failslab+0x124/0x180 [ 432.082620] should_failslab+0x9/0x14 [ 432.086430] kmem_cache_alloc+0x2af/0x760 [ 432.090606] ? rcu_read_lock_sched_held+0x108/0x120 [ 432.095633] ? kmem_cache_alloc+0x5fa/0x760 [ 432.099963] ? shmem_destroy_callback+0xc0/0xc0 [ 432.104645] shmem_alloc_inode+0x1b/0x40 [ 432.108714] alloc_inode+0x63/0x190 [ 432.112351] new_inode_pseudo+0x71/0x1a0 [ 432.116428] ? prune_icache_sb+0x1b0/0x1b0 [ 432.121038] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 432.126069] new_inode+0x1c/0x40 [ 432.129460] shmem_get_inode+0xf1/0x910 [ 432.133454] ? shmem_encode_fh+0x340/0x340 [ 432.137697] ? _raw_spin_unlock+0x22/0x30 [ 432.142642] ? __alloc_fd+0x34e/0x710 [ 432.146461] ? exit_files+0xb0/0xb0 [ 432.150112] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.155668] __shmem_file_setup+0x259/0x700 [ 432.159999] ? check_same_owner+0x340/0x340 [ 432.164329] ? shmem_fill_super+0xa50/0xa50 07:11:04 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200180, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) r2 = syz_open_procfs(r1, &(0x7f00000000c0)="4c65742f6cbc3f00") readv(r2, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) [ 432.168661] ? get_unused_fd_flags+0x122/0x1a0 [ 432.173248] ? __alloc_fd+0x710/0x710 [ 432.177058] shmem_file_setup+0x2f/0x40 [ 432.181046] __x64_sys_memfd_create+0x2af/0x4f0 [ 432.185726] ? memfd_fcntl+0x1400/0x1400 [ 432.189796] ? do_syscall_64+0x9a/0x820 [ 432.193783] do_syscall_64+0x1b9/0x820 [ 432.197670] ? finish_task_switch+0x1d3/0x870 [ 432.202179] ? syscall_return_slowpath+0x5e0/0x5e0 [ 432.207566] ? syscall_return_slowpath+0x31d/0x5e0 [ 432.212511] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe 07:11:04 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) [ 432.217882] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 432.222737] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 432.227936] RIP: 0033:0x455ab9 [ 432.231121] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 432.250472] RSP: 002b:00007f5205df1a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 432.258194] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000455ab9 [ 432.265636] RDX: 0000000020000158 RSI: 0000000000000000 RDI: 00000000004ba6a1 [ 432.272912] RBP: 000000000072bea0 R08: 0000000020000158 R09: 00000000fbad8001 [ 432.280188] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 432.287486] R13: 00000000004c21cd R14: 00000000004d3c48 R15: 0000000000000002 07:11:04 executing program 3 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x5, &(0x7f0000000000)=[{0xe90aff5, 0x3, 0x3000000, 0x60}, {0x3ff, 0x1, 0x401, 0x5}, {0xfffffffffffffff9, 0x32, 0x100000001, 0x6}, {0x2, 0x3, 0x40, 0x5}, {0x8, 0x10000, 0x227d}]}, 0x10) readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) 07:11:04 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0xd65) 07:11:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfp\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:04 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfX\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrf#\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 432.556578] FAULT_INJECTION: forcing a failure. [ 432.556578] name failslab, interval 1, probability 0, space 0, times 0 [ 432.568196] CPU: 0 PID: 29017 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 432.575685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.585047] Call Trace: [ 432.587648] dump_stack+0x1c9/0x2b4 [ 432.591294] ? dump_stack_print_info.cold.2+0x52/0x52 [ 432.596508] ? __lock_acquire+0x7fc/0x5020 [ 432.600767] should_fail.cold.4+0xa/0x1a 07:11:04 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrf*\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 432.604847] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 432.609974] ? find_held_lock+0x36/0x1c0 [ 432.614048] ? graph_lock+0x170/0x170 [ 432.617867] ? find_held_lock+0x36/0x1c0 [ 432.622045] ? check_same_owner+0x340/0x340 [ 432.626376] ? graph_lock+0x170/0x170 [ 432.630186] ? rcu_note_context_switch+0x730/0x730 [ 432.635117] ? kasan_check_read+0x11/0x20 [ 432.639254] __should_failslab+0x124/0x180 [ 432.643479] should_failslab+0x9/0x14 [ 432.647267] kmem_cache_alloc+0x2af/0x760 [ 432.651401] ? find_held_lock+0x36/0x1c0 [ 432.655453] get_empty_filp+0x12d/0x530 [ 432.659419] ? proc_nr_files+0x60/0x60 [ 432.663305] ? kasan_check_read+0x11/0x20 [ 432.667440] ? do_raw_spin_unlock+0xa7/0x2f0 [ 432.671834] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 432.676502] ? kasan_check_write+0x14/0x20 [ 432.680730] ? do_raw_spin_lock+0xc1/0x200 [ 432.684954] alloc_file+0x24/0x3e0 [ 432.688477] ? clear_nlink.part.9+0x65/0x80 [ 432.692786] __shmem_file_setup+0x313/0x700 [ 432.697110] ? check_same_owner+0x340/0x340 [ 432.701429] ? shmem_fill_super+0xa50/0xa50 [ 432.705745] ? get_unused_fd_flags+0x122/0x1a0 [ 432.710316] ? __alloc_fd+0x710/0x710 [ 432.714108] shmem_file_setup+0x2f/0x40 [ 432.718081] __x64_sys_memfd_create+0x2af/0x4f0 [ 432.722734] ? memfd_fcntl+0x1400/0x1400 [ 432.726790] ? do_syscall_64+0x9a/0x820 [ 432.730754] do_syscall_64+0x1b9/0x820 [ 432.734712] ? finish_task_switch+0x1d3/0x870 [ 432.739193] ? syscall_return_slowpath+0x5e0/0x5e0 [ 432.744125] ? syscall_return_slowpath+0x31d/0x5e0 [ 432.749052] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 432.754403] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 432.759244] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 432.764421] RIP: 0033:0x455ab9 [ 432.767610] Code: 1d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 eb b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 432.786877] RSP: 002b:00007f5205df1a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 432.794574] RAX: ffffffffffffffda RBX: 0000000020000140 RCX: 0000000000455ab9 07:11:05 executing program 3 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 432.801830] RDX: 0000000020000158 RSI: 0000000000000000 RDI: 00000000004ba6a1 [ 432.809095] RBP: 000000000072bea0 R08: 0000000020000158 R09: 00000000fbad8001 [ 432.816355] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000013 [ 432.823620] R13: 00000000004c21cd R14: 00000000004d3c48 R15: 0000000000000003 07:11:05 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000003580)=""/4096, 0x68b}], 0x100002eb) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @local}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) bind$xdp(r0, &(0x7f00000003c0)={0x2c, 0x4, r1, 0x39}, 0x10) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000000)=""/110, &(0x7f0000000080)=0x6e) 07:11:05 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0xa) 07:11:05 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfi\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 433.134310] FAULT_INJECTION: forcing a failure. [ 433.134310] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 433.146298] CPU: 0 PID: 29060 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 433.153760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.163120] Call Trace: [ 433.165726] dump_stack+0x1c9/0x2b4 [ 433.169369] ? dump_stack_print_info.cold.2+0x52/0x52 [ 433.174578] ? __radix_tree_lookup+0x3dd/0x6e0 [ 433.179197] should_fail.cold.4+0xa/0x1a [ 433.183252] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 433.189308] ? __isolate_free_page+0x690/0x690 [ 433.193888] ? graph_lock+0x170/0x170 [ 433.197681] ? find_held_lock+0x36/0x1c0 [ 433.201730] ? find_held_lock+0x36/0x1c0 [ 433.205779] ? __lock_is_held+0xb5/0x140 [ 433.209852] ? check_same_owner+0x340/0x340 [ 433.214173] ? rcu_note_context_switch+0x730/0x730 [ 433.219100] __alloc_pages_nodemask+0x36e/0xdb0 [ 433.223770] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 433.228787] ? trace_hardirqs_on+0x10/0x10 [ 433.233029] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 433.238042] ? percpu_counter_add_batch+0xf2/0x150 [ 433.242969] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 433.247972] ? __vm_enough_memory+0x590/0x980 [ 433.252469] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 433.258004] alloc_pages_vma+0xdd/0x540 [ 433.261977] shmem_alloc_page+0xa8/0x190 [ 433.266029] ? shmem_swapin+0x230/0x230 [ 433.269995] ? print_usage_bug+0xc0/0xc0 [ 433.274064] shmem_alloc_and_acct_page+0x1f1/0x820 [ 433.278984] ? shmem_alloc_hugepage+0x4e0/0x4e0 [ 433.283637] ? print_usage_bug+0xc0/0xc0 [ 433.287696] shmem_getpage_gfp+0x6ea/0x41e0 [ 433.292015] ? print_usage_bug+0xc0/0xc0 [ 433.296068] ? shmem_writepage+0x1380/0x1380 [ 433.300474] ? print_usage_bug+0xc0/0xc0 [ 433.304524] ? __lock_acquire+0x7fc/0x5020 [ 433.308747] ? print_usage_bug+0xc0/0xc0 [ 433.312793] ? __lock_acquire+0x7fc/0x5020 [ 433.317020] ? print_usage_bug+0xc0/0xc0 [ 433.321067] ? __lock_acquire+0x7fc/0x5020 [ 433.325298] ? __lock_acquire+0x7fc/0x5020 [ 433.329608] ? check_noncircular+0x20/0x20 [ 433.333942] ? __lock_acquire+0x7fc/0x5020 [ 433.338166] ? __lock_acquire+0x7fc/0x5020 [ 433.342656] ? trace_hardirqs_on+0x10/0x10 [ 433.346876] ? print_usage_bug+0xc0/0xc0 [ 433.350922] ? __lock_acquire+0x7fc/0x5020 [ 433.355151] ? print_usage_bug+0xc0/0xc0 [ 433.359206] ? print_usage_bug+0xc0/0xc0 [ 433.363272] ? graph_lock+0x170/0x170 [ 433.367064] ? print_usage_bug+0xc0/0xc0 [ 433.371110] ? __lock_acquire+0x7fc/0x5020 [ 433.375342] ? __lock_acquire+0x7fc/0x5020 [ 433.379568] ? graph_lock+0x170/0x170 [ 433.383368] ? find_held_lock+0x36/0x1c0 [ 433.387418] ? print_usage_bug+0xc0/0xc0 [ 433.392510] ? lock_downgrade+0x8f0/0x8f0 [ 433.396653] ? kasan_check_read+0x11/0x20 [ 433.400787] ? lock_release+0xa30/0xa30 [ 433.404752] ? mark_held_locks+0xc9/0x160 [ 433.408888] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 433.414509] ? iov_iter_fault_in_readable+0x23d/0x460 [ 433.419684] ? copy_page_from_iter+0x890/0x890 [ 433.425043] ? __sanitizer_cov_trace_pc+0x4d/0x50 [ 433.429875] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 433.435071] shmem_write_begin+0x110/0x1e0 [ 433.439298] generic_perform_write+0x3ae/0x6c0 [ 433.443874] ? add_page_wait_queue+0x2c0/0x2c0 [ 433.448441] ? file_update_time+0xe4/0x640 [ 433.452664] ? current_time+0x1b0/0x1b0 [ 433.456632] ? down_write+0x8f/0x130 [ 433.460337] __generic_file_write_iter+0x26e/0x630 [ 433.465255] generic_file_write_iter+0x438/0x870 [ 433.470005] ? __generic_file_write_iter+0x630/0x630 [ 433.475099] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 433.480631] ? iov_iter_init+0xc9/0x1f0 [ 433.484593] __vfs_write+0x6c6/0x9f0 [ 433.488297] ? kernel_read+0x120/0x120 [ 433.492183] ? __lock_is_held+0xb5/0x140 [ 433.496248] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.501771] ? __sb_start_write+0x17f/0x300 [ 433.506076] vfs_write+0x1f8/0x560 [ 433.509616] ksys_pwrite64+0x181/0x1b0 [ 433.513488] ? __ia32_sys_pread64+0xf0/0xf0 [ 433.517792] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 433.523323] ? fput+0x130/0x1a0 [ 433.526591] ? do_sys_ftruncate+0x44e/0x560 [ 433.530905] __x64_sys_pwrite64+0x97/0xf0 [ 433.535052] do_syscall_64+0x1b9/0x820 [ 433.539272] ? syscall_slow_exit_work+0x500/0x500 [ 433.544101] ? syscall_return_slowpath+0x5e0/0x5e0 [ 433.549023] ? syscall_return_slowpath+0x31d/0x5e0 [ 433.553942] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 433.559292] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 433.564135] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 433.569311] RIP: 0033:0x40fd77 [ 433.572480] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 433.591710] RSP: 002b:00007f5205df1a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 433.599403] RAX: ffffffffffffffda RBX: 0000000020000150 RCX: 000000000040fd77 [ 433.606654] RDX: 0000000000000048 RSI: 0000000020000380 RDI: 0000000000000014 [ 433.613916] RBP: 0000000000000000 R08: 0000000020000158 R09: 00000000fbad8001 [ 433.621177] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000014 [ 433.628431] R13: 0000000000000001 R14: 00000000004d3c48 R15: 0000000000000004 07:11:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x4e22, 0x16e, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x6}, {0xa, 0x4e21, 0xff, @dev={0xfe, 0x80, [], 0x1b}, 0x4}, 0x2, [0x7ff, 0x1, 0x40, 0x1, 0x4, 0xa4c, 0xa99, 0x7]}, 0x5c) readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000)=0x6, 0x4) 07:11:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf*\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrf+\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:06 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrf.\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:06 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:06 executing program 3 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:06 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0xf20) 07:11:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) write$P9_RMKNOD(r0, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x10, 0x0, 0x5}}, 0x14) 07:11:06 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfx\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfi\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 434.086373] FAULT_INJECTION: forcing a failure. [ 434.086373] name failslab, interval 1, probability 0, space 0, times 0 [ 434.097616] CPU: 1 PID: 29128 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 434.104983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.114340] Call Trace: [ 434.116959] dump_stack+0x1c9/0x2b4 [ 434.120606] ? dump_stack_print_info.cold.2+0x52/0x52 [ 434.125820] should_fail.cold.4+0xa/0x1a [ 434.129901] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 434.135031] ? __lock_acquire+0x7fc/0x5020 [ 434.139285] ? graph_lock+0x170/0x170 [ 434.143099] ? print_usage_bug+0xc0/0xc0 [ 434.147179] ? print_usage_bug+0xc0/0xc0 [ 434.151270] ? trace_hardirqs_on+0x10/0x10 [ 434.155519] ? __update_load_avg_blocked_se.isra.33+0x460/0x460 [ 434.161585] ? graph_lock+0x170/0x170 [ 434.165404] ? __lock_acquire+0x7fc/0x5020 [ 434.169653] ? print_usage_bug+0xc0/0xc0 [ 434.173729] __should_failslab+0x124/0x180 [ 434.178061] should_failslab+0x9/0x14 [ 434.181877] kmem_cache_alloc+0x47/0x760 07:11:06 executing program 1: readv(0xffffffffffffffff, &(0x7f0000002540)=[{&(0x7f0000000000)=""/4096, 0x1000}], 0x1) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000001000)='/dev/snapshot\x00', 0x180, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r0, 0x4008ae48, &(0x7f0000001040)=0x4000) 07:11:06 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0xe38) 07:11:06 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) [ 434.185966] ? radix_tree_node_alloc.constprop.19+0x310/0x310 [ 434.191869] radix_tree_node_alloc.constprop.19+0x1e6/0x310 [ 434.197596] __radix_tree_create+0x4d6/0x840 [ 434.202028] ? radix_tree_maybe_preload_order+0x110/0x110 [ 434.207580] ? find_held_lock+0x36/0x1c0 [ 434.211662] ? graph_lock+0x170/0x170 [ 434.215499] ? __lock_is_held+0xb5/0x140 [ 434.219577] ? print_usage_bug+0xc0/0xc0 [ 434.223669] ? find_held_lock+0x36/0x1c0 [ 434.227746] __radix_tree_insert+0x107/0x8f0 [ 434.232172] ? graph_lock+0x170/0x170 07:11:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfp\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 434.236020] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 434.241048] ? __radix_tree_create+0x840/0x840 [ 434.245659] ? lock_acquire+0x1e4/0x540 [ 434.249641] ? shmem_add_to_page_cache+0x49c/0xe00 [ 434.254580] ? lock_release+0xa30/0xa30 [ 434.258576] ? kasan_check_write+0x14/0x20 [ 434.262818] ? do_raw_spin_lock+0xc1/0x200 [ 434.267072] shmem_add_to_page_cache+0x988/0xe00 [ 434.271833] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 434.276256] ? shmem_put_link+0x280/0x280 [ 434.280401] ? percpu_ref_put_many+0x131/0x240 [ 434.285006] ? percpu_ref_tryget+0x2d0/0x2d0 [ 434.289429] ? mem_cgroup_try_charge+0x548/0xa70 [ 434.294175] ? mem_cgroup_protected+0xa60/0xa60 [ 434.298860] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 434.304398] ? shmem_alloc_and_acct_page+0x31a/0x820 [ 434.309520] ? shmem_alloc_hugepage+0x4e0/0x4e0 [ 434.314207] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 434.319253] ? __radix_tree_preload+0x173/0x1d0 [ 434.323930] shmem_getpage_gfp+0x81b/0x41e0 [ 434.328255] ? shmem_writepage+0x1380/0x1380 [ 434.332655] ? print_usage_bug+0xc0/0xc0 [ 434.336705] ? __lock_acquire+0x7fc/0x5020 [ 434.340935] ? print_usage_bug+0xc0/0xc0 [ 434.344990] ? __lock_acquire+0x7fc/0x5020 [ 434.349214] ? print_usage_bug+0xc0/0xc0 [ 434.353286] ? __lock_acquire+0x7fc/0x5020 [ 434.357516] ? __lock_acquire+0x7fc/0x5020 [ 434.361740] ? check_noncircular+0x20/0x20 [ 434.365962] ? __lock_acquire+0x7fc/0x5020 [ 434.370190] ? __lock_acquire+0x7fc/0x5020 [ 434.374419] ? trace_hardirqs_on+0x10/0x10 [ 434.378639] ? print_usage_bug+0xc0/0xc0 [ 434.382693] ? __lock_acquire+0x7fc/0x5020 [ 434.386910] ? print_usage_bug+0xc0/0xc0 [ 434.390966] ? print_usage_bug+0xc0/0xc0 [ 434.395024] ? graph_lock+0x170/0x170 [ 434.398820] ? print_usage_bug+0xc0/0xc0 [ 434.402874] ? __lock_acquire+0x7fc/0x5020 [ 434.407112] ? __lock_acquire+0x7fc/0x5020 [ 434.411344] ? graph_lock+0x170/0x170 [ 434.415132] ? find_held_lock+0x36/0x1c0 [ 434.419179] ? print_usage_bug+0xc0/0xc0 [ 434.423241] ? lock_downgrade+0x8f0/0x8f0 [ 434.427387] ? kasan_check_read+0x11/0x20 [ 434.431521] ? lock_release+0xa30/0xa30 [ 434.435502] ? mark_held_locks+0xc9/0x160 [ 434.439646] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 434.445169] ? iov_iter_fault_in_readable+0x23d/0x460 [ 434.450342] ? copy_page_from_iter+0x890/0x890 [ 434.454912] ? __sanitizer_cov_trace_pc+0x4d/0x50 [ 434.459750] ? ktime_get_coarse_real_ts64+0x243/0x3a0 [ 434.464934] shmem_write_begin+0x110/0x1e0 [ 434.469168] generic_perform_write+0x3ae/0x6c0 [ 434.473750] ? add_page_wait_queue+0x2c0/0x2c0 [ 434.478325] ? file_update_time+0xe4/0x640 [ 434.482554] ? current_time+0x1b0/0x1b0 [ 434.486518] ? down_write+0x8f/0x130 [ 434.490237] __generic_file_write_iter+0x26e/0x630 [ 434.495171] generic_file_write_iter+0x438/0x870 [ 434.499934] ? __generic_file_write_iter+0x630/0x630 [ 434.505036] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 434.510562] ? iov_iter_init+0xc9/0x1f0 [ 434.514520] __vfs_write+0x6c6/0x9f0 [ 434.518238] ? kernel_read+0x120/0x120 [ 434.522114] ? __lock_is_held+0xb5/0x140 [ 434.526164] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.531685] ? __sb_start_write+0x17f/0x300 [ 434.536007] vfs_write+0x1f8/0x560 [ 434.539542] ksys_pwrite64+0x181/0x1b0 [ 434.543415] ? __ia32_sys_pread64+0xf0/0xf0 [ 434.547722] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 434.553244] ? fput+0x130/0x1a0 [ 434.556532] ? do_sys_ftruncate+0x44e/0x560 [ 434.560842] __x64_sys_pwrite64+0x97/0xf0 [ 434.564980] do_syscall_64+0x1b9/0x820 [ 434.568877] ? finish_task_switch+0x1d3/0x870 [ 434.573367] ? syscall_return_slowpath+0x5e0/0x5e0 [ 434.578280] ? syscall_return_slowpath+0x31d/0x5e0 [ 434.583230] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 434.588603] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 434.593449] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 434.598620] RIP: 0033:0x40fd77 [ 434.601788] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 27 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 6d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 434.620982] RSP: 002b:00007f5205df1a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 434.628694] RAX: ffffffffffffffda RBX: 0000000020000150 RCX: 000000000040fd77 [ 434.635948] RDX: 0000000000000048 RSI: 0000000020000380 RDI: 0000000000000014 [ 434.643206] RBP: 0000000000000000 R08: 0000000020000158 R09: 00000000fbad8001 [ 434.650460] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000014 [ 434.657721] R13: 0000000000000001 R14: 00000000004d3c48 R15: 0000000000000005 07:11:07 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrf#\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:07 executing program 3 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:07 executing program 1: gettid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)) getpgid(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000200)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000180)='net/tcp\x00') readv(r1, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) 07:11:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfc\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:07 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0xe99) 07:11:07 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfi\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:07 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfd\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 435.070389] FAULT_INJECTION: forcing a failure. [ 435.070389] name failslab, interval 1, probability 0, space 0, times 0 [ 435.081786] CPU: 1 PID: 29195 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 435.089163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 435.098525] Call Trace: [ 435.101131] dump_stack+0x1c9/0x2b4 [ 435.104783] ? dump_stack_print_info.cold.2+0x52/0x52 [ 435.110002] should_fail.cold.4+0xa/0x1a [ 435.114081] ? fault_create_debugfs_attr+0x1f0/0x1f0 07:11:07 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x70, &(0x7f0000000080)=[@in6={0xa, 0x4e24, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x4000000000000000}, @in6={0xa, 0x4e22, 0xe3d7, @local={0xfe, 0x80, [], 0xaa}, 0x400}, @in6={0xa, 0x4e22, 0x20, @dev={0xfe, 0x80, [], 0x18}, 0x8001}, @in6={0xa, 0x4e24, 0x1ff, @remote={0xfe, 0x80, [], 0xbb}, 0x7}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000180)={r1, 0x70, &(0x7f0000000200)=[@in6={0xa, 0x4e22, 0x3, @local={0xfe, 0x80, [], 0xaa}, 0xfffffffffffffffc}, @in6={0xa, 0x4e20, 0x4, @mcast1={0xff, 0x1, [], 0x1}, 0x5}, @in6={0xa, 0x4e21, 0x4, @remote={0xfe, 0x80, [], 0xbb}, 0xffffffffffff9125}, @in6={0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0x17}, 0x6}]}, &(0x7f0000000280)=0x10) readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f00000002c0)={0x4, 0x60a35ef2, 0x7ff}, 0xc) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x0, 0x2710}, {0x0, 0x7530}}) [ 435.119291] ? rcu_is_watching+0x8c/0x150 [ 435.123448] ? rcu_pm_notify+0xc0/0xc0 [ 435.127358] ? find_held_lock+0x36/0x1c0 [ 435.131445] ? check_same_owner+0x340/0x340 [ 435.135777] ? rcu_note_context_switch+0x730/0x730 [ 435.140755] __should_failslab+0x124/0x180 [ 435.145002] should_failslab+0x9/0x14 [ 435.148814] kmem_cache_alloc+0x2af/0x760 [ 435.152974] ? get_mem_cgroup_from_mm+0x1f1/0x410 [ 435.157836] getname_flags+0xd0/0x5a0 [ 435.161641] ? percpu_ref_tryget+0x2d0/0x2d0 [ 435.166063] getname+0x19/0x20 [ 435.169271] do_sys_open+0x3a2/0x760 [ 435.172998] ? filp_open+0x80/0x80 [ 435.176544] ? syscall_slow_exit_work+0x500/0x500 [ 435.181397] __x64_sys_open+0x7e/0xc0 [ 435.185210] do_syscall_64+0x1b9/0x820 [ 435.189105] ? finish_task_switch+0x1d3/0x870 [ 435.193616] ? syscall_return_slowpath+0x5e0/0x5e0 [ 435.198559] ? syscall_return_slowpath+0x31d/0x5e0 [ 435.203505] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 435.208884] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 435.213744] entry_SYSCALL_64_after_hwframe+0x49/0xbe 07:11:07 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrf%\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:07 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) [ 435.218939] RIP: 0033:0x40fd11 [ 435.222126] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 435.241516] RSP: 002b:00007f5205df1a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 435.249232] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 000000000040fd11 [ 435.257031] RDX: 00007f5205df1afa RSI: 0000000000000002 RDI: 00007f5205df1af0 07:11:07 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)="6e65742f726f757465008674b2458988562f9e8f5ca5bcc9306e9b70a3e1aeb775e62de3ac45b579f18b50a071f382c48056dbe6f6d5a9425323a560d115a3abf80e77e5564f7551dfb4acebec2f24") readv(r0, &(0x7f0000002540), 0x1000000000000064) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000000)) [ 435.264307] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 435.271581] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000014 [ 435.278858] R13: 0000000000000001 R14: 00000000004d3c48 R15: 0000000000000006 07:11:07 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0xd83) 07:11:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfl\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:07 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfl\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:07 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:07 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfi\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:07 executing program 3 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:07 executing program 1: inotify_init() r0 = socket$unix(0x1, 0x2, 0x0) ioctl$FICLONE(r0, 0x40049409, r0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r1, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) 07:11:07 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfx\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:07 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0xbbd) [ 435.796352] FAULT_INJECTION: forcing a failure. [ 435.796352] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 435.808224] CPU: 1 PID: 29296 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 435.815594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 435.824959] Call Trace: [ 435.827574] dump_stack+0x1c9/0x2b4 [ 435.831222] ? dump_stack_print_info.cold.2+0x52/0x52 [ 435.836536] should_fail.cold.4+0xa/0x1a [ 435.840614] ? fault_create_debugfs_attr+0x1f0/0x1f0 07:11:08 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x8) 07:11:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) socket$can_raw(0x1d, 0x3, 0x1) 07:11:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfx\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 435.845824] ? trace_hardirqs_on+0x10/0x10 [ 435.850065] ? check_same_owner+0x340/0x340 [ 435.854407] ? find_held_lock+0x36/0x1c0 [ 435.858489] ? lock_downgrade+0x8f0/0x8f0 [ 435.862657] ? add_page_wait_queue+0x2c0/0x2c0 [ 435.867259] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 435.872819] ? should_fail+0x223/0xbed [ 435.876735] __alloc_pages_nodemask+0x36e/0xdb0 [ 435.881426] ? up_write+0x7b/0x220 [ 435.884992] ? __alloc_pages_slowpath+0x2d90/0x2d90 [ 435.890027] ? __generic_file_write_iter+0x1bd/0x630 [ 435.895147] ? find_held_lock+0x36/0x1c0 [ 435.899213] ? check_same_owner+0x340/0x340 [ 435.903525] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 435.909054] cache_grow_begin+0x91/0x710 [ 435.913112] kmem_cache_alloc+0x689/0x760 [ 435.917255] getname_flags+0xd0/0x5a0 [ 435.921042] ? __sb_end_write+0xac/0xe0 [ 435.925010] getname+0x19/0x20 [ 435.928202] do_sys_open+0x3a2/0x760 [ 435.931913] ? filp_open+0x80/0x80 [ 435.935443] ? do_sys_ftruncate+0x44e/0x560 [ 435.939771] __x64_sys_open+0x7e/0xc0 [ 435.943561] do_syscall_64+0x1b9/0x820 [ 435.947433] ? finish_task_switch+0x1d3/0x870 [ 435.951929] ? syscall_return_slowpath+0x5e0/0x5e0 [ 435.956844] ? syscall_return_slowpath+0x31d/0x5e0 [ 435.961764] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 435.967130] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 435.971966] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 435.977139] RIP: 0033:0x40fd11 07:11:08 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) [ 435.980319] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 435.999563] RSP: 002b:00007f5205df1a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 436.007261] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 000000000040fd11 [ 436.014514] RDX: 00007f5205df1afa RSI: 0000000000000002 RDI: 00007f5205df1af0 [ 436.021770] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 436.029026] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000014 [ 436.036282] R13: 0000000000000001 R14: 00000000004d3c48 R15: 0000000000000007 07:11:08 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfx\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:08 executing program 3 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:08 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfp\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) r1 = gettid() fcntl$setown(r0, 0x8, r1) 07:11:08 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfo\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:08 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0xcb2) 07:11:08 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x8800000) 07:11:08 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrf-\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 436.479318] FAULT_INJECTION: forcing a failure. [ 436.479318] name failslab, interval 1, probability 0, space 0, times 0 [ 436.490799] CPU: 0 PID: 29362 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 436.498170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 436.507538] Call Trace: [ 436.510316] dump_stack+0x1c9/0x2b4 [ 436.513960] ? dump_stack_print_info.cold.2+0x52/0x52 [ 436.519169] should_fail.cold.4+0xa/0x1a [ 436.523280] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 436.528404] ? trace_hardirqs_on+0x10/0x10 [ 436.532655] ? __lock_acquire+0x7fc/0x5020 [ 436.536993] ? do_writepages+0x1a0/0x1a0 [ 436.541076] ? set_page_dirty+0x36f/0x6f0 [ 436.545247] ? find_held_lock+0x36/0x1c0 [ 436.549418] ? check_same_owner+0x340/0x340 [ 436.553754] ? rcu_note_context_switch+0x730/0x730 [ 436.558782] ? graph_lock+0x170/0x170 [ 436.562597] __should_failslab+0x124/0x180 [ 436.566850] should_failslab+0x9/0x14 [ 436.570662] kmem_cache_alloc+0x2af/0x760 [ 436.574846] ? trace_hardirqs_on+0x10/0x10 07:11:08 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000040)={0x3, 0xa, 0x6, 0x7, 0x0}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f00000000c0)={r1, @in6={{0xa, 0x4e21, 0x7f, @loopback={0x0, 0x1}, 0x7}}}, 0x84) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r2, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) socket$unix(0x1, 0x2, 0x0) 07:11:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsl', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 436.579093] ? find_held_lock+0x36/0x1c0 [ 436.583166] get_empty_filp+0x12d/0x530 [ 436.587150] ? proc_nr_files+0x60/0x60 [ 436.591055] ? lock_downgrade+0x8f0/0x8f0 [ 436.595208] ? graph_lock+0x170/0x170 [ 436.598999] ? kasan_check_read+0x11/0x20 [ 436.603143] ? rcu_is_watching+0x8c/0x150 [ 436.607289] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 436.611712] path_openat+0x11e/0x4e10 [ 436.615523] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 436.620536] ? path_lookupat.isra.45+0xbf0/0xbf0 [ 436.625292] ? find_held_lock+0x36/0x1c0 [ 436.629345] ? lock_downgrade+0x8f0/0x8f0 [ 436.633488] ? do_sys_open+0x3a2/0x760 [ 436.637393] ? kasan_check_read+0x11/0x20 [ 436.641538] ? do_raw_spin_unlock+0xa7/0x2f0 [ 436.645943] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 436.650522] ? __lock_is_held+0xb5/0x140 [ 436.654579] ? _raw_spin_unlock+0x22/0x30 [ 436.658714] ? __alloc_fd+0x34e/0x710 [ 436.662511] ? usercopy_warn+0x120/0x120 [ 436.666566] do_filp_open+0x255/0x380 [ 436.670355] ? may_open_dev+0x100/0x100 [ 436.674321] ? strncpy_from_user+0x3be/0x510 [ 436.678732] ? mpi_free.cold.1+0x19/0x19 [ 436.682790] ? get_unused_fd_flags+0x122/0x1a0 [ 436.687378] ? getname_flags+0x26e/0x5a0 [ 436.691427] ? __sb_end_write+0xac/0xe0 [ 436.695398] do_sys_open+0x584/0x760 [ 436.699095] ? filp_open+0x80/0x80 [ 436.702620] ? do_sys_ftruncate+0x44e/0x560 [ 436.706936] __x64_sys_open+0x7e/0xc0 [ 436.710736] do_syscall_64+0x1b9/0x820 [ 436.714605] ? finish_task_switch+0x1d3/0x870 [ 436.719084] ? syscall_return_slowpath+0x5e0/0x5e0 [ 436.724002] ? syscall_return_slowpath+0x31d/0x5e0 [ 436.728940] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 436.734304] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 436.739135] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 436.744315] RIP: 0033:0x40fd11 [ 436.747501] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 8a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 d3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 436.766756] RSP: 002b:00007f5205df1a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 07:11:09 executing program 3 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 436.774447] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 000000000040fd11 [ 436.781700] RDX: 00007f5205df1afa RSI: 0000000000000002 RDI: 00007f5205df1af0 [ 436.788956] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 436.796210] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000014 [ 436.803468] R13: 0000000000000001 R14: 00000000004d3c48 R15: 0000000000000008 07:11:09 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrf*\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfu\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:09 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0xde0) [ 437.095338] FAULT_INJECTION: forcing a failure. [ 437.095338] name failslab, interval 1, probability 0, space 0, times 0 [ 437.106794] CPU: 0 PID: 29407 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 437.114164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.123529] Call Trace: [ 437.126147] dump_stack+0x1c9/0x2b4 [ 437.129804] ? dump_stack_print_info.cold.2+0x52/0x52 [ 437.135018] should_fail.cold.4+0xa/0x1a [ 437.139099] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 437.144220] ? lock_release+0xa30/0xa30 [ 437.148206] ? check_same_owner+0x340/0x340 [ 437.152544] ? graph_lock+0x170/0x170 [ 437.156353] ? rcu_note_context_switch+0x730/0x730 [ 437.161555] ? find_held_lock+0x36/0x1c0 [ 437.165630] ? __lock_is_held+0xb5/0x140 [ 437.169711] ? check_same_owner+0x340/0x340 [ 437.174052] ? rcu_note_context_switch+0x730/0x730 [ 437.178994] __should_failslab+0x124/0x180 [ 437.183240] should_failslab+0x9/0x14 [ 437.187052] kmem_cache_alloc_trace+0x2cb/0x780 [ 437.191727] ? init_wait_entry+0x1c0/0x1c0 [ 437.195980] ? loop_get_status64+0x140/0x140 [ 437.200396] __kthread_create_on_node+0x127/0x4c0 [ 437.205261] ? __kthread_parkme+0x1b0/0x1b0 [ 437.209613] ? __lockdep_init_map+0x105/0x590 [ 437.214137] ? loop_get_status64+0x140/0x140 [ 437.218557] kthread_create_on_node+0xb1/0xe0 [ 437.223062] ? __kthread_create_on_node+0x4c0/0x4c0 [ 437.228103] ? kasan_check_read+0x11/0x20 [ 437.232277] lo_ioctl+0x7ce/0x1d10 [ 437.235830] ? lo_rw_aio_complete+0x450/0x450 [ 437.240337] blkdev_ioctl+0x9cd/0x2030 07:11:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') accept$alg(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) close(r1) timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000700)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c}) readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) [ 437.244238] ? blkpg_ioctl+0xc40/0xc40 [ 437.248139] ? lock_downgrade+0x8f0/0x8f0 [ 437.252301] ? kasan_check_read+0x11/0x20 [ 437.256455] ? rcu_is_watching+0x8c/0x150 [ 437.260618] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 437.265042] ? __fget+0x414/0x670 [ 437.268511] ? expand_files.part.8+0x9c0/0x9c0 [ 437.273110] block_ioctl+0xee/0x130 [ 437.276748] ? blkdev_fallocate+0x400/0x400 [ 437.281072] do_vfs_ioctl+0x1de/0x1720 [ 437.284967] ? rcu_is_watching+0x8c/0x150 [ 437.289124] ? ioctl_preallocate+0x300/0x300 [ 437.293539] ? __fget_light+0x2f7/0x440 [ 437.297520] ? fget_raw+0x20/0x20 [ 437.300982] ? putname+0xf2/0x130 [ 437.304444] ? rcu_read_lock_sched_held+0x108/0x120 [ 437.309479] ? kmem_cache_free+0x25c/0x2d0 [ 437.313721] ? putname+0xf7/0x130 [ 437.317177] ? do_sys_open+0x3cb/0x760 [ 437.321074] ? security_file_ioctl+0x94/0xc0 [ 437.325490] ksys_ioctl+0xa9/0xd0 [ 437.328949] __x64_sys_ioctl+0x73/0xb0 [ 437.332844] do_syscall_64+0x1b9/0x820 [ 437.336737] ? finish_task_switch+0x1d3/0x870 [ 437.341239] ? syscall_return_slowpath+0x5e0/0x5e0 [ 437.346183] ? syscall_return_slowpath+0x31d/0x5e0 [ 437.351129] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 437.356507] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 437.361541] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 437.366735] RIP: 0033:0x455927 [ 437.369920] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 437.389295] RSP: 002b:00007f5205df1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 07:11:09 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfX\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 437.397022] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 0000000000455927 [ 437.404301] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 437.411583] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 437.418863] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 437.426960] R13: 0000000000000001 R14: 00000000004d3c48 R15: 0000000000000009 07:11:09 executing program 3 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:09 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfo\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:09 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf-\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 437.762685] FAULT_INJECTION: forcing a failure. [ 437.762685] name failslab, interval 1, probability 0, space 0, times 0 [ 437.774085] CPU: 0 PID: 29457 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 437.781458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.790815] Call Trace: [ 437.793424] dump_stack+0x1c9/0x2b4 [ 437.797072] ? dump_stack_print_info.cold.2+0x52/0x52 [ 437.802275] ? perf_trace_lock_acquire+0xeb/0x9a0 [ 437.807148] ? graph_lock+0x170/0x170 [ 437.810993] should_fail.cold.4+0xa/0x1a [ 437.815071] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 437.820193] ? graph_lock+0x170/0x170 [ 437.824019] ? find_held_lock+0x36/0x1c0 [ 437.828097] ? __lock_is_held+0xb5/0x140 [ 437.832182] ? check_same_owner+0x340/0x340 [ 437.836508] ? perf_trace_lock+0x920/0x920 [ 437.840744] ? rcu_note_context_switch+0x730/0x730 [ 437.845676] __should_failslab+0x124/0x180 [ 437.849905] should_failslab+0x9/0x14 [ 437.853704] kmem_cache_alloc+0x2af/0x760 [ 437.857866] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 437.862898] __kernfs_new_node+0xef/0x5a0 [ 437.867054] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 437.871817] ? lock_downgrade+0x8f0/0x8f0 [ 437.875970] ? lock_release+0xa30/0xa30 [ 437.879959] ? lock_downgrade+0x8f0/0x8f0 [ 437.884115] kernfs_new_node+0x80/0xf0 [ 437.888019] kernfs_create_dir_ns+0x3d/0x140 [ 437.892440] internal_create_group+0x110/0x970 [ 437.897032] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 437.902062] sysfs_create_group+0x1f/0x30 [ 437.906218] lo_ioctl+0x12c8/0x1d10 [ 437.909840] ? lo_rw_aio_complete+0x450/0x450 [ 437.914326] blkdev_ioctl+0x9cd/0x2030 [ 437.918203] ? blkpg_ioctl+0xc40/0xc40 [ 437.922083] ? lock_downgrade+0x8f0/0x8f0 [ 437.926239] ? kasan_check_read+0x11/0x20 [ 437.930387] ? rcu_is_watching+0x8c/0x150 [ 437.934535] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 437.938962] ? __fget+0x414/0x670 [ 437.942416] ? expand_files.part.8+0x9c0/0x9c0 [ 437.946995] block_ioctl+0xee/0x130 [ 437.950615] ? blkdev_fallocate+0x400/0x400 [ 437.954925] do_vfs_ioctl+0x1de/0x1720 [ 437.958816] ? rcu_is_watching+0x8c/0x150 [ 437.962955] ? ioctl_preallocate+0x300/0x300 [ 437.967354] ? __fget_light+0x2f7/0x440 [ 437.971316] ? fget_raw+0x20/0x20 [ 437.974755] ? putname+0xf2/0x130 [ 437.978198] ? rcu_read_lock_sched_held+0x108/0x120 [ 437.983203] ? kmem_cache_free+0x25c/0x2d0 [ 437.987437] ? putname+0xf7/0x130 [ 437.990880] ? do_sys_open+0x3cb/0x760 [ 437.994761] ? security_file_ioctl+0x94/0xc0 [ 437.999158] ksys_ioctl+0xa9/0xd0 [ 438.002602] __x64_sys_ioctl+0x73/0xb0 [ 438.006481] do_syscall_64+0x1b9/0x820 [ 438.010359] ? finish_task_switch+0x1d3/0x870 [ 438.014854] ? syscall_return_slowpath+0x5e0/0x5e0 [ 438.019773] ? syscall_return_slowpath+0x31d/0x5e0 [ 438.024706] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 438.030065] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 438.034907] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 438.040082] RIP: 0033:0x455927 [ 438.043256] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:11:10 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0xbe2) [ 438.062600] RSP: 002b:00007f5205df1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 438.070304] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 0000000000455927 [ 438.077563] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 438.084819] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 438.092086] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 438.099357] R13: 0000000000000001 R14: 00000000004d3c48 R15: 000000000000000a 07:11:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) 07:11:10 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0xf) 07:11:10 executing program 3 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:10 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfp\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:10 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfc\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:10 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrf.\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:10 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0xd42) 07:11:10 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)=0x0) r1 = getpid() r2 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xe, 0x80800) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x42080, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f0000000140)={r3, r4, 0x4893}) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r5, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) [ 438.582129] FAULT_INJECTION: forcing a failure. [ 438.582129] name failslab, interval 1, probability 0, space 0, times 0 [ 438.593468] CPU: 0 PID: 29524 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 438.600843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.610198] Call Trace: [ 438.612800] dump_stack+0x1c9/0x2b4 [ 438.616448] ? dump_stack_print_info.cold.2+0x52/0x52 [ 438.621665] should_fail.cold.4+0xa/0x1a [ 438.625749] ? fault_create_debugfs_attr+0x1f0/0x1f0 07:11:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673fd", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 438.630869] ? mutex_trylock+0x2b0/0x2b0 [ 438.634942] ? graph_lock+0x170/0x170 [ 438.638751] ? ___ratelimit.cold.2+0x6b/0x6b [ 438.643170] ? save_stack+0x43/0xd0 [ 438.646816] ? find_held_lock+0x36/0x1c0 [ 438.650895] ? __lock_is_held+0xb5/0x140 [ 438.654976] ? check_same_owner+0x340/0x340 [ 438.659317] ? rcu_note_context_switch+0x730/0x730 [ 438.664265] __should_failslab+0x124/0x180 [ 438.668516] should_failslab+0x9/0x14 [ 438.672324] kmem_cache_alloc+0x2af/0x760 [ 438.676486] ? wait_for_completion+0x8d0/0x8d0 [ 438.681077] ? graph_lock+0x170/0x170 [ 438.684869] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 438.689897] __kernfs_new_node+0xef/0x5a0 [ 438.694045] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 438.698806] ? mutex_unlock+0xd/0x10 [ 438.702507] ? kernfs_activate+0x21a/0x2c0 [ 438.706741] kernfs_new_node+0x80/0xf0 [ 438.710624] __kernfs_create_file+0x4d/0x330 [ 438.715026] sysfs_add_file_mode_ns+0x21a/0x560 [ 438.719690] internal_create_group+0x282/0x970 [ 438.724256] sysfs_create_group+0x1f/0x30 [ 438.728387] lo_ioctl+0x12c8/0x1d10 [ 438.731999] ? lo_rw_aio_complete+0x450/0x450 [ 438.736499] blkdev_ioctl+0x9cd/0x2030 [ 438.740381] ? blkpg_ioctl+0xc40/0xc40 [ 438.744255] ? lock_downgrade+0x8f0/0x8f0 [ 438.748392] ? kasan_check_read+0x11/0x20 [ 438.752524] ? rcu_is_watching+0x8c/0x150 [ 438.756654] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 438.761054] ? __fget+0x414/0x670 [ 438.764491] ? expand_files.part.8+0x9c0/0x9c0 [ 438.769061] ? retint_kernel+0x10/0x10 [ 438.772940] block_ioctl+0xee/0x130 [ 438.776559] ? blkdev_fallocate+0x400/0x400 [ 438.780865] do_vfs_ioctl+0x1de/0x1720 [ 438.784739] ? ioctl_preallocate+0x300/0x300 [ 438.789143] ? __fget_light+0x2f7/0x440 [ 438.793101] ? __schedule+0x1ed0/0x1ed0 [ 438.797068] ? fget_raw+0x20/0x20 [ 438.800524] ? putname+0xf2/0x130 [ 438.803972] ? rcu_read_lock_sched_held+0x108/0x120 [ 438.808972] ? kmem_cache_free+0x25c/0x2d0 [ 438.813192] ? exit_to_usermode_loop+0x8c/0x370 [ 438.817857] ? security_file_ioctl+0x94/0xc0 [ 438.822259] ksys_ioctl+0xa9/0xd0 [ 438.825697] __x64_sys_ioctl+0x73/0xb0 [ 438.829582] do_syscall_64+0x1b9/0x820 [ 438.833462] ? finish_task_switch+0x1d3/0x870 [ 438.837959] ? syscall_return_slowpath+0x5e0/0x5e0 [ 438.842892] ? syscall_return_slowpath+0x31d/0x5e0 [ 438.847839] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 438.853197] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 438.858049] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 438.863229] RIP: 0033:0x455927 [ 438.866402] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 438.885605] RSP: 002b:00007f5205df1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 438.893307] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 0000000000455927 [ 438.900573] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 438.907823] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 438.915077] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 438.922336] R13: 0000000000000001 R14: 00000000004d3c48 R15: 000000000000000b 07:11:11 executing program 3 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:11 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="62747266738c", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:11 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673f6", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) ioctl$IOC_PR_PREEMPT_ABORT(r0, 0x401870cc, &(0x7f0000000000)={0xffffffffffffffc1, 0x4, 0x6, 0x8}) readv(r0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/241, 0xf1}, {&(0x7f0000000140)=""/63, 0x3f}, {&(0x7f0000000180)}], 0x3) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000240)) 07:11:11 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1400) 07:11:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="62747266731c", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:11 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x200002c9) 07:11:11 executing program 1: syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') r0 = socket$pptp(0x18, 0x1, 0x2) readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) [ 439.344264] FAULT_INJECTION: forcing a failure. [ 439.344264] name failslab, interval 1, probability 0, space 0, times 0 [ 439.355662] CPU: 0 PID: 29600 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 439.363032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.372396] Call Trace: [ 439.375006] dump_stack+0x1c9/0x2b4 [ 439.378654] ? dump_stack_print_info.cold.2+0x52/0x52 [ 439.383858] ? __mutex_lock+0x7e8/0x1820 [ 439.387946] should_fail.cold.4+0xa/0x1a 07:11:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="62747266737f", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 439.392034] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 439.397159] ? graph_lock+0x170/0x170 [ 439.400977] ? find_held_lock+0x36/0x1c0 [ 439.405055] ? __lock_is_held+0xb5/0x140 [ 439.409135] ? check_same_owner+0x340/0x340 [ 439.413463] ? kasan_check_write+0x14/0x20 [ 439.417698] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 439.422615] ? rcu_note_context_switch+0x730/0x730 [ 439.427925] __should_failslab+0x124/0x180 [ 439.432151] should_failslab+0x9/0x14 [ 439.435940] kmem_cache_alloc+0x2af/0x760 [ 439.440075] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 439.445103] __kernfs_new_node+0xef/0x5a0 [ 439.449247] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 439.453998] ? mutex_unlock+0xd/0x10 [ 439.457705] ? kernfs_activate+0x21a/0x2c0 [ 439.461940] ? kernfs_walk_and_get_ns+0x340/0x340 [ 439.466784] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 439.472308] ? kernfs_link_sibling+0x1d2/0x3b0 [ 439.476884] kernfs_new_node+0x80/0xf0 [ 439.480772] __kernfs_create_file+0x4d/0x330 [ 439.485190] sysfs_add_file_mode_ns+0x21a/0x560 [ 439.489861] internal_create_group+0x282/0x970 [ 439.494437] sysfs_create_group+0x1f/0x30 [ 439.498579] lo_ioctl+0x12c8/0x1d10 [ 439.502209] ? lo_rw_aio_complete+0x450/0x450 [ 439.506706] blkdev_ioctl+0x9cd/0x2030 [ 439.510593] ? blkpg_ioctl+0xc40/0xc40 [ 439.514477] ? lock_downgrade+0x8f0/0x8f0 [ 439.518624] ? kasan_check_read+0x11/0x20 [ 439.522768] ? rcu_is_watching+0x8c/0x150 [ 439.526913] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 439.531310] ? __fget+0x414/0x670 [ 439.534750] ? expand_files.part.8+0x9c0/0x9c0 [ 439.539330] block_ioctl+0xee/0x130 [ 439.542955] ? blkdev_fallocate+0x400/0x400 [ 439.547274] do_vfs_ioctl+0x1de/0x1720 [ 439.551154] ? rcu_is_watching+0x8c/0x150 [ 439.555288] ? ioctl_preallocate+0x300/0x300 [ 439.559690] ? __fget_light+0x2f7/0x440 [ 439.563662] ? fget_raw+0x20/0x20 [ 439.567122] ? putname+0xf2/0x130 [ 439.570572] ? rcu_read_lock_sched_held+0x108/0x120 [ 439.575581] ? kmem_cache_free+0x25c/0x2d0 [ 439.579819] ? putname+0xf7/0x130 [ 439.583273] ? do_sys_open+0x3cb/0x760 [ 439.587161] ? security_file_ioctl+0x94/0xc0 [ 439.591571] ksys_ioctl+0xa9/0xd0 [ 439.595045] __x64_sys_ioctl+0x73/0xb0 [ 439.598929] do_syscall_64+0x1b9/0x820 [ 439.602809] ? finish_task_switch+0x1d3/0x870 [ 439.607289] ? syscall_return_slowpath+0x5e0/0x5e0 [ 439.612216] ? syscall_return_slowpath+0x31d/0x5e0 [ 439.617162] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 439.622516] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 439.627367] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.632541] RIP: 0033:0x455927 [ 439.635720] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 439.654911] RSP: 002b:00007f5205df1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 439.662609] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 0000000000455927 [ 439.669871] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 439.677236] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 439.684500] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 07:11:11 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 439.691757] R13: 0000000000000001 R14: 00000000004d3c48 R15: 000000000000000c 07:11:12 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:12 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="627472667310", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:12 executing program 3 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:12 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0xf43) 07:11:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x3, 0x4) 07:11:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:12 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 440.097404] FAULT_INJECTION: forcing a failure. [ 440.097404] name failslab, interval 1, probability 0, space 0, times 0 [ 440.109598] CPU: 0 PID: 29657 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 440.116966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.126324] Call Trace: [ 440.128930] dump_stack+0x1c9/0x2b4 [ 440.132574] ? dump_stack_print_info.cold.2+0x52/0x52 [ 440.137775] ? __mutex_lock+0x7e8/0x1820 [ 440.141845] should_fail.cold.4+0xa/0x1a [ 440.145918] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 440.151041] ? graph_lock+0x170/0x170 [ 440.154848] ? find_held_lock+0x36/0x1c0 [ 440.158898] ? __lock_is_held+0xb5/0x140 [ 440.162952] ? check_same_owner+0x340/0x340 [ 440.167259] ? kasan_check_write+0x14/0x20 [ 440.171479] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 440.176397] ? rcu_note_context_switch+0x730/0x730 [ 440.181316] __should_failslab+0x124/0x180 [ 440.185540] should_failslab+0x9/0x14 [ 440.189327] kmem_cache_alloc+0x2af/0x760 [ 440.193477] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 440.198482] __kernfs_new_node+0xef/0x5a0 [ 440.202617] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 440.207358] ? mutex_unlock+0xd/0x10 [ 440.211057] ? kernfs_activate+0x21a/0x2c0 [ 440.215282] ? kernfs_walk_and_get_ns+0x340/0x340 [ 440.220110] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 440.225631] ? kernfs_link_sibling+0x1d2/0x3b0 [ 440.230208] kernfs_new_node+0x80/0xf0 [ 440.234346] __kernfs_create_file+0x4d/0x330 [ 440.238739] sysfs_add_file_mode_ns+0x21a/0x560 [ 440.243399] internal_create_group+0x282/0x970 [ 440.247969] sysfs_create_group+0x1f/0x30 [ 440.252102] lo_ioctl+0x12c8/0x1d10 [ 440.255722] ? lo_rw_aio_complete+0x450/0x450 [ 440.260211] blkdev_ioctl+0x9cd/0x2030 [ 440.264085] ? blkpg_ioctl+0xc40/0xc40 [ 440.267963] ? lock_downgrade+0x8f0/0x8f0 [ 440.272098] ? kasan_check_read+0x11/0x20 [ 440.276232] ? rcu_is_watching+0x8c/0x150 [ 440.280366] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 440.284762] ? __fget+0x414/0x670 [ 440.288205] ? expand_files.part.8+0x9c0/0x9c0 [ 440.292777] block_ioctl+0xee/0x130 [ 440.296388] ? blkdev_fallocate+0x400/0x400 [ 440.300693] do_vfs_ioctl+0x1de/0x1720 [ 440.304561] ? rcu_is_watching+0x8c/0x150 [ 440.308696] ? ioctl_preallocate+0x300/0x300 [ 440.313102] ? __fget_light+0x2f7/0x440 [ 440.317063] ? fget_raw+0x20/0x20 [ 440.320503] ? putname+0xf2/0x130 [ 440.323940] ? rcu_read_lock_sched_held+0x108/0x120 [ 440.328952] ? kmem_cache_free+0x25c/0x2d0 [ 440.333187] ? putname+0xf7/0x130 [ 440.336624] ? do_sys_open+0x3cb/0x760 [ 440.340498] ? security_file_ioctl+0x94/0xc0 [ 440.344893] ksys_ioctl+0xa9/0xd0 [ 440.348334] __x64_sys_ioctl+0x73/0xb0 [ 440.352207] do_syscall_64+0x1b9/0x820 [ 440.356079] ? finish_task_switch+0x1d3/0x870 [ 440.360560] ? syscall_return_slowpath+0x5e0/0x5e0 [ 440.365474] ? syscall_return_slowpath+0x31d/0x5e0 [ 440.370392] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 440.375742] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 440.380576] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 440.385750] RIP: 0033:0x455927 [ 440.388919] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 440.408157] RSP: 002b:00007f5205df1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 440.415870] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 0000000000455927 [ 440.423134] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 440.430388] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 440.437652] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 440.444923] R13: 0000000000000001 R14: 00000000004d3c48 R15: 000000000000000d 07:11:12 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:12 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0xfbf) 07:11:12 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:12 executing program 3 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) 07:11:13 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0xfffffffffffffdef) 07:11:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:13 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:13 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0xccc) 07:11:13 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x8}) readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000000)={0x8}) [ 440.967344] FAULT_INJECTION: forcing a failure. [ 440.967344] name failslab, interval 1, probability 0, space 0, times 0 [ 440.978689] CPU: 0 PID: 29722 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 440.986055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.995424] Call Trace: [ 440.998001] dump_stack+0x1c9/0x2b4 [ 441.001624] ? dump_stack_print_info.cold.2+0x52/0x52 [ 441.006808] ? __mutex_lock+0x7e8/0x1820 [ 441.010872] should_fail.cold.4+0xa/0x1a [ 441.014923] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 441.020021] ? graph_lock+0x170/0x170 [ 441.023819] ? find_held_lock+0x36/0x1c0 [ 441.027875] ? __lock_is_held+0xb5/0x140 [ 441.031949] ? check_same_owner+0x340/0x340 [ 441.036279] ? kasan_check_write+0x14/0x20 [ 441.040521] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 441.045444] ? rcu_note_context_switch+0x730/0x730 [ 441.050383] __should_failslab+0x124/0x180 [ 441.054627] should_failslab+0x9/0x14 [ 441.058414] kmem_cache_alloc+0x2af/0x760 [ 441.062553] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 441.067555] __kernfs_new_node+0xef/0x5a0 [ 441.071702] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 441.076453] ? mutex_unlock+0xd/0x10 [ 441.080149] ? kernfs_activate+0x21a/0x2c0 [ 441.084372] ? kernfs_walk_and_get_ns+0x340/0x340 [ 441.089214] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 441.094756] ? kernfs_link_sibling+0x1d2/0x3b0 [ 441.099329] kernfs_new_node+0x80/0xf0 [ 441.103214] __kernfs_create_file+0x4d/0x330 [ 441.107630] sysfs_add_file_mode_ns+0x21a/0x560 [ 441.112301] internal_create_group+0x282/0x970 [ 441.116883] sysfs_create_group+0x1f/0x30 [ 441.121024] lo_ioctl+0x12c8/0x1d10 [ 441.124662] ? lo_rw_aio_complete+0x450/0x450 [ 441.129162] blkdev_ioctl+0x9cd/0x2030 [ 441.133041] ? blkpg_ioctl+0xc40/0xc40 [ 441.137031] ? lock_downgrade+0x8f0/0x8f0 [ 441.141191] ? kasan_check_read+0x11/0x20 [ 441.145422] ? rcu_is_watching+0x8c/0x150 [ 441.149566] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 441.153960] ? __fget+0x414/0x670 [ 441.157408] ? expand_files.part.8+0x9c0/0x9c0 [ 441.161995] block_ioctl+0xee/0x130 [ 441.165623] ? blkdev_fallocate+0x400/0x400 [ 441.169932] do_vfs_ioctl+0x1de/0x1720 [ 441.173802] ? rcu_is_watching+0x8c/0x150 [ 441.177937] ? ioctl_preallocate+0x300/0x300 [ 441.182333] ? __fget_light+0x2f7/0x440 [ 441.186301] ? fget_raw+0x20/0x20 [ 441.189759] ? putname+0xf2/0x130 [ 441.193203] ? rcu_read_lock_sched_held+0x108/0x120 [ 441.198214] ? kmem_cache_free+0x25c/0x2d0 [ 441.202433] ? putname+0xf7/0x130 [ 441.205876] ? do_sys_open+0x3cb/0x760 [ 441.209750] ? security_file_ioctl+0x94/0xc0 [ 441.214150] ksys_ioctl+0xa9/0xd0 [ 441.217599] __x64_sys_ioctl+0x73/0xb0 [ 441.221500] do_syscall_64+0x1b9/0x820 [ 441.225389] ? finish_task_switch+0x1d3/0x870 [ 441.229881] ? syscall_return_slowpath+0x5e0/0x5e0 [ 441.234797] ? syscall_return_slowpath+0x31d/0x5e0 [ 441.239727] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 441.245114] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 441.249947] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 441.255124] RIP: 0033:0x455927 [ 441.258296] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 441.277524] RSP: 002b:00007f5205df1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 441.285235] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 0000000000455927 [ 441.292496] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 441.299750] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 441.307013] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 441.314279] R13: 0000000000000001 R14: 00000000004d3c48 R15: 000000000000000e 07:11:13 executing program 3 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 441.453974] print_req_error: I/O error, dev loop0, sector 128 07:11:13 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:13 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:13 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x3) 07:11:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)="6e65742f736f636b73746174009d385710f42e6cb60da1c953f066e817552d0bedb56c17ef75129b50b81e20a04d8086a3f7050ee7dda5ae294e80e6d33a2cc9e43258b7f370e2f609") readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) 07:11:13 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\t', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 441.656552] FAULT_INJECTION: forcing a failure. [ 441.656552] name failslab, interval 1, probability 0, space 0, times 0 [ 441.667956] CPU: 1 PID: 29774 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 441.675326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 441.684687] Call Trace: [ 441.687289] dump_stack+0x1c9/0x2b4 [ 441.690935] ? dump_stack_print_info.cold.2+0x52/0x52 [ 441.696139] ? __mutex_lock+0x7e8/0x1820 [ 441.700220] should_fail.cold.4+0xa/0x1a [ 441.704299] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 441.709421] ? graph_lock+0x170/0x170 [ 441.713244] ? find_held_lock+0x36/0x1c0 [ 441.717322] ? __lock_is_held+0xb5/0x140 [ 441.721408] ? check_same_owner+0x340/0x340 [ 441.725739] ? kasan_check_write+0x14/0x20 [ 441.729982] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 441.734920] ? rcu_note_context_switch+0x730/0x730 [ 441.739864] __should_failslab+0x124/0x180 [ 441.744113] should_failslab+0x9/0x14 [ 441.747921] kmem_cache_alloc+0x2af/0x760 [ 441.752089] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 441.757121] __kernfs_new_node+0xef/0x5a0 [ 441.761286] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 441.766055] ? mutex_unlock+0xd/0x10 [ 441.769780] ? kernfs_activate+0x21a/0x2c0 [ 441.774030] ? kernfs_walk_and_get_ns+0x340/0x340 [ 441.778906] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 441.784786] ? kernfs_link_sibling+0x1d2/0x3b0 [ 441.789389] kernfs_new_node+0x80/0xf0 [ 441.793290] __kernfs_create_file+0x4d/0x330 [ 441.797711] sysfs_add_file_mode_ns+0x21a/0x560 [ 441.802401] internal_create_group+0x282/0x970 [ 441.807014] sysfs_create_group+0x1f/0x30 [ 441.811184] lo_ioctl+0x12c8/0x1d10 [ 441.814839] ? lo_rw_aio_complete+0x450/0x450 [ 441.819341] blkdev_ioctl+0x9cd/0x2030 [ 441.823241] ? blkpg_ioctl+0xc40/0xc40 [ 441.827149] ? lock_downgrade+0x8f0/0x8f0 [ 441.831314] ? kasan_check_read+0x11/0x20 [ 441.835560] ? rcu_is_watching+0x8c/0x150 [ 441.839712] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 441.844132] ? __fget+0x414/0x670 [ 441.847596] ? expand_files.part.8+0x9c0/0x9c0 [ 441.852193] block_ioctl+0xee/0x130 07:11:14 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0xa) 07:11:14 executing program 1: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @broadcast}, &(0x7f0000000040)=0x10, 0x80800) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000080)=0x3, 0x4) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r1, &(0x7f0000002540)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000000c0)=0x7fff, 0x4) [ 441.855851] ? blkdev_fallocate+0x400/0x400 [ 441.860178] do_vfs_ioctl+0x1de/0x1720 [ 441.864066] ? rcu_is_watching+0x8c/0x150 [ 441.868221] ? ioctl_preallocate+0x300/0x300 [ 441.872636] ? __fget_light+0x2f7/0x440 [ 441.876618] ? fget_raw+0x20/0x20 [ 441.880073] ? putname+0xf2/0x130 [ 441.883534] ? rcu_read_lock_sched_held+0x108/0x120 [ 441.888558] ? kmem_cache_free+0x25c/0x2d0 [ 441.892788] ? putname+0xf7/0x130 [ 441.896232] ? do_sys_open+0x3cb/0x760 [ 441.900109] ? security_file_ioctl+0x94/0xc0 [ 441.904504] ksys_ioctl+0xa9/0xd0 [ 441.908031] __x64_sys_ioctl+0x73/0xb0 [ 441.911910] do_syscall_64+0x1b9/0x820 [ 441.915783] ? syscall_return_slowpath+0x5e0/0x5e0 [ 441.920699] ? syscall_return_slowpath+0x31d/0x5e0 [ 441.925622] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 441.930972] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 441.935802] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 441.940986] RIP: 0033:0x455927 [ 441.944158] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 441.963380] RSP: 002b:00007f5205df1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 441.971074] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 0000000000455927 [ 441.978326] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 441.985604] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 441.992870] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 442.000134] R13: 0000000000000001 R14: 00000000004d3c48 R15: 000000000000000f 07:11:14 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0xc8f) 07:11:14 executing program 3 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:14 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsH', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:14 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="627472667306", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000080)) keyctl$update(0x2, r1, &(0x7f0000000080), 0x0) readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) 07:11:14 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0xffffffff000) 07:11:14 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:14 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0xff8) [ 442.458347] FAULT_INJECTION: forcing a failure. [ 442.458347] name failslab, interval 1, probability 0, space 0, times 0 [ 442.469725] CPU: 0 PID: 29857 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 442.477133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.486492] Call Trace: [ 442.489105] dump_stack+0x1c9/0x2b4 [ 442.492753] ? dump_stack_print_info.cold.2+0x52/0x52 [ 442.497970] should_fail.cold.4+0xa/0x1a [ 442.502054] ? fault_create_debugfs_attr+0x1f0/0x1f0 07:11:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) open_by_handle_at(r0, &(0x7f0000000000)={0x43, 0xcd8, "5b159b642f5ea6af19aecb8fe7c8ce4842ef0119acbff91dfbb2d66084176a64a6ad99ee74bf1acc9ac420d48ff6e02628a02daa47b630f1b360aa"}, 0x300) [ 442.507173] ? wait_for_completion+0x8d0/0x8d0 [ 442.511768] ? graph_lock+0x170/0x170 [ 442.515582] ? graph_lock+0x170/0x170 [ 442.519394] ? kasan_check_write+0x14/0x20 [ 442.523648] ? find_held_lock+0x36/0x1c0 [ 442.527727] ? __lock_is_held+0xb5/0x140 [ 442.531805] ? check_same_owner+0x340/0x340 [ 442.536137] ? rcu_note_context_switch+0x730/0x730 [ 442.541085] __should_failslab+0x124/0x180 [ 442.545333] should_failslab+0x9/0x14 [ 442.549144] kmem_cache_alloc_trace+0x2cb/0x780 [ 442.553828] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 442.559376] ? sysfs_add_file_mode_ns+0x22c/0x560 [ 442.564227] ? sysfs_add_file_mode_ns+0x23c/0x560 [ 442.569072] ? device_create_file+0x1e0/0x1e0 [ 442.573565] kobject_uevent_env+0x20f/0x1110 [ 442.577964] ? internal_create_group+0x347/0x970 [ 442.582715] kobject_uevent+0x1f/0x30 [ 442.586512] lo_ioctl+0x1346/0x1d10 [ 442.590155] ? lo_rw_aio_complete+0x450/0x450 [ 442.594645] blkdev_ioctl+0x9cd/0x2030 [ 442.598541] ? blkpg_ioctl+0xc40/0xc40 [ 442.602438] ? lock_downgrade+0x8f0/0x8f0 [ 442.606591] ? kasan_check_read+0x11/0x20 [ 442.610736] ? rcu_is_watching+0x8c/0x150 [ 442.614989] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 442.619400] ? __fget+0x414/0x670 [ 442.622855] ? expand_files.part.8+0x9c0/0x9c0 [ 442.627462] block_ioctl+0xee/0x130 [ 442.631094] ? blkdev_fallocate+0x400/0x400 [ 442.635407] do_vfs_ioctl+0x1de/0x1720 [ 442.639278] ? rcu_is_watching+0x8c/0x150 [ 442.643425] ? ioctl_preallocate+0x300/0x300 [ 442.647818] ? __fget_light+0x2f7/0x440 [ 442.651790] ? fget_raw+0x20/0x20 [ 442.655247] ? putname+0xf2/0x130 [ 442.658687] ? rcu_read_lock_sched_held+0x108/0x120 [ 442.663700] ? kmem_cache_free+0x25c/0x2d0 [ 442.667925] ? putname+0xf7/0x130 [ 442.671374] ? do_sys_open+0x3cb/0x760 [ 442.675257] ? security_file_ioctl+0x94/0xc0 [ 442.679650] ksys_ioctl+0xa9/0xd0 [ 442.683097] __x64_sys_ioctl+0x73/0xb0 [ 442.686979] do_syscall_64+0x1b9/0x820 [ 442.690855] ? syscall_slow_exit_work+0x500/0x500 [ 442.695679] ? syscall_return_slowpath+0x5e0/0x5e0 [ 442.700594] ? syscall_return_slowpath+0x31d/0x5e0 [ 442.705513] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 442.710861] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 442.715709] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 442.720884] RIP: 0033:0x455927 [ 442.724060] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 442.743307] RSP: 002b:00007f5205df1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 442.751011] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 0000000000455927 07:11:15 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 442.758273] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 442.765525] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 442.772780] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 442.780046] R13: 0000000000000001 R14: 00000000004d3c48 R15: 0000000000000010 07:11:15 executing program 3 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsh', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:15 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs#', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:15 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0xe7f) 07:11:15 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:15 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket(0x10, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') sendfile(r1, r2, &(0x7f0000000000)=0xa9, 0x80000004) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') readv(r3, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) [ 443.138910] FAULT_INJECTION: forcing a failure. [ 443.138910] name failslab, interval 1, probability 0, space 0, times 0 [ 443.150302] CPU: 1 PID: 29912 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 443.157672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.167038] Call Trace: [ 443.169642] dump_stack+0x1c9/0x2b4 [ 443.173290] ? dump_stack_print_info.cold.2+0x52/0x52 [ 443.178504] should_fail.cold.4+0xa/0x1a [ 443.182587] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 443.187703] ? wait_for_completion+0x8d0/0x8d0 [ 443.192302] ? graph_lock+0x170/0x170 [ 443.196118] ? graph_lock+0x170/0x170 [ 443.199934] ? kasan_check_write+0x14/0x20 [ 443.204186] ? find_held_lock+0x36/0x1c0 [ 443.208264] ? __lock_is_held+0xb5/0x140 [ 443.212345] ? check_same_owner+0x340/0x340 [ 443.216679] ? rcu_note_context_switch+0x730/0x730 [ 443.221625] __should_failslab+0x124/0x180 [ 443.225873] should_failslab+0x9/0x14 [ 443.229684] kmem_cache_alloc_trace+0x2cb/0x780 [ 443.234367] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 443.239913] ? sysfs_add_file_mode_ns+0x22c/0x560 [ 443.244762] ? sysfs_add_file_mode_ns+0x23c/0x560 [ 443.249616] ? device_create_file+0x1e0/0x1e0 [ 443.254120] kobject_uevent_env+0x20f/0x1110 [ 443.259293] ? internal_create_group+0x347/0x970 [ 443.264067] kobject_uevent+0x1f/0x30 [ 443.267876] lo_ioctl+0x1346/0x1d10 [ 443.271516] ? lo_rw_aio_complete+0x450/0x450 [ 443.276019] blkdev_ioctl+0x9cd/0x2030 [ 443.279921] ? blkpg_ioctl+0xc40/0xc40 [ 443.283821] ? lock_downgrade+0x8f0/0x8f0 [ 443.287987] ? kasan_check_read+0x11/0x20 [ 443.292229] ? rcu_is_watching+0x8c/0x150 [ 443.296387] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 443.300821] ? __fget+0x414/0x670 [ 443.304285] ? expand_files.part.8+0x9c0/0x9c0 [ 443.308884] block_ioctl+0xee/0x130 [ 443.312609] ? blkdev_fallocate+0x400/0x400 [ 443.316938] do_vfs_ioctl+0x1de/0x1720 [ 443.320831] ? rcu_is_watching+0x8c/0x150 [ 443.324989] ? ioctl_preallocate+0x300/0x300 [ 443.329402] ? __fget_light+0x2f7/0x440 [ 443.333389] ? fget_raw+0x20/0x20 [ 443.336853] ? putname+0xf2/0x130 [ 443.340315] ? rcu_read_lock_sched_held+0x108/0x120 [ 443.345337] ? kmem_cache_free+0x25c/0x2d0 [ 443.349579] ? putname+0xf7/0x130 [ 443.353040] ? do_sys_open+0x3cb/0x760 [ 443.356937] ? security_file_ioctl+0x94/0xc0 [ 443.361354] ksys_ioctl+0xa9/0xd0 [ 443.364816] __x64_sys_ioctl+0x73/0xb0 [ 443.368711] do_syscall_64+0x1b9/0x820 [ 443.372601] ? finish_task_switch+0x1d3/0x870 [ 443.377103] ? syscall_return_slowpath+0x5e0/0x5e0 [ 443.382040] ? syscall_return_slowpath+0x31d/0x5e0 [ 443.386984] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 443.392360] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 443.397219] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 443.402435] RIP: 0033:0x455927 [ 443.405623] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 443.424995] RSP: 002b:00007f5205df1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 443.432718] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 0000000000455927 [ 443.439996] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 443.447295] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 443.454574] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 443.461849] R13: 0000000000000001 R14: 00000000004d3c48 R15: 0000000000000011 07:11:15 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 443.502671] print_req_error: I/O error, dev loop6, sector 128 07:11:15 executing program 3 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:15 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsz', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsh', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:16 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0xfffffdef) 07:11:16 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0xe19) 07:11:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') syz_open_pts(r0, 0x0) readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) [ 443.951675] FAULT_INJECTION: forcing a failure. [ 443.951675] name failslab, interval 1, probability 0, space 0, times 0 [ 443.963055] CPU: 1 PID: 29971 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 443.970475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.979821] Call Trace: [ 443.982408] dump_stack+0x1c9/0x2b4 [ 443.986036] ? dump_stack_print_info.cold.2+0x52/0x52 [ 443.991220] should_fail.cold.4+0xa/0x1a [ 443.995268] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 444.000361] ? wait_for_completion+0x8d0/0x8d0 [ 444.004934] ? graph_lock+0x170/0x170 [ 444.008724] ? graph_lock+0x170/0x170 [ 444.012529] ? kasan_check_write+0x14/0x20 [ 444.016759] ? find_held_lock+0x36/0x1c0 [ 444.020812] ? __lock_is_held+0xb5/0x140 [ 444.024873] ? driver_probe_device+0x870/0x970 [ 444.029445] ? check_same_owner+0x340/0x340 [ 444.033753] ? rcu_note_context_switch+0x730/0x730 [ 444.038670] __should_failslab+0x124/0x180 [ 444.042893] should_failslab+0x9/0x14 [ 444.046677] kmem_cache_alloc_trace+0x2cb/0x780 [ 444.051333] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 444.056865] ? sysfs_add_file_mode_ns+0x22c/0x560 [ 444.061705] ? sysfs_add_file_mode_ns+0x23c/0x560 [ 444.066533] ? device_create_file+0x1e0/0x1e0 [ 444.071016] kobject_uevent_env+0x20f/0x1110 [ 444.075413] ? internal_create_group+0x347/0x970 [ 444.080159] kobject_uevent+0x1f/0x30 [ 444.083947] lo_ioctl+0x1346/0x1d10 [ 444.087667] ? lo_rw_aio_complete+0x450/0x450 [ 444.092147] blkdev_ioctl+0x9cd/0x2030 [ 444.096027] ? blkpg_ioctl+0xc40/0xc40 [ 444.099905] ? lock_downgrade+0x8f0/0x8f0 [ 444.104054] ? kasan_check_read+0x11/0x20 [ 444.108187] ? rcu_is_watching+0x8c/0x150 [ 444.112320] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 444.116725] ? __fget+0x414/0x670 [ 444.120168] ? expand_files.part.8+0x9c0/0x9c0 [ 444.124754] block_ioctl+0xee/0x130 [ 444.128372] ? blkdev_fallocate+0x400/0x400 [ 444.132678] do_vfs_ioctl+0x1de/0x1720 [ 444.136565] ? ioctl_preallocate+0x300/0x300 [ 444.140958] ? __fget_light+0x2f7/0x440 [ 444.144916] ? __schedule+0x1ed0/0x1ed0 [ 444.148874] ? fget_raw+0x20/0x20 [ 444.152311] ? putname+0xf2/0x130 [ 444.155756] ? rcu_read_lock_sched_held+0x108/0x120 [ 444.160756] ? kmem_cache_free+0x25c/0x2d0 [ 444.164981] ? exit_to_usermode_loop+0x8c/0x370 [ 444.169639] ? security_file_ioctl+0x94/0xc0 [ 444.174046] ksys_ioctl+0xa9/0xd0 [ 444.177489] __x64_sys_ioctl+0x73/0xb0 [ 444.181397] do_syscall_64+0x1b9/0x820 [ 444.185270] ? finish_task_switch+0x1d3/0x870 [ 444.189771] ? syscall_return_slowpath+0x5e0/0x5e0 [ 444.194687] ? syscall_return_slowpath+0x31d/0x5e0 [ 444.199607] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 444.204960] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 444.209793] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 444.214966] RIP: 0033:0x455927 [ 444.218136] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 444.237366] RSP: 002b:00007f5205df1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 444.245061] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 0000000000455927 [ 444.252315] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 444.259575] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 444.266828] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 444.274099] R13: 0000000000000001 R14: 00000000004d3c48 R15: 0000000000000012 07:11:16 executing program 3 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/route\x00') sendto$inet(r0, &(0x7f0000000000)="4b59a3d645b016220545394f72e7221e079e70925aa423c1b52a9d5a4d5dce75aeb9e09ce01fe400fa91ba3aa6e687443bd1c32c55bd2ec2b9851d6e80410e3e9f7ce538", 0x44, 0x8090, &(0x7f0000000080)={0x2, 0x4e22, @multicast2=0xe0000002}, 0x10) readv(r0, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1) 07:11:16 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:16 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:16 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x63) 07:11:16 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 444.710772] FAULT_INJECTION: forcing a failure. [ 444.710772] name failslab, interval 1, probability 0, space 0, times 0 [ 444.722204] CPU: 1 PID: 30019 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 444.729580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.738945] Call Trace: [ 444.741551] dump_stack+0x1c9/0x2b4 [ 444.745197] ? dump_stack_print_info.cold.2+0x52/0x52 [ 444.750408] ? __kernel_text_address+0xd/0x40 [ 444.754927] should_fail.cold.4+0xa/0x1a 07:11:16 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 444.759017] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 444.764142] ? save_stack+0xa9/0xd0 [ 444.767788] ? graph_lock+0x170/0x170 [ 444.771598] ? kasan_kmalloc+0xc4/0xe0 [ 444.775499] ? kmem_cache_alloc_trace+0x152/0x780 [ 444.780357] ? kobject_uevent_env+0x20f/0x1110 [ 444.784939] ? kobject_uevent+0x1f/0x30 [ 444.788901] ? lo_ioctl+0x1346/0x1d10 [ 444.792721] ? find_held_lock+0x36/0x1c0 [ 444.796799] ? __lock_is_held+0xb5/0x140 [ 444.800873] ? check_same_owner+0x340/0x340 [ 444.805183] ? rcu_note_context_switch+0x730/0x730 [ 444.810111] __should_failslab+0x124/0x180 [ 444.814337] should_failslab+0x9/0x14 [ 444.818123] __kmalloc+0x2c8/0x760 [ 444.821655] ? kobject_uevent_env+0x20f/0x1110 [ 444.826240] ? rcu_read_lock_sched_held+0x108/0x120 [ 444.831259] ? kobject_get_path+0xc2/0x1a0 [ 444.835496] kobject_get_path+0xc2/0x1a0 [ 444.840332] kobject_uevent_env+0x234/0x1110 [ 444.844735] ? internal_create_group+0x347/0x970 [ 444.849492] kobject_uevent+0x1f/0x30 [ 444.853300] lo_ioctl+0x1346/0x1d10 [ 444.856935] ? lo_rw_aio_complete+0x450/0x450 [ 444.861441] blkdev_ioctl+0x9cd/0x2030 [ 444.865330] ? blkpg_ioctl+0xc40/0xc40 [ 444.869223] ? lock_downgrade+0x8f0/0x8f0 [ 444.873378] ? kasan_check_read+0x11/0x20 [ 444.877513] ? rcu_is_watching+0x8c/0x150 [ 444.881657] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 444.886081] ? retint_kernel+0x10/0x10 [ 444.889970] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 444.894981] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 444.899817] block_ioctl+0xee/0x130 [ 444.903434] ? blkdev_fallocate+0x400/0x400 [ 444.907761] do_vfs_ioctl+0x1de/0x1720 [ 444.911644] ? __fget_light+0x2f7/0x440 [ 444.915604] ? ioctl_preallocate+0x300/0x300 [ 444.919995] ? __fget_light+0x2f7/0x440 [ 444.923969] ? fget_raw+0x20/0x20 [ 444.927415] ? putname+0xf2/0x130 [ 444.930888] ? rcu_read_lock_sched_held+0x108/0x120 [ 444.935899] ? kmem_cache_free+0x25c/0x2d0 [ 444.940123] ? putname+0xf7/0x130 [ 444.943570] ? do_sys_open+0x3cb/0x760 [ 444.947539] ? security_file_ioctl+0x94/0xc0 [ 444.951953] ksys_ioctl+0xa9/0xd0 [ 444.955410] __x64_sys_ioctl+0x73/0xb0 [ 444.959434] do_syscall_64+0x1b9/0x820 [ 444.963316] ? syscall_slow_exit_work+0x500/0x500 [ 444.968145] ? syscall_return_slowpath+0x5e0/0x5e0 [ 444.973065] ? syscall_return_slowpath+0x31d/0x5e0 [ 444.977986] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 444.983339] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 444.988187] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 444.993368] RIP: 0033:0x455927 [ 444.996540] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 445.015734] RSP: 002b:00007f5205df1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 445.023463] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 0000000000455927 [ 445.030733] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 445.038003] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 445.045302] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 445.052588] R13: 0000000000000001 R14: 00000000004d3c48 R15: 0000000000000013 07:11:17 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:17 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:17 executing program 3 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 445.513975] FAULT_INJECTION: forcing a failure. [ 445.513975] name failslab, interval 1, probability 0, space 0, times 0 [ 445.526164] CPU: 0 PID: 30100 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 445.533543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.542910] Call Trace: [ 445.545514] dump_stack+0x1c9/0x2b4 [ 445.549165] ? dump_stack_print_info.cold.2+0x52/0x52 [ 445.554385] should_fail.cold.4+0xa/0x1a [ 445.558472] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 445.563594] ? rcu_note_context_switch+0x730/0x730 [ 445.568540] ? graph_lock+0x170/0x170 [ 445.572363] ? find_held_lock+0x36/0x1c0 [ 445.576447] ? __lock_is_held+0xb5/0x140 [ 445.580534] ? check_same_owner+0x340/0x340 [ 445.584865] ? graph_lock+0x170/0x170 [ 445.588681] ? rcu_note_context_switch+0x730/0x730 [ 445.593631] __should_failslab+0x124/0x180 [ 445.597880] should_failslab+0x9/0x14 [ 445.601698] kmem_cache_alloc_node+0x272/0x780 [ 445.606305] ? find_held_lock+0x36/0x1c0 [ 445.610394] __alloc_skb+0x119/0x790 [ 445.614128] ? skb_scrub_packet+0x580/0x580 [ 445.618468] ? kasan_check_read+0x11/0x20 [ 445.622637] ? rcu_is_watching+0x8c/0x150 [ 445.626796] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 445.631228] ? netlink_has_listeners+0x2da/0x4c0 [ 445.636000] ? netlink_tap_init_net+0x3e0/0x3e0 [ 445.640683] alloc_uevent_skb+0x89/0x220 [ 445.644765] kobject_uevent_env+0x866/0x1110 [ 445.649183] ? internal_create_group+0x347/0x970 [ 445.653957] kobject_uevent+0x1f/0x30 [ 445.657769] lo_ioctl+0x1346/0x1d10 [ 445.661415] ? lo_rw_aio_complete+0x450/0x450 [ 445.665921] blkdev_ioctl+0x9cd/0x2030 [ 445.669825] ? blkpg_ioctl+0xc40/0xc40 [ 445.673727] ? lock_downgrade+0x8f0/0x8f0 [ 445.677865] ? kasan_check_read+0x11/0x20 [ 445.682086] ? rcu_is_watching+0x8c/0x150 [ 445.686227] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 445.690646] ? __fget+0x414/0x670 [ 445.694100] ? expand_files.part.8+0x9c0/0x9c0 [ 445.698685] block_ioctl+0xee/0x130 [ 445.702314] ? blkdev_fallocate+0x400/0x400 [ 445.706640] do_vfs_ioctl+0x1de/0x1720 [ 445.710512] ? rcu_is_watching+0x8c/0x150 [ 445.714732] ? ioctl_preallocate+0x300/0x300 [ 445.719127] ? __fget_light+0x2f7/0x440 [ 445.723102] ? fget_raw+0x20/0x20 [ 445.726539] ? putname+0xf2/0x130 [ 445.729987] ? rcu_read_lock_sched_held+0x108/0x120 [ 445.734991] ? kmem_cache_free+0x25c/0x2d0 [ 445.739223] ? putname+0xf7/0x130 [ 445.742670] ? do_sys_open+0x3cb/0x760 [ 445.746543] ? security_file_ioctl+0x94/0xc0 [ 445.750944] ksys_ioctl+0xa9/0xd0 [ 445.754392] __x64_sys_ioctl+0x73/0xb0 [ 445.758274] do_syscall_64+0x1b9/0x820 [ 445.762148] ? finish_task_switch+0x1d3/0x870 [ 445.766636] ? syscall_return_slowpath+0x5e0/0x5e0 [ 445.771557] ? syscall_return_slowpath+0x31d/0x5e0 [ 445.776476] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 445.781844] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 445.786677] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 445.791965] RIP: 0033:0x455927 [ 445.795142] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 445.814416] RSP: 002b:00007f5205df1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 445.822112] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 0000000000455927 [ 445.829382] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 445.836637] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 445.843891] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 445.851156] R13: 0000000000000001 R14: 00000000004d3c48 R15: 0000000000000014 07:11:18 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:18 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:18 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0xf01) 07:11:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:18 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673fb", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:18 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0xfdef) 07:11:18 executing program 3 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 446.038197] print_req_error: I/O error, dev loop6, sector 128 07:11:18 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:18 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x2) 07:11:18 executing program 1: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="84aaf79960e1"}, 0x14) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040), &(0x7f0000000080)=0xb) 07:11:18 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 446.198450] FAULT_INJECTION: forcing a failure. [ 446.198450] name failslab, interval 1, probability 0, space 0, times 0 [ 446.209790] CPU: 1 PID: 30153 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 446.217165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.226517] Call Trace: [ 446.229097] dump_stack+0x1c9/0x2b4 [ 446.232725] ? dump_stack_print_info.cold.2+0x52/0x52 [ 446.237929] ? kernel_text_address+0x79/0xf0 [ 446.242355] should_fail.cold.4+0xa/0x1a [ 446.246436] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 446.251571] ? graph_lock+0x170/0x170 [ 446.255373] ? save_stack+0x43/0xd0 [ 446.258987] ? kasan_kmalloc+0xc4/0xe0 [ 446.262898] ? find_held_lock+0x36/0x1c0 [ 446.266962] ? __lock_is_held+0xb5/0x140 [ 446.271026] ? check_same_owner+0x340/0x340 [ 446.275346] ? rcu_note_context_switch+0x730/0x730 [ 446.280266] __should_failslab+0x124/0x180 [ 446.284499] should_failslab+0x9/0x14 [ 446.288291] kmem_cache_alloc_node_trace+0x26f/0x770 [ 446.293403] __kmalloc_node_track_caller+0x33/0x70 [ 446.298337] __kmalloc_reserve.isra.40+0x3a/0xe0 [ 446.303098] __alloc_skb+0x155/0x790 [ 446.306813] ? skb_scrub_packet+0x580/0x580 [ 446.311148] ? kasan_check_read+0x11/0x20 [ 446.315295] ? rcu_is_watching+0x8c/0x150 [ 446.319450] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 446.323864] ? netlink_has_listeners+0x2da/0x4c0 [ 446.328627] ? netlink_tap_init_net+0x3e0/0x3e0 [ 446.333309] alloc_uevent_skb+0x89/0x220 [ 446.337379] kobject_uevent_env+0x866/0x1110 [ 446.341791] ? internal_create_group+0x347/0x970 07:11:18 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x10) [ 446.346560] kobject_uevent+0x1f/0x30 [ 446.350971] lo_ioctl+0x1346/0x1d10 [ 446.354607] ? lo_rw_aio_complete+0x450/0x450 [ 446.359108] blkdev_ioctl+0x9cd/0x2030 [ 446.363004] ? blkpg_ioctl+0xc40/0xc40 [ 446.366898] ? lock_downgrade+0x8f0/0x8f0 [ 446.371048] ? kasan_check_read+0x11/0x20 [ 446.375204] ? rcu_is_watching+0x8c/0x150 [ 446.379344] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 446.383758] ? __fget+0x414/0x670 [ 446.387215] ? expand_files.part.8+0x9c0/0x9c0 [ 446.391797] block_ioctl+0xee/0x130 [ 446.395408] ? blkdev_fallocate+0x400/0x400 [ 446.399730] do_vfs_ioctl+0x1de/0x1720 [ 446.403625] ? rcu_is_watching+0x8c/0x150 [ 446.407779] ? ioctl_preallocate+0x300/0x300 [ 446.412189] ? __fget_light+0x2f7/0x440 [ 446.416168] ? fget_raw+0x20/0x20 [ 446.419628] ? putname+0xf2/0x130 [ 446.423088] ? rcu_read_lock_sched_held+0x108/0x120 [ 446.428110] ? kmem_cache_free+0x25c/0x2d0 [ 446.432356] ? putname+0xf7/0x130 [ 446.435816] ? do_sys_open+0x3cb/0x760 [ 446.439727] ? security_file_ioctl+0x94/0xc0 [ 446.444147] ksys_ioctl+0xa9/0xd0 [ 446.447610] __x64_sys_ioctl+0x73/0xb0 [ 446.451503] do_syscall_64+0x1b9/0x820 [ 446.455398] ? finish_task_switch+0x1d3/0x870 [ 446.459890] ? syscall_return_slowpath+0x5e0/0x5e0 [ 446.464819] ? syscall_return_slowpath+0x31d/0x5e0 [ 446.469761] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 446.475146] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 446.480010] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 446.485195] RIP: 0033:0x455927 07:11:18 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0xf9e) [ 446.488369] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 446.507724] RSP: 002b:00007f5205df1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 446.515453] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 0000000000455927 [ 446.522742] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 446.530008] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 446.537293] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 446.544563] R13: 0000000000000001 R14: 00000000004d3c48 R15: 0000000000000015 [ 446.556446] print_req_error: I/O error, dev loop6, sector 128 07:11:18 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="757365722e736572b16974792e6361696162696c69747900"], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="62747266731c", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:18 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x7}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0c08000002000000290000007960e1c7"], 0x10}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f00000001c0), 0x21a, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000000680), 0x3ba, &(0x7f0000002000)=[{0x10}], 0x10}}], 0x2, 0x0) 07:11:18 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:18 executing program 3 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:19 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfst', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:19 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:19 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0xe60) [ 446.952605] FAULT_INJECTION: forcing a failure. [ 446.952605] name failslab, interval 1, probability 0, space 0, times 0 [ 446.963947] CPU: 1 PID: 30226 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 446.971318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.980677] Call Trace: [ 446.983279] dump_stack+0x1c9/0x2b4 [ 446.986922] ? dump_stack_print_info.cold.2+0x52/0x52 [ 446.992124] ? kernel_text_address+0x79/0xf0 [ 446.996553] should_fail.cold.4+0xa/0x1a 07:11:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x690100, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='user.capability\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:19 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:19 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f00000000c0)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) exit(0x21) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) [ 447.000636] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 447.005757] ? graph_lock+0x170/0x170 [ 447.009569] ? save_stack+0x43/0xd0 [ 447.013201] ? kasan_kmalloc+0xc4/0xe0 [ 447.017104] ? find_held_lock+0x36/0x1c0 [ 447.021178] ? __lock_is_held+0xb5/0x140 [ 447.025254] ? check_same_owner+0x340/0x340 [ 447.029585] ? rcu_note_context_switch+0x730/0x730 [ 447.034529] __should_failslab+0x124/0x180 [ 447.038778] should_failslab+0x9/0x14 [ 447.042590] kmem_cache_alloc_node_trace+0x26f/0x770 [ 447.047751] __kmalloc_node_track_caller+0x33/0x70 [ 447.052712] __kmalloc_reserve.isra.40+0x3a/0xe0 [ 447.057474] __alloc_skb+0x155/0x790 [ 447.061188] ? skb_scrub_packet+0x580/0x580 [ 447.065502] ? kasan_check_read+0x11/0x20 [ 447.069639] ? rcu_is_watching+0x8c/0x150 [ 447.073786] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 447.078194] ? netlink_has_listeners+0x2da/0x4c0 [ 447.082950] ? netlink_tap_init_net+0x3e0/0x3e0 [ 447.087630] alloc_uevent_skb+0x89/0x220 [ 447.091708] kobject_uevent_env+0x866/0x1110 [ 447.096122] ? internal_create_group+0x347/0x970 [ 447.100880] kobject_uevent+0x1f/0x30 [ 447.104681] lo_ioctl+0x1346/0x1d10 [ 447.108327] ? lo_rw_aio_complete+0x450/0x450 [ 447.112831] blkdev_ioctl+0x9cd/0x2030 [ 447.116729] ? blkpg_ioctl+0xc40/0xc40 [ 447.120635] ? lock_downgrade+0x8f0/0x8f0 [ 447.124789] ? kasan_check_read+0x11/0x20 [ 447.128937] ? rcu_is_watching+0x8c/0x150 [ 447.133110] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 447.137531] ? __fget+0x414/0x670 [ 447.140995] ? expand_files.part.8+0x9c0/0x9c0 [ 447.145589] block_ioctl+0xee/0x130 [ 447.149221] ? blkdev_fallocate+0x400/0x400 07:11:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x8000, 0x100) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000100)={0x1, 'bridge0\x00'}, 0x18) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r2, &(0x7f00000002c0)='threaded\x00', 0x9) ioctl$void(r1, 0xc0045c78) [ 447.153556] do_vfs_ioctl+0x1de/0x1720 [ 447.157448] ? rcu_is_watching+0x8c/0x150 [ 447.161605] ? ioctl_preallocate+0x300/0x300 [ 447.166019] ? __fget_light+0x2f7/0x440 [ 447.169997] ? fget_raw+0x20/0x20 [ 447.173455] ? putname+0xf2/0x130 [ 447.176917] ? rcu_read_lock_sched_held+0x108/0x120 [ 447.181938] ? kmem_cache_free+0x25c/0x2d0 [ 447.186182] ? putname+0xf7/0x130 [ 447.189643] ? do_sys_open+0x3cb/0x760 [ 447.193530] ? security_file_ioctl+0x94/0xc0 [ 447.197929] ksys_ioctl+0xa9/0xd0 [ 447.201377] __x64_sys_ioctl+0x73/0xb0 [ 447.205266] do_syscall_64+0x1b9/0x820 [ 447.209148] ? finish_task_switch+0x1d3/0x870 [ 447.213647] ? syscall_return_slowpath+0x5e0/0x5e0 [ 447.218585] ? syscall_return_slowpath+0x31d/0x5e0 [ 447.223527] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 447.228902] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 447.233750] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 447.238931] RIP: 0033:0x455927 07:11:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x3) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f00000001c0)=""/166) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="75656775726974792e63f9ffffffffbfffffe8b50f0fada1ed00800000581825d32d87a8b9b3faf2e29a04b834fc4b21ebadfd30ea1bfe1a84e5914310ba2c859f0e19"], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) r2 = shmat(0x0, &(0x7f0000fff000/0x1000)=nil, 0x1000) shmdt(r2) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) [ 447.242111] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7d bb fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 447.262121] RSP: 002b:00007f5205df1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 447.269836] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 0000000000455927 [ 447.277102] RDX: 0000000000000014 RSI: 0000000000004c00 RDI: 0000000000000015 [ 447.284375] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 447.291645] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 447.298917] R13: 0000000000000001 R14: 00000000004d3c48 R15: 0000000000000016 07:11:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:19 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673fd", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000cb9ffc)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000180)='veno\x00', 0x5) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000001c0)=0xe8) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000040)='./file0\x00', r1, r2) bind$inet(r0, &(0x7f0000c16ff0)={0x2, 0x1, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000fa0fff), 0x0, 0x24000000, &(0x7f0000000000)={0x2, 0x1, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) 07:11:19 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:19 executing program 3 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:19 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="757365722e73656375726974792e6361706162696c69747900a2447e873fa6f24dc0bc18e03190830ef3cc237b2c91a5b1f8909fc2965f710b7156d9d1a484a3f27c73f504b92b2f5ec9bf8a8a066818ca0716e11d51c4ebe9916539d6a304e0155dabb914716c44b2601351a018cf294ff589019f31d31fa5603296ceff545ad6762983942976e6bbaf7c3c08363e072bef97d76acced94fcb8"], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:19 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 447.893742] FAULT_INJECTION: forcing a failure. [ 447.893742] name failslab, interval 1, probability 0, space 0, times 0 [ 447.905681] CPU: 1 PID: 30314 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 447.913055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 447.922769] Call Trace: [ 447.925367] dump_stack+0x1c9/0x2b4 [ 447.929012] ? dump_stack_print_info.cold.2+0x52/0x52 [ 447.934216] ? print_usage_bug+0xc0/0xc0 [ 447.938294] should_fail.cold.4+0xa/0x1a [ 447.942362] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 447.947909] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 447.953057] ? graph_lock+0x170/0x170 [ 447.956867] ? trace_hardirqs_on+0x10/0x10 [ 447.961118] ? find_held_lock+0x36/0x1c0 [ 447.965191] ? __lock_is_held+0xb5/0x140 [ 447.969272] ? check_same_owner+0x340/0x340 [ 447.973605] ? rcu_note_context_switch+0x730/0x730 [ 447.978546] __should_failslab+0x124/0x180 [ 447.982793] should_failslab+0x9/0x14 [ 447.986603] kmem_cache_alloc+0x2af/0x760 07:11:20 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) io_setup(0x1f, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000040), 0x20000040}]) r2 = socket$inet6(0xa, 0x0, 0x200) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x30, &(0x7f0000000000)=[@in={0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}]}, &(0x7f0000000080)=0x10) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x900, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000000c0)={0x3, 0x8, 0x9, 0x7fff, r3}, 0x10) 07:11:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:20 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="62747266730f", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:20 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$P9_RAUTH(r1, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x0, 0x2, 0x1}}, 0x14) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) [ 447.990760] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 447.995197] __d_alloc+0xc8/0xd50 [ 447.998663] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 448.003692] ? d_alloc_parallel+0x1ea0/0x1ea0 [ 448.008204] ? lock_release+0xa30/0xa30 [ 448.012275] ? mark_held_locks+0xc9/0x160 [ 448.016430] ? filename_create+0x1b2/0x5b0 [ 448.020676] ? d_lookup+0x269/0x340 [ 448.024323] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 448.029351] d_alloc+0x96/0x380 [ 448.032639] ? __d_lookup+0x9e0/0x9e0 [ 448.036448] ? __d_alloc+0xd50/0xd50 [ 448.040166] __lookup_hash+0xd9/0x190 [ 448.043957] filename_create+0x1e5/0x5b0 [ 448.048030] ? kern_path_mountpoint+0x40/0x40 [ 448.052536] ? fget_raw+0x20/0x20 [ 448.055988] ? putname+0xf2/0x130 [ 448.059460] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 448.065009] ? getname_flags+0x26e/0x5a0 [ 448.069089] do_mkdirat+0xda/0x310 [ 448.072628] ? __ia32_sys_mknod+0xb0/0xb0 [ 448.076856] ? ksys_ioctl+0x81/0xd0 [ 448.080486] __x64_sys_mkdir+0x5c/0x80 [ 448.084362] do_syscall_64+0x1b9/0x820 [ 448.088243] ? finish_task_switch+0x1d3/0x870 [ 448.092747] ? syscall_return_slowpath+0x5e0/0x5e0 [ 448.097693] ? syscall_return_slowpath+0x31d/0x5e0 [ 448.102622] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 448.107993] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 448.112863] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 448.118050] RIP: 0033:0x454ef7 [ 448.121219] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:11:20 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) signalfd(r1, &(0x7f0000000000)={0xce4}, 0x8) [ 448.140406] RSP: 002b:00007f5205df1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 448.148121] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 0000000000454ef7 [ 448.155494] RDX: 0000000000000014 RSI: 00000000000001ff RDI: 0000000020000100 [ 448.162761] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 448.170034] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 448.177308] R13: 0000000000000001 R14: 00000000004d3c48 R15: 0000000000000017 07:11:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsH', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:20 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="62747266731c", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:20 executing program 1: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000080)=0x20000004) ftruncate(r0, 0x1) 07:11:20 executing program 3 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:20 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:20 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='user.security.captbility\x00'], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) ioctl$RTC_PIE_OFF(r1, 0x7006) 07:11:20 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673fc", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 448.529751] FAULT_INJECTION: forcing a failure. [ 448.529751] name failslab, interval 1, probability 0, space 0, times 0 [ 448.541101] CPU: 1 PID: 30377 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 448.548476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 448.558444] Call Trace: [ 448.561066] dump_stack+0x1c9/0x2b4 [ 448.564711] ? dump_stack_print_info.cold.2+0x52/0x52 [ 448.569924] should_fail.cold.4+0xa/0x1a [ 448.574011] ? fault_create_debugfs_attr+0x1f0/0x1f0 07:11:20 executing program 1: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5c81, 0x2040) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f00000001c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000040)}}, 0x10) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000200)=""/3) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0xfff, 0x4403) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000280), 0x4) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000300)=0x5) r4 = accept$packet(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000380)=0x14) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCDELDLCI(r4, 0x8981, &(0x7f0000000400)={'team_slave_1\x00', 0xb0c}) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000440), &(0x7f0000000480)=0x4) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000004c0), &(0x7f0000000500)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000580)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000540)={0xffffffffffffffff}, 0x13f, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f00000005c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x9, @ipv4={[], [0xff, 0xff]}, 0x100000000}, r6}}, 0x30) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000600)={'veth0_to_bridge\x00', 0x7}) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000640)) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000680)) openat$audio(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/audio\x00', 0x145080, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) r7 = syz_open_dev$sndpcmc(&(0x7f0000000700)='/dev/snd/pcmC#D#c\x00', 0x800, 0x482900) fcntl$getflags(r5, 0x1) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000740)={0x0, 0xff, "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"}, &(0x7f0000000880)=0x107) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000008c0)=@assoc_value={r8, 0x5}, &(0x7f0000000900)=0x8) syz_open_dev$sndtimer(&(0x7f0000000940)='/dev/snd/timer\x00', 0x0, 0x2440) write$binfmt_script(r2, &(0x7f0000000980)={'#! ', './file0', [{0x20, 'wlan1md5sumuserbdevvboxnet0posix_acl_accessem1)\'user&securityself^\'!{vboxnet1'}, {0x20, 'eth0,\\&#'}], 0xa, "0c7d9a248ec84018798a67a02321fd82af840a9570afe149f70804ce744581201e034bbf1315c8d0e1c67f2583df3a1c3da735a644"}, 0x97) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r7, 0xc0045516, &(0x7f0000000a40)=0x80000001) sendfile(r1, r1, &(0x7f0000000a80), 0x3) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r3, 0x40485404, &(0x7f0000000ac0)={{0x0, 0x3, 0x7ff, 0x0, 0x3}, 0x6, 0x2}) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000b40)=0x0) sched_getparam(r9, &(0x7f0000000b80)) [ 448.579142] ? trace_hardirqs_on+0x10/0x10 [ 448.583388] ? graph_lock+0x170/0x170 [ 448.587201] ? trace_hardirqs_on+0x10/0x10 [ 448.591444] ? print_usage_bug+0xc0/0xc0 [ 448.595527] ? __lock_is_held+0xb5/0x140 [ 448.599596] ? lock_downgrade+0x8f0/0x8f0 [ 448.603764] ? check_same_owner+0x340/0x340 [ 448.608101] ? rcu_note_context_switch+0x730/0x730 [ 448.613044] __should_failslab+0x124/0x180 [ 448.617290] should_failslab+0x9/0x14 [ 448.621099] kmem_cache_alloc+0x2af/0x760 [ 448.625257] ? __lock_is_held+0xb5/0x140 07:11:20 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000000)=0x8aa) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000040)={0x7, 0x7}) [ 448.629336] ext4_alloc_inode+0xc9/0x880 [ 448.633412] ? ratelimit_state_init+0xb0/0xb0 [ 448.637919] ? find_held_lock+0x36/0x1c0 [ 448.642007] ? lock_downgrade+0x8f0/0x8f0 [ 448.646171] ? kasan_check_read+0x11/0x20 [ 448.650324] ? rcu_is_watching+0x8c/0x150 [ 448.654483] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 448.658901] ? graph_lock+0x170/0x170 [ 448.662713] ? ratelimit_state_init+0xb0/0xb0 [ 448.667203] alloc_inode+0x63/0x190 [ 448.670819] new_inode_pseudo+0x71/0x1a0 [ 448.674870] ? prune_icache_sb+0x1b0/0x1b0 [ 448.679121] new_inode+0x1c/0x40 [ 448.682477] __ext4_new_inode+0x449/0x61a0 [ 448.686700] ? find_held_lock+0x36/0x1c0 [ 448.690756] ? ext4_free_inode+0x1890/0x1890 [ 448.695154] ? kasan_check_read+0x11/0x20 [ 448.699288] ? rcu_is_watching+0x8c/0x150 [ 448.703429] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 448.707823] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 448.712230] ? is_bpf_text_address+0xd7/0x170 [ 448.716711] ? kernel_text_address+0x79/0xf0 [ 448.721106] ? __kernel_text_address+0xd/0x40 [ 448.725589] ? unwind_get_return_address+0x61/0xa0 [ 448.730519] ? __save_stack_trace+0x8d/0xf0 [ 448.734836] ? save_stack+0xa9/0xd0 [ 448.738449] ? save_stack+0x43/0xd0 [ 448.742062] ? __kasan_slab_free+0x11a/0x170 [ 448.746454] ? kasan_slab_free+0xe/0x10 [ 448.750423] ? kmem_cache_free+0x86/0x2d0 [ 448.754643] ? putname+0xf2/0x130 [ 448.758081] ? filename_create+0x2b2/0x5b0 [ 448.762301] ? do_mkdirat+0xda/0x310 [ 448.765999] ? __x64_sys_mkdir+0x5c/0x80 [ 448.770052] ? do_syscall_64+0x1b9/0x820 [ 448.774101] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 448.779544] ? kasan_check_read+0x11/0x20 [ 448.783676] ? do_raw_spin_unlock+0xa7/0x2f0 [ 448.788070] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 448.792649] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 448.798185] ? __dquot_initialize+0x61d/0xde0 [ 448.802666] ? graph_lock+0x170/0x170 [ 448.806453] ? trace_hardirqs_off+0xd/0x10 [ 448.810688] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 448.815776] ? dquot_get_next_dqblk+0x180/0x180 [ 448.820430] ? debug_check_no_obj_freed+0x30b/0x595 [ 448.825530] ? kasan_check_write+0x14/0x20 [ 448.829757] ? __lock_is_held+0xb5/0x140 [ 448.833805] ext4_mkdir+0x2e1/0xe60 [ 448.837427] ? ext4_init_dot_dotdot+0x510/0x510 [ 448.842085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 448.847618] ? security_inode_permission+0xd2/0x100 [ 448.852622] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 448.858145] ? security_inode_mkdir+0xe8/0x120 [ 448.862718] vfs_mkdir+0x42e/0x6b0 [ 448.866250] do_mkdirat+0x27b/0x310 [ 448.869869] ? __ia32_sys_mknod+0xb0/0xb0 [ 448.874004] ? ksys_ioctl+0x81/0xd0 [ 448.877624] __x64_sys_mkdir+0x5c/0x80 [ 448.881498] do_syscall_64+0x1b9/0x820 [ 448.885370] ? finish_task_switch+0x1d3/0x870 [ 448.889849] ? syscall_return_slowpath+0x5e0/0x5e0 [ 448.894774] ? syscall_return_slowpath+0x31d/0x5e0 [ 448.899696] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 448.905062] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 448.909921] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 448.915107] RIP: 0033:0x454ef7 [ 448.918375] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 448.937606] RSP: 002b:00007f5205df1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 448.945299] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 0000000000454ef7 [ 448.952552] RDX: 0000000000000014 RSI: 00000000000001ff RDI: 0000000020000100 [ 448.959815] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 448.967068] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 448.974320] R13: 0000000000000001 R14: 00000000004d3c48 R15: 0000000000000018 07:11:21 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:21 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:21 executing program 3 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:21 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x80, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x118, r1, 0x900, 0x70bd26, 0x25dfdbfc, {0x2}, [@IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x4}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x60, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast=0xffffffff}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1c}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1={0xff, 0x1, [], 0x1}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x156af952}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xfff}]}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0xb}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'erspan0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x200}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x67}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8b10}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x4008000}, 0x80) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = creat(&(0x7f0000000140)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r3, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:21 executing program 1: mincore(&(0x7f0000378000/0x4000)=nil, 0x4000, &(0x7f00000002c0)=""/4096) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x3a1f8c647c16b080, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x1f}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={r1, @in={{0x2, 0x4e21, @rand_addr=0x400}}, 0x7, 0x8}, 0x90) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x6, 0x8, 0x80000001, 0x200, 0x40, 0x7fff, 0x5e51c88c, 0xfff, 0xffff, 0x401, 0x4}, 0xb) utime(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x3f, 0x393}) mmap$binder(&(0x7f0000379000/0x3000)=nil, 0x3000, 0x1000001, 0x20010, r0, 0x0) mmap$xdp(&(0x7f0000379000/0x4000)=nil, 0x4000, 0x1000008, 0x10010, r0, 0x180000000) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r1, 0x2, 0x3e}, 0xc) 07:11:21 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:21 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsl', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 449.352161] FAULT_INJECTION: forcing a failure. [ 449.352161] name failslab, interval 1, probability 0, space 0, times 0 [ 449.363737] CPU: 0 PID: 30439 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 449.371111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 449.380476] Call Trace: [ 449.383075] dump_stack+0x1c9/0x2b4 [ 449.386713] ? dump_stack_print_info.cold.2+0x52/0x52 [ 449.391933] should_fail.cold.4+0xa/0x1a [ 449.396018] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 449.401142] ? trace_hardirqs_on+0x10/0x10 [ 449.405405] ? graph_lock+0x170/0x170 [ 449.409490] ? trace_hardirqs_on+0x10/0x10 [ 449.413741] ? print_usage_bug+0xc0/0xc0 [ 449.417829] ? __lock_is_held+0xb5/0x140 [ 449.421917] ? lock_downgrade+0x8f0/0x8f0 [ 449.427106] ? check_same_owner+0x340/0x340 [ 449.431448] ? rcu_note_context_switch+0x730/0x730 [ 449.436401] __should_failslab+0x124/0x180 [ 449.440662] should_failslab+0x9/0x14 [ 449.444454] kmem_cache_alloc+0x2af/0x760 [ 449.448951] ? __lock_is_held+0xb5/0x140 [ 449.453014] ext4_alloc_inode+0xc9/0x880 [ 449.457077] ? ratelimit_state_init+0xb0/0xb0 [ 449.461561] ? find_held_lock+0x36/0x1c0 [ 449.465634] ? lock_downgrade+0x8f0/0x8f0 [ 449.469795] ? kasan_check_read+0x11/0x20 [ 449.473945] ? rcu_is_watching+0x8c/0x150 [ 449.478082] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 449.482483] ? graph_lock+0x170/0x170 [ 449.486277] ? ratelimit_state_init+0xb0/0xb0 [ 449.490765] alloc_inode+0x63/0x190 [ 449.494417] new_inode_pseudo+0x71/0x1a0 [ 449.498482] ? prune_icache_sb+0x1b0/0x1b0 [ 449.502717] new_inode+0x1c/0x40 [ 449.506081] __ext4_new_inode+0x449/0x61a0 [ 449.510310] ? find_held_lock+0x36/0x1c0 [ 449.514389] ? ext4_free_inode+0x1890/0x1890 [ 449.518805] ? kasan_check_read+0x11/0x20 [ 449.522939] ? rcu_is_watching+0x8c/0x150 [ 449.527080] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 449.531486] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 449.535903] ? is_bpf_text_address+0xd7/0x170 [ 449.540391] ? kernel_text_address+0x79/0xf0 [ 449.544800] ? __kernel_text_address+0xd/0x40 [ 449.549286] ? unwind_get_return_address+0x61/0xa0 [ 449.554214] ? __save_stack_trace+0x8d/0xf0 [ 449.558548] ? save_stack+0xa9/0xd0 [ 449.562169] ? save_stack+0x43/0xd0 [ 449.565795] ? __kasan_slab_free+0x11a/0x170 [ 449.570195] ? kasan_slab_free+0xe/0x10 [ 449.574859] ? kmem_cache_free+0x86/0x2d0 [ 449.578990] ? putname+0xf2/0x130 [ 449.582432] ? filename_create+0x2b2/0x5b0 [ 449.586650] ? do_mkdirat+0xda/0x310 [ 449.590351] ? __x64_sys_mkdir+0x5c/0x80 [ 449.594407] ? do_syscall_64+0x1b9/0x820 [ 449.598467] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 449.603831] ? kasan_check_read+0x11/0x20 [ 449.607970] ? do_raw_spin_unlock+0xa7/0x2f0 [ 449.612362] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 449.617115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 449.622656] ? __dquot_initialize+0x61d/0xde0 [ 449.627155] ? graph_lock+0x170/0x170 [ 449.630946] ? trace_hardirqs_off+0xd/0x10 [ 449.635167] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 449.640268] ? dquot_get_next_dqblk+0x180/0x180 [ 449.644942] ? debug_check_no_obj_freed+0x30b/0x595 [ 449.649945] ? kasan_check_write+0x14/0x20 [ 449.654168] ? __lock_is_held+0xb5/0x140 [ 449.658219] ext4_mkdir+0x2e1/0xe60 [ 449.661848] ? ext4_init_dot_dotdot+0x510/0x510 [ 449.666517] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 449.672049] ? security_inode_permission+0xd2/0x100 [ 449.677066] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 449.682592] ? security_inode_mkdir+0xe8/0x120 [ 449.687175] vfs_mkdir+0x42e/0x6b0 [ 449.690726] do_mkdirat+0x27b/0x310 [ 449.694352] ? __ia32_sys_mknod+0xb0/0xb0 [ 449.698495] ? syscall_slow_exit_work+0x500/0x500 [ 449.703333] ? ksys_ioctl+0x81/0xd0 [ 449.706956] __x64_sys_mkdir+0x5c/0x80 [ 449.710851] do_syscall_64+0x1b9/0x820 [ 449.714726] ? finish_task_switch+0x1d3/0x870 [ 449.719207] ? syscall_return_slowpath+0x5e0/0x5e0 [ 449.724133] ? syscall_return_slowpath+0x31d/0x5e0 [ 449.729065] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 449.734424] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 449.739270] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 449.744529] RIP: 0033:0x454ef7 [ 449.747718] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 449.766957] RSP: 002b:00007f5205df1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 449.774673] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 0000000000454ef7 [ 449.781968] RDX: 0000000000000014 RSI: 00000000000001ff RDI: 0000000020000100 [ 449.789245] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 449.796513] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 07:11:22 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 449.803776] R13: 0000000000000001 R14: 00000000004d3c48 R15: 0000000000000019 07:11:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:22 executing program 3 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:22 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff81, 0x2}, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x400, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000080)={0x7, 0x5, 0x7, 0x0, 0x7}) r2 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x4011, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f00000000c0)='veth1_to_bond\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) 07:11:22 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/protocols\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:22 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000080), &(0x7f0000000100)=0x4) ioctl(r0, 0xfffffffe, &(0x7f0000000200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:22 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 450.212876] print_req_error: I/O error, dev loop0, sector 128 [ 450.257183] FAULT_INJECTION: forcing a failure. [ 450.257183] name failslab, interval 1, probability 0, space 0, times 0 [ 450.268537] CPU: 1 PID: 30508 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 450.275910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 450.285272] Call Trace: [ 450.287889] dump_stack+0x1c9/0x2b4 [ 450.291533] ? dump_stack_print_info.cold.2+0x52/0x52 [ 450.296739] ? __lock_is_held+0xb5/0x140 [ 450.300824] should_fail.cold.4+0xa/0x1a 07:11:22 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673f4", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 450.304901] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 450.310018] ? check_same_owner+0x340/0x340 [ 450.314353] ? trace_hardirqs_on+0x10/0x10 [ 450.318602] ? rcu_note_context_switch+0x730/0x730 [ 450.323550] ? graph_lock+0x170/0x170 [ 450.327370] ? _cond_resched+0x14/0x30 [ 450.331268] ? __getblk_gfp+0x10a/0xb10 [ 450.335256] ? __lock_is_held+0xb5/0x140 [ 450.339339] ? check_same_owner+0x340/0x340 [ 450.343701] ? graph_lock+0x170/0x170 [ 450.347516] ? rcu_note_context_switch+0x730/0x730 [ 450.352467] __should_failslab+0x124/0x180 [ 450.356716] should_failslab+0x9/0x14 [ 450.360532] kmem_cache_alloc+0x2af/0x760 [ 450.364697] ? ext4_get_group_desc+0x1cd/0x2d0 [ 450.369294] jbd2__journal_start+0x1e7/0xa80 [ 450.373696] ? jbd2_write_access_granted.part.8+0x430/0x430 [ 450.379395] ? rcu_note_context_switch+0x730/0x730 [ 450.384316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 450.389853] __ext4_journal_start_sb+0x182/0x600 [ 450.394597] ? __ext4_new_inode+0x3687/0x61a0 [ 450.399080] ? ext4_journal_abort_handle.isra.4+0x260/0x260 [ 450.404854] ? find_next_zero_bit+0x111/0x140 [ 450.409340] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 450.414344] ? find_inode_bit.isra.16+0x36f/0x510 [ 450.419175] __ext4_new_inode+0x3687/0x61a0 [ 450.423503] ? ext4_free_inode+0x1890/0x1890 [ 450.427919] ? kasan_check_read+0x11/0x20 [ 450.432158] ? rcu_is_watching+0x8c/0x150 [ 450.436290] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 450.440681] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 450.445079] ? is_bpf_text_address+0xd7/0x170 [ 450.449561] ? kernel_text_address+0x79/0xf0 [ 450.453955] ? __kernel_text_address+0xd/0x40 [ 450.458434] ? unwind_get_return_address+0x61/0xa0 [ 450.463349] ? __save_stack_trace+0x8d/0xf0 [ 450.467665] ? save_stack+0xa9/0xd0 [ 450.471279] ? save_stack+0x43/0xd0 [ 450.474891] ? __kasan_slab_free+0x11a/0x170 [ 450.480497] ? kasan_slab_free+0xe/0x10 [ 450.484465] ? kmem_cache_free+0x86/0x2d0 [ 450.488598] ? putname+0xf2/0x130 [ 450.492036] ? filename_create+0x2b2/0x5b0 [ 450.496254] ? do_mkdirat+0xda/0x310 [ 450.499952] ? __x64_sys_mkdir+0x5c/0x80 [ 450.504001] ? do_syscall_64+0x1b9/0x820 [ 450.508053] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 450.513405] ? kasan_check_read+0x11/0x20 [ 450.517535] ? do_raw_spin_unlock+0xa7/0x2f0 [ 450.521926] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 450.526492] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 450.532027] ? __dquot_initialize+0x61d/0xde0 [ 450.536507] ? graph_lock+0x170/0x170 [ 450.540295] ? trace_hardirqs_off+0xd/0x10 [ 450.544524] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 450.549622] ? dquot_get_next_dqblk+0x180/0x180 [ 450.554285] ? debug_check_no_obj_freed+0x30b/0x595 [ 450.559294] ? kasan_check_write+0x14/0x20 [ 450.563519] ? __lock_is_held+0xb5/0x140 [ 450.567569] ext4_mkdir+0x2e1/0xe60 [ 450.571203] ? ext4_init_dot_dotdot+0x510/0x510 [ 450.575859] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 450.581385] ? security_inode_permission+0xd2/0x100 [ 450.586387] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 450.591911] ? security_inode_mkdir+0xe8/0x120 [ 450.596480] vfs_mkdir+0x42e/0x6b0 [ 450.600015] do_mkdirat+0x27b/0x310 [ 450.603632] ? __ia32_sys_mknod+0xb0/0xb0 [ 450.607767] ? syscall_slow_exit_work+0x500/0x500 [ 450.612592] ? ksys_ioctl+0x81/0xd0 [ 450.616210] __x64_sys_mkdir+0x5c/0x80 [ 450.620102] do_syscall_64+0x1b9/0x820 [ 450.623972] ? finish_task_switch+0x1d3/0x870 [ 450.628457] ? syscall_return_slowpath+0x5e0/0x5e0 [ 450.633382] ? syscall_return_slowpath+0x31d/0x5e0 [ 450.638305] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 450.643654] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 450.648496] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 450.653669] RIP: 0033:0x454ef7 [ 450.656838] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 450.676066] RSP: 002b:00007f5205df1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 450.683760] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 0000000000454ef7 [ 450.691030] RDX: 0000000000000014 RSI: 00000000000001ff RDI: 0000000020000100 [ 450.698282] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 07:11:22 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 450.705545] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 450.712798] R13: 0000000000000001 R14: 00000000004d3c48 R15: 000000000000001a [ 450.720335] EXT4-fs error (device sda1) in __ext4_new_inode:930: Out of memory 07:11:23 executing program 3 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000608ff8)={0xfffffffffffffffe}, 0x0, 0x8) tkill(r0, 0x4000000000012) r1 = epoll_create1(0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, &(0x7f00009d2000), 0x8) 07:11:23 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:23 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xffff, 0x101000) recvfrom$inet6(r0, &(0x7f0000000140)=""/212, 0xd4, 0x100, &(0x7f0000000040)={0xa, 0x4e21, 0x7, @remote={0xfe, 0x80, [], 0xbb}, 0x10000}, 0x1c) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000000c0)=0x2, 0x4) readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:23 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x1) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=@random={'security.', 'security.capability\x00'}, &(0x7f0000000280)='security.capabimity\x00', 0xfffffffffffffe84, 0x1) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) personality(0x0) 07:11:23 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673fd", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:23 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 451.062732] FAULT_INJECTION: forcing a failure. [ 451.062732] name failslab, interval 1, probability 0, space 0, times 0 [ 451.074715] CPU: 1 PID: 30559 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 451.082114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 451.091473] Call Trace: [ 451.094078] dump_stack+0x1c9/0x2b4 [ 451.097731] ? dump_stack_print_info.cold.2+0x52/0x52 [ 451.103305] ? __lock_is_held+0xb5/0x140 [ 451.107381] ? find_held_lock+0x36/0x1c0 [ 451.111461] should_fail.cold.4+0xa/0x1a [ 451.115544] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 451.120666] ? rcu_note_context_switch+0x730/0x730 [ 451.125617] ? graph_lock+0x170/0x170 [ 451.129426] ? __brelse+0x104/0x180 [ 451.133067] ? block_commit_write+0x30/0x30 [ 451.137406] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 451.142957] ? __ext4_handle_dirty_metadata+0x1e8/0x590 [ 451.148343] ? __lock_is_held+0xb5/0x140 [ 451.152429] ? check_same_owner+0x340/0x340 [ 451.156769] ? rcu_note_context_switch+0x730/0x730 [ 451.161725] __should_failslab+0x124/0x180 [ 451.165972] should_failslab+0x9/0x14 [ 451.169777] __kmalloc+0x2c8/0x760 [ 451.173313] ? ext4_find_extent+0x775/0xa10 [ 451.177650] ext4_find_extent+0x775/0xa10 [ 451.181794] ext4_ext_map_blocks+0x293/0x62f0 [ 451.186279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 451.191808] ? graph_lock+0x170/0x170 [ 451.195602] ? ext4_mark_inode_dirty+0x24e/0xb50 [ 451.200352] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 451.205357] ? ext4_expand_extra_isize+0x5b0/0x5b0 [ 451.210278] ? find_held_lock+0x36/0x1c0 [ 451.214335] ? graph_lock+0x170/0x170 [ 451.218120] ? graph_lock+0x170/0x170 [ 451.221912] ? lock_downgrade+0x8f0/0x8f0 [ 451.226054] ? lock_acquire+0x1e4/0x540 [ 451.230020] ? ext4_map_blocks+0x480/0x1b60 [ 451.234346] ? lock_release+0xa30/0xa30 [ 451.238306] ? check_same_owner+0x340/0x340 [ 451.242627] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 451.248153] ? ext4_es_lookup_extent+0x465/0xde0 [ 451.252896] ? rcu_note_context_switch+0x730/0x730 [ 451.258467] ? down_read+0xb5/0x1d0 [ 451.262084] ? ext4_map_blocks+0x480/0x1b60 [ 451.266392] ? __down_interruptible+0x700/0x700 [ 451.271052] ? kernel_text_address+0x79/0xf0 [ 451.275460] ext4_map_blocks+0xe31/0x1b60 [ 451.279595] ? __save_stack_trace+0x8d/0xf0 [ 451.283909] ? ext4_issue_zeroout+0x190/0x190 [ 451.288392] ? save_stack+0x43/0xd0 [ 451.292028] ? __kasan_slab_free+0x11a/0x170 [ 451.296421] ? kasan_slab_free+0xe/0x10 [ 451.300383] ? kmem_cache_free+0x86/0x2d0 [ 451.304519] ext4_getblk+0x10e/0x630 [ 451.308222] ? ext4_iomap_begin+0x1350/0x1350 [ 451.312709] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 451.318245] ? __dquot_initialize+0x61d/0xde0 [ 451.322727] ext4_bread+0x95/0x2b0 [ 451.326257] ? ext4_getblk+0x630/0x630 [ 451.330738] ? dquot_get_next_dqblk+0x180/0x180 [ 451.335391] ? debug_check_no_obj_freed+0x30b/0x595 [ 451.340391] ? kasan_check_write+0x14/0x20 [ 451.344613] ext4_append+0x14e/0x370 [ 451.348327] ext4_mkdir+0x532/0xe60 [ 451.351943] ? ext4_init_dot_dotdot+0x510/0x510 [ 451.356601] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 451.362124] ? security_inode_permission+0xd2/0x100 [ 451.367132] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 451.372654] ? security_inode_mkdir+0xe8/0x120 [ 451.377229] vfs_mkdir+0x42e/0x6b0 [ 451.380773] do_mkdirat+0x27b/0x310 [ 451.384391] ? __ia32_sys_mknod+0xb0/0xb0 [ 451.388527] ? syscall_slow_exit_work+0x500/0x500 [ 451.393354] ? ksys_ioctl+0x81/0xd0 [ 451.396970] __x64_sys_mkdir+0x5c/0x80 [ 451.400846] do_syscall_64+0x1b9/0x820 [ 451.404722] ? finish_task_switch+0x1d3/0x870 [ 451.409216] ? syscall_return_slowpath+0x5e0/0x5e0 [ 451.414131] ? syscall_return_slowpath+0x31d/0x5e0 [ 451.419051] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 451.424417] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 451.429256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 451.434430] RIP: 0033:0x454ef7 [ 451.437601] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 451.456844] RSP: 002b:00007f5205df1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 451.464537] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 0000000000454ef7 [ 451.471801] RDX: 0000000000000014 RSI: 00000000000001ff RDI: 0000000020000100 [ 451.479057] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 451.486313] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 451.493569] R13: 0000000000000001 R14: 00000000004d3c48 R15: 000000000000001b 07:11:23 executing program 3 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:23 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:23 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) munmap(&(0x7f0000008000/0x1000)=nil, 0x1000) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0x3ff, 0x201, 0x4, 0xabe, 0x0}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={r1, @in6={{0xa, 0x4e23, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x8}}, 0x3, 0x9d6a, 0x5, 0x3, 0x40}, 0x98) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:24 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="62747266737f", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:24 executing program 1: r0 = socket(0xf, 0x10001000000003, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)=@getneightbl={0x14, 0x42, 0x0, 0x70bd27, 0x25dfdbfe, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1}, 0x0) [ 451.992318] FAULT_INJECTION: forcing a failure. [ 451.992318] name failslab, interval 1, probability 0, space 0, times 0 [ 452.003673] CPU: 1 PID: 30633 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 452.011041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 452.020402] Call Trace: [ 452.023002] dump_stack+0x1c9/0x2b4 [ 452.026660] ? dump_stack_print_info.cold.2+0x52/0x52 [ 452.031865] ? __lock_is_held+0xb5/0x140 [ 452.035948] should_fail.cold.4+0xa/0x1a 07:11:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="750200722e7365637500007a000000d922fa33683dd173300698e9d0b5ac6e30230ca052cc5fd4407d1993843c5864fd63e557967ac9f9aa565779a2e4aa123cc22e4f7d22208fb47b504670d73551101dba7cea64873d041d3690cf2b26fb4fe9207a32a9012880e138bd71e05e294b0bd7c29177c8522be4997a2f4d6a958c054dde7c0125dd961b911e21f68d7091954e416497affc223184"], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000340)={0xfe, {{0xa, 0x4e20, 0x1, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x2}}, {{0xa, 0x4e23, 0xe0000000000, @mcast2={0xff, 0x2, [], 0x1}, 0x44}}}, 0x108) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000200)=0x81000000) 07:11:24 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 452.040029] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 452.045147] ? check_same_owner+0x340/0x340 [ 452.049491] ? trace_hardirqs_on+0x10/0x10 [ 452.053749] ? rcu_note_context_switch+0x730/0x730 [ 452.059051] ? graph_lock+0x170/0x170 [ 452.062982] ? _cond_resched+0x14/0x30 [ 452.066889] ? __getblk_gfp+0x10a/0xb10 [ 452.070888] ? __lock_is_held+0xb5/0x140 [ 452.074976] ? check_same_owner+0x340/0x340 [ 452.079313] ? graph_lock+0x170/0x170 [ 452.083137] ? rcu_note_context_switch+0x730/0x730 [ 452.088086] __should_failslab+0x124/0x180 [ 452.092340] should_failslab+0x9/0x14 [ 452.096248] kmem_cache_alloc+0x2af/0x760 [ 452.100408] ? ext4_get_group_desc+0x1cd/0x2d0 [ 452.105011] jbd2__journal_start+0x1e7/0xa80 [ 452.109439] ? jbd2_write_access_granted.part.8+0x430/0x430 [ 452.115164] ? rcu_note_context_switch+0x730/0x730 [ 452.120122] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 452.125680] __ext4_journal_start_sb+0x182/0x600 [ 452.130452] ? __ext4_new_inode+0x3687/0x61a0 [ 452.134967] ? ext4_journal_abort_handle.isra.4+0x260/0x260 [ 452.140695] ? find_next_zero_bit+0x111/0x140 [ 452.145212] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 452.150243] ? find_inode_bit.isra.16+0x36f/0x510 [ 452.155108] __ext4_new_inode+0x3687/0x61a0 [ 452.159457] ? ext4_free_inode+0x1890/0x1890 [ 452.163875] ? kasan_check_read+0x11/0x20 [ 452.168032] ? rcu_is_watching+0x8c/0x150 [ 452.172188] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 452.176613] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 452.181032] ? is_bpf_text_address+0xd7/0x170 [ 452.185535] ? kernel_text_address+0x79/0xf0 07:11:24 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=[&(0x7f0000000040)="a3602498686d61707300", &(0x7f00000000c0)='numa_maps\x00', &(0x7f0000000140)='@eth1]\x00', &(0x7f0000000180)='$trusted@vboxnet0keyringproc#(&@eth0,:\x00'], &(0x7f00000002c0)=[&(0x7f0000000200)='numa_maps\x00', &(0x7f0000000240)='numa_maps\x00', &(0x7f0000000280)='trusted\x00']) [ 452.189951] ? __kernel_text_address+0xd/0x40 [ 452.194455] ? unwind_get_return_address+0x61/0xa0 [ 452.199397] ? __save_stack_trace+0x8d/0xf0 [ 452.203741] ? save_stack+0xa9/0xd0 [ 452.207377] ? save_stack+0x43/0xd0 [ 452.211017] ? __kasan_slab_free+0x11a/0x170 [ 452.215438] ? kasan_slab_free+0xe/0x10 [ 452.219444] ? kmem_cache_free+0x86/0x2d0 [ 452.223605] ? putname+0xf2/0x130 [ 452.227156] ? filename_create+0x2b2/0x5b0 [ 452.231406] ? do_mkdirat+0xda/0x310 [ 452.235134] ? __x64_sys_mkdir+0x5c/0x80 [ 452.239210] ? do_syscall_64+0x1b9/0x820 [ 452.243290] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 452.248668] ? kasan_check_read+0x11/0x20 [ 452.252829] ? do_raw_spin_unlock+0xa7/0x2f0 [ 452.257252] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 452.261847] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 452.267570] ? __dquot_initialize+0x61d/0xde0 [ 452.272084] ? graph_lock+0x170/0x170 [ 452.275895] ? trace_hardirqs_off+0xd/0x10 [ 452.280140] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 452.285256] ? dquot_get_next_dqblk+0x180/0x180 [ 452.289937] ? debug_check_no_obj_freed+0x30b/0x595 [ 452.294966] ? kasan_check_write+0x14/0x20 [ 452.299219] ? __lock_is_held+0xb5/0x140 [ 452.303294] ext4_mkdir+0x2e1/0xe60 [ 452.306943] ? ext4_init_dot_dotdot+0x510/0x510 [ 452.311632] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 452.317283] ? security_inode_permission+0xd2/0x100 [ 452.322318] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 452.327868] ? security_inode_mkdir+0xe8/0x120 [ 452.332465] vfs_mkdir+0x42e/0x6b0 [ 452.336021] do_mkdirat+0x27b/0x310 [ 452.339675] ? __ia32_sys_mknod+0xb0/0xb0 [ 452.343831] ? syscall_slow_exit_work+0x500/0x500 [ 452.348680] ? ksys_ioctl+0x81/0xd0 [ 452.352321] __x64_sys_mkdir+0x5c/0x80 [ 452.356219] do_syscall_64+0x1b9/0x820 [ 452.360112] ? finish_task_switch+0x1d3/0x870 [ 452.364624] ? syscall_return_slowpath+0x5e0/0x5e0 [ 452.369562] ? syscall_return_slowpath+0x31d/0x5e0 [ 452.374509] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 452.379886] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 452.384746] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 452.389935] RIP: 0033:0x454ef7 07:11:24 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000080)={0x1, 'gre0\x00', 0x3}, 0x18) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) fcntl$setstatus(r0, 0x4, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) [ 452.393142] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 452.412463] RSP: 002b:00007f5205df1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 452.420181] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 0000000000454ef7 [ 452.427452] RDX: 0000000000000014 RSI: 00000000000001ff RDI: 0000000020000100 [ 452.434709] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 452.441969] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 452.449222] R13: 0000000000000001 R14: 00000000004d3c48 R15: 000000000000001c [ 452.456881] EXT4-fs error (device sda1) in __ext4_new_inode:930: Out of memory 07:11:24 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000400)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000140)={'nat\x00', 0x0, 0x0, 0x90, [], 0x31d, &(0x7f0000000000), &(0x7f00000012c0)=""/4096}, &(0x7f0000001280)=0x108) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000000), &(0x7f0000000040)=0xc) 07:11:24 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:24 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x200, 0x200, 0x100000001}, &(0x7f0000000040)=0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x4, 0x7f, 0x0, 0x2, 0x8, r0}, 0x2c) readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:24 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:24 executing program 3 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:24 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 452.709519] kernel msg: ebtables bug: please report to author: Num_counters wrong 07:11:25 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x9, 0x545040) [ 452.800425] kernel msg: ebtables bug: please report to author: Num_counters wrong 07:11:25 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673fd", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:25 executing program 5: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000040)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)={'syz0'}, 0x4) 07:11:25 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:25 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 452.956332] FAULT_INJECTION: forcing a failure. [ 452.956332] name failslab, interval 1, probability 0, space 0, times 0 [ 452.968420] CPU: 0 PID: 30723 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 452.975798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 452.985254] Call Trace: [ 452.987856] dump_stack+0x1c9/0x2b4 [ 452.991504] ? dump_stack_print_info.cold.2+0x52/0x52 [ 452.996721] should_fail.cold.4+0xa/0x1a [ 453.000800] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 453.005920] ? trace_hardirqs_on+0x10/0x10 [ 453.010171] ? find_held_lock+0x36/0x1c0 [ 453.014256] ? lock_downgrade+0x8f0/0x8f0 [ 453.018421] ? kasan_check_read+0x11/0x20 [ 453.022576] ? rcu_is_watching+0x8c/0x150 [ 453.026731] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 453.031145] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 453.035566] ? graph_lock+0x170/0x170 [ 453.039404] ? kernel_text_address+0x79/0xf0 [ 453.043825] __should_failslab+0x124/0x180 [ 453.048077] should_failslab+0x9/0x14 [ 453.051892] kmem_cache_alloc+0x47/0x760 [ 453.055963] ? find_held_lock+0x36/0x1c0 [ 453.060080] ? __es_tree_search.isra.12+0x1ba/0x220 [ 453.065107] __es_insert_extent+0x305/0x1140 [ 453.069529] ? ext4_es_insert_extent+0x21c/0x7e0 [ 453.074294] ? ext4_es_free_extent+0x820/0x820 [ 453.078892] ? lock_release+0xa30/0xa30 [ 453.082886] ? __lock_is_held+0xb5/0x140 [ 453.086965] ? kasan_check_write+0x14/0x20 [ 453.091198] ? do_raw_write_lock+0xbd/0x1b0 [ 453.095508] ext4_es_insert_extent+0x2ea/0x7e0 [ 453.100079] ? ext4_es_find_delayed_extent_range+0xd80/0xd80 [ 453.105880] ? __lock_is_held+0xb5/0x140 [ 453.109942] ? rcu_read_lock_sched_held+0x108/0x120 [ 453.114945] ? __kmalloc+0x5f9/0x760 [ 453.118648] ext4_ext_put_gap_in_cache+0x158/0x1f0 [ 453.123564] ? ext4_zeroout_es+0x160/0x160 [ 453.127796] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 453.133336] ext4_ext_map_blocks+0x2453/0x62f0 [ 453.137919] ? graph_lock+0x170/0x170 [ 453.141706] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 453.146729] ? ext4_expand_extra_isize+0x5b0/0x5b0 [ 453.151668] ? find_held_lock+0x36/0x1c0 [ 453.155715] ? graph_lock+0x170/0x170 [ 453.159521] ? graph_lock+0x170/0x170 [ 453.163332] ? lock_downgrade+0x8f0/0x8f0 [ 453.167484] ? lock_acquire+0x1e4/0x540 [ 453.171463] ? ext4_map_blocks+0x480/0x1b60 [ 453.175783] ? lock_release+0xa30/0xa30 [ 453.179748] ? check_same_owner+0x340/0x340 [ 453.184056] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 453.189587] ? ext4_es_lookup_extent+0x465/0xde0 [ 453.194336] ? rcu_note_context_switch+0x730/0x730 [ 453.199267] ? down_read+0xb5/0x1d0 [ 453.202879] ? ext4_map_blocks+0x480/0x1b60 [ 453.207194] ? __down_interruptible+0x700/0x700 [ 453.211881] ? kernel_text_address+0x79/0xf0 [ 453.216299] ext4_map_blocks+0xe31/0x1b60 [ 453.220460] ? __save_stack_trace+0x8d/0xf0 [ 453.224857] ? ext4_issue_zeroout+0x190/0x190 [ 453.229351] ? save_stack+0x43/0xd0 [ 453.232968] ? __kasan_slab_free+0x11a/0x170 [ 453.237366] ? kasan_slab_free+0xe/0x10 [ 453.241351] ? kmem_cache_free+0x86/0x2d0 [ 453.245496] ext4_getblk+0x10e/0x630 [ 453.249223] ? ext4_iomap_begin+0x1350/0x1350 [ 453.253895] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 453.259422] ? __dquot_initialize+0x61d/0xde0 [ 453.263914] ext4_bread+0x95/0x2b0 [ 453.267452] ? ext4_getblk+0x630/0x630 [ 453.271331] ? dquot_get_next_dqblk+0x180/0x180 [ 453.275985] ? debug_check_no_obj_freed+0x30b/0x595 [ 453.280992] ? kasan_check_write+0x14/0x20 [ 453.285228] ext4_append+0x14e/0x370 [ 453.288945] ext4_mkdir+0x532/0xe60 [ 453.292569] ? ext4_init_dot_dotdot+0x510/0x510 [ 453.297236] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 453.302779] ? security_inode_permission+0xd2/0x100 [ 453.307793] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 453.313319] ? security_inode_mkdir+0xe8/0x120 [ 453.317889] vfs_mkdir+0x42e/0x6b0 [ 453.321420] do_mkdirat+0x27b/0x310 [ 453.325044] ? __ia32_sys_mknod+0xb0/0xb0 [ 453.329205] ? syscall_slow_exit_work+0x500/0x500 [ 453.334043] ? ksys_ioctl+0x81/0xd0 [ 453.337667] __x64_sys_mkdir+0x5c/0x80 [ 453.341548] do_syscall_64+0x1b9/0x820 [ 453.345425] ? finish_task_switch+0x1d3/0x870 [ 453.349908] ? syscall_return_slowpath+0x5e0/0x5e0 [ 453.354825] ? syscall_return_slowpath+0x31d/0x5e0 [ 453.359757] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 453.365113] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 453.369959] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 453.375163] RIP: 0033:0x454ef7 [ 453.378340] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 453.397575] RSP: 002b:00007f5205df1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 453.405274] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 0000000000454ef7 [ 453.412536] RDX: 0000000000000014 RSI: 00000000000001ff RDI: 0000000020000100 [ 453.419800] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 453.427732] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 453.435008] R13: 0000000000000001 R14: 00000000004d3c48 R15: 000000000000001d 07:11:25 executing program 3 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:25 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:25 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={@mcast1={0xff, 0x1, [], 0x1}, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @remote={0xfe, 0x80, [], 0xbb}, 0xfffffffffffffc01, 0xec09, 0x7, 0x500, 0x2, 0x80000000, r1}) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") creat(&(0x7f00000000c0)='./file0\x00', 0x0) socket$pppoe(0x18, 0x1, 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@known='security.evm\x00', &(0x7f00000007c0)='threaded\x00', 0x9, 0x1) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0x9) [ 453.755296] print_req_error: I/O error, dev loop6, sector 128 07:11:26 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x10000140) 07:11:26 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101800, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0x3, 0x1, 0x7ff, 0xfff, 0x401, 0x7, 0x401, 0x2, 0x4, 0x6, 0xbb8e}, 0xb) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x3, 0x0, 0x0, 0xffefffffffffffff}}) [ 453.860313] FAULT_INJECTION: forcing a failure. [ 453.860313] name failslab, interval 1, probability 0, space 0, times 0 [ 453.871676] CPU: 1 PID: 30784 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 453.879047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 453.888403] Call Trace: [ 453.891454] dump_stack+0x1c9/0x2b4 [ 453.895107] ? dump_stack_print_info.cold.2+0x52/0x52 [ 453.900311] ? lock_downgrade+0x8f0/0x8f0 [ 453.904475] ? inode_io_list_del_locked+0x3c0/0x3c0 [ 453.909512] should_fail.cold.4+0xa/0x1a [ 453.913588] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 453.918714] ? graph_lock+0x170/0x170 [ 453.922531] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 453.928082] ? __mark_inode_dirty+0x495/0x1550 [ 453.932676] ? __inode_attach_wb+0x1320/0x1320 [ 453.937273] ? kasan_check_read+0x11/0x20 [ 453.941433] ? __lock_is_held+0xb5/0x140 [ 453.945505] ? mlx4_DMA_wrapper+0x208/0x550 [ 453.949851] ? check_same_owner+0x340/0x340 [ 453.954186] ? __dquot_alloc_space+0x4b6/0x8c0 07:11:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:26 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="627472667397", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 453.958776] ? rcu_note_context_switch+0x730/0x730 [ 453.963716] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 453.968749] __should_failslab+0x124/0x180 [ 453.972999] should_failslab+0x9/0x14 [ 453.976811] kmem_cache_alloc+0x2af/0x760 [ 453.980973] ? percpu_counter_add_batch+0xf2/0x150 [ 453.985919] ext4_mb_new_blocks+0x778/0x4740 [ 453.990344] ? find_held_lock+0x36/0x1c0 [ 453.994430] ? ext4_discard_preallocations+0x13d0/0x13d0 [ 453.999902] ? kasan_check_read+0x11/0x20 [ 454.004062] ? rcu_is_watching+0x8c/0x150 [ 454.008223] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 454.012626] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 454.017034] ? is_bpf_text_address+0xd7/0x170 [ 454.021519] ? kernel_text_address+0x79/0xf0 [ 454.025915] ? __kernel_text_address+0xd/0x40 [ 454.030394] ? unwind_get_return_address+0x61/0xa0 [ 454.035320] ? __save_stack_trace+0x8d/0xf0 [ 454.039651] ? save_stack+0xa9/0xd0 [ 454.043279] ? save_stack+0x43/0xd0 [ 454.046898] ? kasan_kmalloc+0xc4/0xe0 [ 454.050788] ? __kmalloc+0x14e/0x760 [ 454.054489] ? ext4_find_extent+0x775/0xa10 [ 454.058795] ? ext4_ext_map_blocks+0x293/0x62f0 [ 454.063477] ? ext4_map_blocks+0x8f3/0x1b60 [ 454.067792] ? ext4_getblk+0x10e/0x630 [ 454.071671] ? ext4_bread+0x95/0x2b0 [ 454.075373] ? ext4_append+0x14e/0x370 [ 454.079247] ? ext4_mkdir+0x532/0xe60 [ 454.083042] ? vfs_mkdir+0x42e/0x6b0 [ 454.086759] ? do_mkdirat+0x27b/0x310 [ 454.090561] ? __x64_sys_mkdir+0x5c/0x80 [ 454.094608] ? do_syscall_64+0x1b9/0x820 [ 454.098656] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 454.104012] ? save_stack+0xa9/0xd0 [ 454.107634] ? print_usage_bug+0xc0/0xc0 [ 454.111680] ? graph_lock+0x170/0x170 [ 454.115466] ? __lock_is_held+0xb5/0x140 [ 454.119519] ? ext4_bread+0x95/0x2b0 [ 454.123227] ? kasan_check_read+0x11/0x20 [ 454.127374] ? __lock_is_held+0xb5/0x140 [ 454.131437] ? rcu_read_lock_sched_held+0x108/0x120 [ 454.136449] ? __kmalloc+0x5f9/0x760 [ 454.140157] ? ext4_find_extent+0x775/0xa10 [ 454.144469] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 454.150005] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 454.155546] ? ext4_inode_to_goal_block+0x2e3/0x3f0 [ 454.160561] ext4_ext_map_blocks+0x2dc0/0x62f0 [ 454.165151] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 454.170154] ? ext4_expand_extra_isize+0x5b0/0x5b0 [ 454.175079] ? find_held_lock+0x36/0x1c0 [ 454.179131] ? graph_lock+0x170/0x170 [ 454.182936] ? graph_lock+0x170/0x170 [ 454.186729] ? graph_lock+0x170/0x170 [ 454.190522] ? lock_downgrade+0x8f0/0x8f0 [ 454.194666] ? lock_acquire+0x1e4/0x540 [ 454.198625] ? ext4_map_blocks+0x88b/0x1b60 [ 454.202948] ? lock_release+0xa30/0xa30 [ 454.206927] ? check_same_owner+0x340/0x340 [ 454.211250] ? rcu_note_context_switch+0x730/0x730 [ 454.216171] ? down_write+0x8f/0x130 [ 454.219957] ? ext4_map_blocks+0x88b/0x1b60 [ 454.224262] ? down_read+0x1d0/0x1d0 [ 454.227966] ext4_map_blocks+0x8f3/0x1b60 [ 454.232109] ? __save_stack_trace+0x8d/0xf0 [ 454.236429] ? ext4_issue_zeroout+0x190/0x190 [ 454.240926] ? save_stack+0x43/0xd0 [ 454.244562] ? __kasan_slab_free+0x11a/0x170 [ 454.248963] ? kasan_slab_free+0xe/0x10 [ 454.252930] ? kmem_cache_free+0x86/0x2d0 [ 454.257072] ext4_getblk+0x10e/0x630 [ 454.260774] ? ext4_iomap_begin+0x1350/0x1350 [ 454.265270] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 454.270812] ? __dquot_initialize+0x61d/0xde0 [ 454.275296] ext4_bread+0x95/0x2b0 [ 454.278822] ? ext4_getblk+0x630/0x630 [ 454.282696] ? dquot_get_next_dqblk+0x180/0x180 [ 454.287360] ? debug_check_no_obj_freed+0x30b/0x595 [ 454.292362] ? kasan_check_write+0x14/0x20 [ 454.296599] ext4_append+0x14e/0x370 [ 454.300321] ext4_mkdir+0x532/0xe60 [ 454.303960] ? ext4_init_dot_dotdot+0x510/0x510 [ 454.308623] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 454.314148] ? security_inode_permission+0xd2/0x100 [ 454.319159] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 454.324684] ? security_inode_mkdir+0xe8/0x120 [ 454.329253] vfs_mkdir+0x42e/0x6b0 [ 454.332791] do_mkdirat+0x27b/0x310 [ 454.336430] ? __ia32_sys_mknod+0xb0/0xb0 [ 454.340577] ? syscall_slow_exit_work+0x500/0x500 [ 454.345407] ? ksys_ioctl+0x81/0xd0 [ 454.349033] __x64_sys_mkdir+0x5c/0x80 [ 454.352919] do_syscall_64+0x1b9/0x820 [ 454.356797] ? finish_task_switch+0x1d3/0x870 [ 454.361283] ? syscall_return_slowpath+0x5e0/0x5e0 [ 454.366211] ? syscall_return_slowpath+0x31d/0x5e0 [ 454.371153] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 454.376512] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 454.381347] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 454.386536] RIP: 0033:0x454ef7 [ 454.389711] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 454.409000] RSP: 002b:00007f5205df1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 454.416723] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 0000000000454ef7 [ 454.424076] RDX: 0000000000000014 RSI: 00000000000001ff RDI: 0000000020000100 [ 454.431342] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 454.438609] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 454.445872] R13: 0000000000000001 R14: 00000000004d3c48 R15: 000000000000001e 07:11:26 executing program 3 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:26 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:26 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="627472667306", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:26 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x5, 0x0) faccessat(r1, &(0x7f00000000c0)='./file0\x00', 0x80, 0x400) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000100)=@sack_info={0x0, 0x6, 0xb}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r3, 0x2}, 0x8) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r2, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:27 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)="8000000000460000f990f70ba16508e93f4a444b7dcfa6362d69821c6cdb26e3290f586c7bc2740300000000000000e6d8e2d428a861c697e1d3b900d8c20107989ba5ddc9c750e20676360ad9b74ab21ac406ddd36cd4e67b27f2b512d28e198f9df3936201c2ce0025f5e6f061d95a06cf40560fb6cd1878abb52b971d457ca92279573b4a496345ec50f275c25500000000000000000000000000") fcntl$getflags(r1, 0x1) readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x100000ef) 07:11:27 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000100)=0x0) io_getevents(r2, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000000)={0x77359400}) close(r1) socket$key(0xf, 0x3, 0x2) r3 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xff, 0x10000) connect$bt_sco(r3, &(0x7f00000000c0)={0x1f, {0x5f46, 0x200, 0x5, 0x8, 0x2, 0xffffffffffff3c27}}, 0x8) io_submit(r2, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0xf000000}]) 07:11:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 454.850483] FAULT_INJECTION: forcing a failure. [ 454.850483] name failslab, interval 1, probability 0, space 0, times 0 [ 454.862011] CPU: 0 PID: 30847 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 454.869385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 454.878744] Call Trace: [ 454.881348] dump_stack+0x1c9/0x2b4 [ 454.885002] ? dump_stack_print_info.cold.2+0x52/0x52 [ 454.890214] ? lock_downgrade+0x8f0/0x8f0 [ 454.894379] ? inode_io_list_del_locked+0x3c0/0x3c0 07:11:27 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 454.899421] should_fail.cold.4+0xa/0x1a [ 454.903503] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 454.908627] ? graph_lock+0x170/0x170 [ 454.912441] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 454.917993] ? __mark_inode_dirty+0x495/0x1550 [ 454.922581] ? __inode_attach_wb+0x1320/0x1320 [ 454.927174] ? kasan_check_read+0x11/0x20 [ 454.931335] ? __lock_is_held+0xb5/0x140 [ 454.935414] ? check_same_owner+0x340/0x340 [ 454.939738] ? __dquot_alloc_space+0x4b6/0x8c0 [ 454.944332] ? rcu_note_context_switch+0x730/0x730 [ 454.949269] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 454.954300] __should_failslab+0x124/0x180 [ 454.958554] should_failslab+0x9/0x14 [ 454.962369] kmem_cache_alloc+0x2af/0x760 [ 454.966533] ? percpu_counter_add_batch+0xf2/0x150 [ 454.971486] ext4_mb_new_blocks+0x778/0x4740 [ 454.975912] ? find_held_lock+0x36/0x1c0 [ 454.979997] ? ext4_discard_preallocations+0x13d0/0x13d0 [ 454.985464] ? kasan_check_read+0x11/0x20 [ 454.989637] ? rcu_is_watching+0x8c/0x150 [ 454.993786] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 454.998193] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 455.002611] ? is_bpf_text_address+0xd7/0x170 [ 455.007125] ? kernel_text_address+0x79/0xf0 [ 455.011624] ? __kernel_text_address+0xd/0x40 [ 455.016107] ? unwind_get_return_address+0x61/0xa0 [ 455.021034] ? __save_stack_trace+0x8d/0xf0 [ 455.025360] ? save_stack+0xa9/0xd0 [ 455.029084] ? save_stack+0x43/0xd0 [ 455.032723] ? kasan_kmalloc+0xc4/0xe0 [ 455.036606] ? __kmalloc+0x14e/0x760 [ 455.040316] ? ext4_find_extent+0x775/0xa10 [ 455.044627] ? ext4_ext_map_blocks+0x293/0x62f0 [ 455.049282] ? ext4_map_blocks+0x8f3/0x1b60 [ 455.053599] ? ext4_getblk+0x10e/0x630 [ 455.057468] ? ext4_bread+0x95/0x2b0 [ 455.061172] ? ext4_append+0x14e/0x370 [ 455.065053] ? ext4_mkdir+0x532/0xe60 [ 455.068850] ? vfs_mkdir+0x42e/0x6b0 [ 455.072555] ? do_mkdirat+0x27b/0x310 [ 455.076339] ? __x64_sys_mkdir+0x5c/0x80 [ 455.080396] ? do_syscall_64+0x1b9/0x820 [ 455.084449] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 455.089817] ? save_stack+0xa9/0xd0 [ 455.093460] ? print_usage_bug+0xc0/0xc0 [ 455.097517] ? graph_lock+0x170/0x170 [ 455.101311] ? __lock_is_held+0xb5/0x140 [ 455.105366] ? ext4_bread+0x95/0x2b0 [ 455.109171] ? kasan_check_read+0x11/0x20 [ 455.113328] ? __lock_is_held+0xb5/0x140 [ 455.117401] ? rcu_read_lock_sched_held+0x108/0x120 [ 455.122423] ? __kmalloc+0x5f9/0x760 [ 455.126134] ? ext4_find_extent+0x775/0xa10 [ 455.130455] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 455.135979] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 455.141516] ? ext4_inode_to_goal_block+0x2e3/0x3f0 [ 455.146538] ext4_ext_map_blocks+0x2dc0/0x62f0 [ 455.151118] ? ext4_find_delalloc_cluster+0xc0/0xc0 [ 455.156121] ? ext4_expand_extra_isize+0x5b0/0x5b0 [ 455.161051] ? find_held_lock+0x36/0x1c0 [ 455.165116] ? graph_lock+0x170/0x170 [ 455.168921] ? graph_lock+0x170/0x170 [ 455.172731] ? graph_lock+0x170/0x170 [ 455.176519] ? lock_downgrade+0x8f0/0x8f0 [ 455.180668] ? lock_acquire+0x1e4/0x540 [ 455.184644] ? ext4_map_blocks+0x88b/0x1b60 [ 455.188976] ? lock_release+0xa30/0xa30 [ 455.192939] ? check_same_owner+0x340/0x340 [ 455.197258] ? rcu_note_context_switch+0x730/0x730 [ 455.202197] ? down_write+0x8f/0x130 [ 455.205902] ? ext4_map_blocks+0x88b/0x1b60 [ 455.210386] ? down_read+0x1d0/0x1d0 [ 455.214092] ext4_map_blocks+0x8f3/0x1b60 [ 455.218243] ? __save_stack_trace+0x8d/0xf0 [ 455.222581] ? ext4_issue_zeroout+0x190/0x190 [ 455.227086] ? save_stack+0x43/0xd0 [ 455.230701] ? __kasan_slab_free+0x11a/0x170 [ 455.235094] ? kasan_slab_free+0xe/0x10 [ 455.239070] ? kmem_cache_free+0x86/0x2d0 [ 455.243217] ext4_getblk+0x10e/0x630 [ 455.246921] ? ext4_iomap_begin+0x1350/0x1350 [ 455.251405] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 455.256943] ? __dquot_initialize+0x61d/0xde0 [ 455.261442] ext4_bread+0x95/0x2b0 [ 455.264969] ? ext4_getblk+0x630/0x630 [ 455.268846] ? dquot_get_next_dqblk+0x180/0x180 [ 455.273508] ? debug_check_no_obj_freed+0x30b/0x595 [ 455.278510] ? kasan_check_write+0x14/0x20 [ 455.282732] ext4_append+0x14e/0x370 [ 455.286447] ext4_mkdir+0x532/0xe60 [ 455.290083] ? ext4_init_dot_dotdot+0x510/0x510 [ 455.294752] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 455.300283] ? security_inode_permission+0xd2/0x100 [ 455.305296] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 455.310925] ? security_inode_mkdir+0xe8/0x120 [ 455.315505] vfs_mkdir+0x42e/0x6b0 [ 455.319044] do_mkdirat+0x27b/0x310 [ 455.322668] ? __ia32_sys_mknod+0xb0/0xb0 [ 455.326826] ? ksys_ioctl+0x81/0xd0 [ 455.330443] __x64_sys_mkdir+0x5c/0x80 [ 455.334325] do_syscall_64+0x1b9/0x820 [ 455.338206] ? syscall_slow_exit_work+0x500/0x500 [ 455.343048] ? syscall_return_slowpath+0x5e0/0x5e0 [ 455.347975] ? syscall_return_slowpath+0x31d/0x5e0 [ 455.352892] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 455.358248] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 455.363095] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 455.368288] RIP: 0033:0x454ef7 [ 455.371468] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 455.390702] RSP: 002b:00007f5205df1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 07:11:27 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 455.398429] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 0000000000454ef7 [ 455.405681] RDX: 0000000000000014 RSI: 00000000000001ff RDI: 0000000020000100 [ 455.413026] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 455.420285] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 455.427958] R13: 0000000000000001 R14: 00000000004d3c48 R15: 000000000000001f 07:11:27 executing program 3 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:27 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="627472667310", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:27 executing program 2: ioperm(0x6, 0x401, 0x831) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) [ 455.668205] print_req_error: I/O error, dev loop0, sector 128 07:11:27 executing program 5: unlink(&(0x7f0000000000)='./bus\x00') r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x2) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:27 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="0200a5ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x8, 0x5}, &(0x7f00000003c0)=0x0) timer_settime(r0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}}, &(0x7f0000000180)) openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x30000, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x200000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000400)={0x1, 0x0, {0x3, 0x0, 0x1, 0x1, 0x7ff}}) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f0000000300)=0x4) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000001c0)={0x0, 0x70}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000280)={r2, 0x100000000}, &(0x7f00000002c0)=0x8) ioctl$KVM_GET_MP_STATE(0xffffffffffffffff, 0x8004ae98, &(0x7f0000000380)) 07:11:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 455.805902] FAULT_INJECTION: forcing a failure. [ 455.805902] name failslab, interval 1, probability 0, space 0, times 0 [ 455.817321] CPU: 0 PID: 30905 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 455.824696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 455.834057] Call Trace: [ 455.836658] dump_stack+0x1c9/0x2b4 [ 455.840298] ? dump_stack_print_info.cold.2+0x52/0x52 [ 455.845507] ? __lock_acquire+0x7fc/0x5020 [ 455.849744] ? do_raw_spin_unlock+0xa7/0x2f0 [ 455.854150] should_fail.cold.4+0xa/0x1a [ 455.858211] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 455.863302] ? trace_hardirqs_on+0x10/0x10 [ 455.867524] ? debug_check_no_obj_freed+0x30b/0x595 [ 455.872534] ? __lock_is_held+0xb5/0x140 [ 455.876592] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 455.882121] ? ext4_ext_map_blocks+0xfb2/0x62f0 [ 455.886805] __should_failslab+0x124/0x180 [ 455.891037] should_failslab+0x9/0x14 [ 455.894824] kmem_cache_alloc+0x47/0x760 [ 455.898877] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 455.903889] ? ext4_es_can_be_merged+0x238/0x2a0 [ 455.908632] __es_insert_extent+0x305/0x1140 [ 455.913037] ? ext4_es_free_extent+0x820/0x820 [ 455.917616] ? lock_release+0xa30/0xa30 [ 455.921577] ? __lock_is_held+0xb5/0x140 [ 455.925637] ? kasan_check_write+0x14/0x20 [ 455.929858] ? do_raw_write_lock+0xbd/0x1b0 [ 455.934177] ext4_es_insert_extent+0x2ea/0x7e0 [ 455.938746] ? lock_release+0xa30/0xa30 [ 455.942712] ? ext4_es_find_delayed_extent_range+0xd80/0xd80 [ 455.948492] ? rcu_note_context_switch+0x730/0x730 [ 455.953428] ? down_write+0x8f/0x130 [ 455.957126] ? ext4_map_blocks+0x88b/0x1b60 [ 455.961443] ? down_read+0x1d0/0x1d0 [ 455.965148] ext4_map_blocks+0xb08/0x1b60 [ 455.969283] ? __save_stack_trace+0x8d/0xf0 [ 455.973593] ? ext4_issue_zeroout+0x190/0x190 [ 455.978085] ? save_stack+0x43/0xd0 [ 455.981707] ? __kasan_slab_free+0x11a/0x170 [ 455.986101] ? kasan_slab_free+0xe/0x10 [ 455.990069] ? kmem_cache_free+0x86/0x2d0 [ 455.994205] ext4_getblk+0x10e/0x630 [ 455.997910] ? ext4_iomap_begin+0x1350/0x1350 [ 456.002392] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 456.007916] ? __dquot_initialize+0x61d/0xde0 [ 456.012400] ext4_bread+0x95/0x2b0 [ 456.015940] ? ext4_getblk+0x630/0x630 [ 456.019813] ? dquot_get_next_dqblk+0x180/0x180 [ 456.024465] ? debug_check_no_obj_freed+0x30b/0x595 [ 456.029463] ? kasan_check_write+0x14/0x20 [ 456.033684] ext4_append+0x14e/0x370 [ 456.037387] ext4_mkdir+0x532/0xe60 [ 456.041009] ? ext4_init_dot_dotdot+0x510/0x510 [ 456.045670] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 456.051196] ? security_inode_permission+0xd2/0x100 [ 456.056205] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 456.061729] ? security_inode_mkdir+0xe8/0x120 [ 456.066299] vfs_mkdir+0x42e/0x6b0 [ 456.069925] do_mkdirat+0x27b/0x310 [ 456.073626] ? __ia32_sys_mknod+0xb0/0xb0 [ 456.077771] ? ksys_ioctl+0x81/0xd0 [ 456.081389] __x64_sys_mkdir+0x5c/0x80 [ 456.085273] do_syscall_64+0x1b9/0x820 [ 456.089146] ? finish_task_switch+0x1d3/0x870 [ 456.093637] ? syscall_return_slowpath+0x5e0/0x5e0 [ 456.098560] ? syscall_return_slowpath+0x31d/0x5e0 [ 456.103479] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 456.108840] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 456.113681] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 456.118854] RIP: 0033:0x454ef7 [ 456.122027] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 456.141248] RSP: 002b:00007f5205df1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 456.148952] RAX: ffffffffffffffda RBX: 0000000020000168 RCX: 0000000000454ef7 07:11:28 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 456.156551] RDX: 0000000000000014 RSI: 00000000000001ff RDI: 0000000020000100 [ 456.163806] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 456.171085] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000014 [ 456.178338] R13: 0000000000000001 R14: 00000000004d3c48 R15: 0000000000000020 07:11:28 executing program 3 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:28 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 456.288685] loop1: p1 [ 456.291396] loop1: partition table partially beyond EOD, truncated [ 456.298836] loop1: p1 start 1 is beyond EOD, truncated 07:11:28 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="792e6391b0e36a0f2f45ee226561786162736c69747900040000000000000000000000"], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) [ 456.351475] loop1: p1 [ 456.354097] loop1: partition table partially beyond EOD, truncated [ 456.362345] loop1: p1 start 1 is beyond EOD, truncated 07:11:28 executing program 1: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r0 = socket(0x11, 0x80002, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x81, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0xc5) memfd_create(&(0x7f0000000000)=',keyring\x00', 0x2) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000100)={0x0, 0x5dbe}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={r1, 0x0, 0x3, 0x81}, 0x10) close(r0) 07:11:28 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') modify_ldt$read_default(0x2, &(0x7f0000000340)=""/4096, 0x1000) readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:28 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:28 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 456.720406] FAULT_INJECTION: forcing a failure. [ 456.720406] name failslab, interval 1, probability 0, space 0, times 0 [ 456.731840] CPU: 0 PID: 30984 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 456.739209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 456.748565] Call Trace: [ 456.751170] dump_stack+0x1c9/0x2b4 [ 456.754813] ? dump_stack_print_info.cold.2+0x52/0x52 [ 456.760029] should_fail.cold.4+0xa/0x1a [ 456.764108] ? fault_create_debugfs_attr+0x1f0/0x1f0 07:11:29 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000080)={0x3a, @dev={0xac, 0x14, 0x14, 0x10}, 0x4e20, 0x1, 'nq\x00', 0x19, 0x81, 0x16}, 0x2c) 07:11:29 executing program 1: r0 = inotify_init1(0x0) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0', [{0x20, 'security'}, {0x20, '/dev/dsp\x00'}], 0xa, "2da3034ab9f72f894c71e249a3eea977db6f85bf82831dafb98faa402dc4d5fabf41046538cf20a74cf8203487bb3351e540aff70f052aabb33eba52036ee735e6f3374cf5720f315e5ad9f5cd4306579c759ade719acde70440862bf206fdb5ee3fe4f8b6a486957390236c3fc595537a5cd7a8c8bb0730554accb8a31f889ccc437df1c0f3a365eb9b5bc123aae7969f60d7066d13519820904a530e32ed01c00a7edec47af112798257ee8e38d04fe5bfc51a4240472dd4d56538aac1288bb91edc4c39610779abe0a147c51e27c7506db294457b76a6db39cac8ddbfb731a083ff7565502ef9f0ba273fbac8f1eec6bb0fd2f20dba186a3cc307e7f31f531e0ea245c18cbba82c6d7200ca8aa885566bfd901eb1705868dacc8352952dacf765b41dd16fdc87a9c84691908e2f24ad09af87f876b3cc45296b10c1f7461c9c1cc8beefc9c8f6e5b4daf6b3a23a4d38f74d3739d7729bdbea41d8e6610e7274fe6fbe43cc2b9213a45253d3e9e37fb71f04d2d6fb699a2f623c131381ecd3a988ed65872163ef615aa772de084b2986b102a5a288de059ddc4d3dbc06692b0bee946275d59b0c7054539408d04280a32adc0e28cb765f1c4b77412d8620c95688f9052d1cf353f842727bcd1614a91ac85ba93cded66a224b968d1ef4eb0f9f9d42b047157979759491dcc036870c38ac653b077fdda05631787984ce608562d742796c20b37dd6dd1de431ba08fc238f42e325c108cd1319fbe4d67051d14c07335710505004e570f4a5d1231aec2e132485ad4b8e010e8a633590cf09b707de68b436f6a2c046d54144c7eb5c27871eb6fe7ea4ffa264ccde59a588c267f03c42072f6860be0cbd34e5c68fd9eae2fabef142617be521bde57f17a9e3a2c0bb853ca2f6a2b5925096c3cf47d2d1145980fd6bb1cd172e1badabe1c63d321dbdfdf817b1b93d5f76d21b81c35e05a1a5cd05fd42bda04cf77f469a058531bf872392b3ae60eaef3fb8b607c2da9a262e30c2c1344d499dc5fb169b56b3e1ec97b91b9de044c2067d0db938058b8b7077a3afc398ae9a0ac0e7a00fae384716b68a29b5f9915723ad2006b2551d454528f185b9b44d88523b15c8a65a45c21bffdc7c442c3ab4aeb560c102fd38a23fff9b78d286f62b3daf39d2648854ba702d898ad6dc457fbc35c91dfe82bdcf7316b05bc1f00e0cfc09dc2837e73f7a352a64788a394c2b10d7cda8e34e0d19d2eecc60b9a0c0c999d840867bf43bd04f97178f611ee925ad684f760d47cd91ac6f427db356c2e7dffe6058ba15636eeddd186fc733a7b3cb0812604d1b13752a6bf537cf8a4d9527a14eb87d8f35d203106411d228d5d0459e4b532f7e853c50c35af98d1c49904c2b52cb37f39684221493b7e32424afa34538d91ee6803a93ee3d5ba37ce5e19e54bbc9c0a130967904d918855fa41eee5d54ef70512fdb72f3c5b2f42c58aea29aee4d8dd21f74cd3f2d1ea2ad0746cac5b6e3dfba03608a76a9195a1b975cff44437fb6ee0cd73f82afe38e4c006bbfce8bfa09ec958c67d5699109b47c9bb034af4eec5e0720a6b5901c7c756de5ea1aee0ee240e3620a770d8939930760440cbba319351f59210645dcb109a4a63a8d7e12aa95e069e4741cc5dbef20f8af109ee04516ffd56f15247874561609bd20432743173dea8da4db9614c6d60c80aa61b7e8108303b26c72259f304859525b871547577918cdc102a6724e0df78e2a1d62fc132145f8d600fcf030d2dce0e3ef22120ac4aadda311ff69b03b52ca51f1199f5b189df891e6550d5db94558716f3c8d1ea6d23c470ad65a4200f1156ea4eff5f582ee6396857861551648ee5b51f60f686c45a2fe01ef52eff6a50cc5db523a939ceff7449147f99edd9dda0cfe7b84417a7d4fe231737b3ce60b2ba76f9ba94133ac43f2fe1e8a9b0b9f48d03b61a30aa44d48973b4ad0cafec021ffe394682803fe62e7f452b67447b516a5cdbea051d75f58bd7f1763a735e1557460e39afe5050976dfef3a1206fdc2d792e9c6203e672ec2071e669826313129a487b0e83927214f21c66cf61f1e6e34d534505f52955f17fcd2bc560f9e13293e2020a8327c9afe45164c55c73bb5fdda12baac9a4cdb53a53b453b218b2da403ba9377679b287f613d8321064075bddb13e34b2d14208eec8b5df5af2e1e7a729eccbc3f1aae3a158dcff3013458f60c1d36d7a32d3b2bd901395abe66374412689e9a6ec8f5936b6e513779e9aeb449ffa38bacd30de35a035c3df807cf195d6bf1db5d7f48228fbb7d3205bd4688096dfecd81da69f08a5f34be249ae3a371ec933c37f728c76b5ddf8d811c885d8e3c24e6c888e750c004e6d4dd147fa5a2484adad2916e108a00d636413f5b0e16e69cf308bb82500ff08a71ebb1f11ddc81bfb6a238c287c3ded5bd6684d2d01a82bbcf2e59cea227c56f9d7c135f29ff06c7a254f4a5c375c7e356a06336fb1a58c97eaec0c3dccaa2c54e55423cbfdbee642aa9e14e2dab3c70a69bbd6d21e687fc075610656638c279f081de4b1bd959a4fb8b684af7b1368e527b4453c6ebc714345dbbf6be547cb2a0c27a170adc3bde68ec02aa9b2ba80446887c64663633993ae50ca326b351f964ec969ebdc5e3e565157c5c1c48aae937d25d8ed60d264dec387143b8dfe56f9d31170430d6f8cd56fc6803c25800749612a37098b2d2d31a00822718d6508cdef7d1d8e612a1d56eb5b80d30754faed4beaac54f8d5a8c5272b78f9137b1b4a4a6f3e9c1f7c17ab03dcceaa241f89a3b2be04f04d3e6c269fb76c2463c60db75997894d11951153bff14884de7433cb418cd8dbc05e91bd5185a708db4fbf256a4c5ca7cf94408be83a837a3cbf4b4dc3c2829cfa9a20e9281d8a3454c01c4a6d7cce701b99770253e775f973c95c8890ef003104039b90780ea8037ca7d9c9df09e6d81e71c7f46b0e8ba3bc4a0d279ec8867f11d86e878b5c7665fd660d335c1a6207820d9baf0c61d8c045446830fa5625479d1a92f1279460b38a7a6a08855e0c7f174d9d27d06d6ab59369fd860d19a0d104e0dd070843783ecc3815b22fc59f78301417d31e2f6259277278806c8968622d5c63d7231b3ab5733c17d96dc8dc412bb8f35e9d1bada0f4ca4f3ca51ed8bf33ff68efc8a97cd650176a6ced61f83b0e16722fa51243e2da41bfe6c8221d6230d4e47ddc4e6654852de2809c898633ff440b3fe66866afa8e9b324385ffd3d1638647016a060847944666a09e3d35f6416958a0db5460772411cf3b2baaacf19465669e8efd29875cac3334ac6e1a022717dc1dfc36adf5ffbdc43d01378977eab09b1e1774c574ee99ef27bc194843df71a1826a03f5019c47177ef32ed806f01cd101113b73b4c6ce3714dde07e2dc386a4ba7ab43dcc7f26091bdca9b7b3c8891e3028fd950fd5e940aadae8a4e94c2c76cc733ed2bf94d7c7e3af60c02db69a8c624e862cd8f4609c749d57545c06cb2b42fe9ddfe4021cf95ff45b53d138f97b6e5b1563a9f4ac4224d1661e52fbfd4d8b649e6a1575860cc97256b84693c481237c883d148e20eae63e6b17f8c4e2acfd95c216da87f1a2d6b48dd7f09a80a336a5f617a2bc433fd9377fc1cb92ee4684de44b84a302e819280dd3209ed13c354179d9a9ce7ff8758a3c07bb652a9a165b3074b10ca89504bf23a1a2feb42ecf4687cb452e1f2147902cbb472cbe36f1ec65f28816993761b5fe5e8e1e5ee14336b1d59310350edef3bea3081ae70420f8860c2b05a9f573604e100ce577c8e25950afc083a0bc409aa3a3baed037dfcf18d33969a0a8533d2342e9b27034953c83e98ea920780d9989cfd8e0f7619b427fda9a811f777031e6f1d1360535dda48909d6779aa2a55f30bc4cd8ab1b667245067eaa49cd0d13ceee766c60cc6dc1b2f88b3da6c0b9091369e9b98801067429921aa44c1627a38cc49dedbef264eeb131295aac05987f5478a0937fc06a84f17ff55447a00d81b6c372f1c221dac11c9bb9c9b0d6ed57a2149e2371000e247855cb3eb8d66c198a79e389049a87664c185f9deef29328e4656a0e70af31537ad36742ee2435aa78d69d280912f4c924ce96bcc7d044044885dc3a4b3e9eef87cb847d42c29c1999e8ebc4e7051ec10ca1f82f5c8dc3f3942ee327e6338a8a6c32f0ebb5fe48c53133b2165f6b45e743de5818039fd01f566b86b93411b6ff3088eb1ae037f6f0c851d6d90dd872bc8df39f514f469c4e12551f94cca9e05858b6c645ad93ce7208e8701561b95b9f7fea1644839a77e80c63c7b288d798e0f085a820057ea45869e3879054047354fa466b0f14d89ac50ae110a4b8da45537c91253b67a5659cdab849e98cfb3ec5aa6529ea0099d4dee7d5166eef0fad4f6f86b12f4fcda05fae6a5b21e802337aacb56a496f93bcaa849262b86ba1981d3852f2e79f81d947a6bc55f49f13d5d749927623862dfd7d2a3aa230064f97c31ddd08c6eb4962c4e18a9fb94e1e92b67d12686c7cda2b4fea15af3e7e986ac1d857b2c2b8acd9c62dbe4ede6ad337f2f72095e2ddca774b80f5a68df9be8a0c466c5fc1bb79ab2ff53f5d6ca74855220c89b9fe7bde2732daf8e375494fe7fb1d50a3f9f0968c912f132377114adf755354bf0051619d78bc3487404d31886472a943b6ece6c79b2ae62637e72e041cda8f2ec8a803083e1832c48f01ff56e32f84c77a86850a71c6dc1715da867ece6d4318bfde1cf496491790f504f36d73cc190f63b70dbda3cd6e41873b5cd16037eab457fff8c6c3c98813e332ee766d1cc769a66f9747497f128021bac080495e61ad9efd38013dc0574fd5b4f9a8d7574ee6bdc383bfb4309d2c6451d110b45ec7a6c9add8a114e97fae00c94c331b0c48411142d8f3b5b9dd9ea3c8f60eb6ea37f5a1b55bc5be3b87ccbf7d9c36b2c66e6374071374e0122e1dbf90ee87bedadd292791ff8df3b5d179a8ab3637dced90f70cc107e7c11bc6cdda8a6810f49d15700077c49a10b0124b19baabd53bb85430750e9a26deac6e4ae6bb9328dc42cab15746cd061e06b1af5a59ae1d44a5c5aa1f009f03c09fff1bd25784abd4d6cee616c112d32cd6d670e3cfcaded7853398c653ac8efd8ec93cf2be5092dd6dd25d930e2ef5ba078510ca5ed44dd1f5d01ab9c6a44130a7412877e7a63370b387c68e8efa5c422a8fc738fbf0240cea739d153452c4dbe61a40dcc0e3bf433c7138e757a8629789570c1b740f20703b1ff6e6975e284f8f34a196130cc6efc07691a0b50f7378582c85fa5551033719ed1f95238ea37c7a817c5bd3537380453c91f9a204809f2ab45e140f28a1959be3a4047104c46f7e459ac7b74decb4ff45fd73e6fc47c1d6caf53c62e529e94c5fd838ad419ab7df0ee0a5ecf29edc6c4e471e4f75d5b7c452ec349545af6f48928c7cc0f1ed0b5d542e56a2aec029ce5fb415ed37c1eec9736455123f7fc9258ab8e6bd4da402400a5d822e9f40322c3433ea27f1153b2206097a2436c50586b1994a89d5ba20a03dcd07f862e1285124a8b2ccded269737bd03a674e9963058b025d13897c132e41a591bf6abe815ff3337b2238f91df3770f45c03e678b5c3be4eff5054c2005dade3778456f586aef67e6df6e11f1d79327e4749979d3a73a1cf137fc48e29ad84e30cae5aa61a8b77c1cdd34bc63d3ba6731457c2acacf3bfa657d51b8c12c4718aff51fdd006d32ad51dd2229adef2c566403fa58e8fd306"}, 0x101e) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000001080)='/dev/audio\x00', 0x180, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f00000010c0)=""/252) ptrace$setopts(0x4206, r1, 0x0, 0x0) tgkill(r1, r1, 0x21) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x501000, 0x0) ptrace$setopts(0x4200, r1, 0x0, 0x0) 07:11:29 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673fd", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 456.769222] ? graph_lock+0x170/0x170 [ 456.773038] ? graph_lock+0x170/0x170 [ 456.776868] ? find_held_lock+0x36/0x1c0 [ 456.780956] ? check_same_owner+0x340/0x340 [ 456.785298] ? rcu_note_context_switch+0x730/0x730 [ 456.790244] __should_failslab+0x124/0x180 [ 456.794491] should_failslab+0x9/0x14 [ 456.798305] __kmalloc_track_caller+0x2c4/0x760 [ 456.802979] ? strncpy_from_user+0x510/0x510 [ 456.807390] ? strndup_user+0x77/0xd0 [ 456.811205] memdup_user+0x2c/0xa0 [ 456.814761] strndup_user+0x77/0xd0 [ 456.818399] ksys_mount+0x3c/0x140 [ 456.821949] __x64_sys_mount+0xbe/0x150 [ 456.825934] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 456.830963] do_syscall_64+0x1b9/0x820 [ 456.834859] ? finish_task_switch+0x1d3/0x870 [ 456.839365] ? syscall_return_slowpath+0x5e0/0x5e0 [ 456.844307] ? syscall_return_slowpath+0x31d/0x5e0 [ 456.849251] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 456.854796] ? retint_user+0x18/0x18 [ 456.858525] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 456.863388] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 456.868575] RIP: 0033:0x4584ea [ 456.871744] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 456.890949] RSP: 002b:00007f5205df1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 456.898659] RAX: ffffffffffffffda RBX: 00007f5205df1b30 RCX: 00000000004584ea [ 456.905926] RDX: 00007f5205df1ad0 RSI: 0000000020000100 RDI: 00007f5205df1af0 [ 456.913183] RBP: 0000000020000100 R08: 00007f5205df1b30 R09: 00007f5205df1ad0 07:11:29 executing program 3 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 456.920437] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 456.927704] R13: 0000000000000000 R14: 00000000004d3c48 R15: 0000000000000021 07:11:29 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x2, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) socketpair$inet6(0xa, 0x2, 0x1, &(0x7f0000000080)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000002c0)) ioctl$KVM_GET_MP_STATE(r2, 0x8004ae98, &(0x7f0000000040)) [ 457.219699] print_req_error: I/O error, dev loop6, sector 128 [ 457.320852] FAULT_INJECTION: forcing a failure. [ 457.320852] name failslab, interval 1, probability 0, space 0, times 0 [ 457.332252] CPU: 1 PID: 31035 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 457.339619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 457.348981] Call Trace: [ 457.351584] dump_stack+0x1c9/0x2b4 [ 457.355231] ? dump_stack_print_info.cold.2+0x52/0x52 [ 457.360452] should_fail.cold.4+0xa/0x1a [ 457.364531] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 457.369643] ? kasan_kmalloc+0xc4/0xe0 [ 457.373532] ? __kmalloc_track_caller+0x14a/0x760 [ 457.378383] ? memdup_user+0x2c/0xa0 [ 457.382091] ? strndup_user+0x77/0xd0 [ 457.385896] ? graph_lock+0x170/0x170 [ 457.389694] ? find_held_lock+0x36/0x1c0 [ 457.393846] ? check_same_owner+0x340/0x340 [ 457.398157] ? lock_release+0xa30/0xa30 [ 457.402121] ? check_same_owner+0x340/0x340 [ 457.406437] ? rcu_note_context_switch+0x730/0x730 [ 457.411362] ? __check_object_size+0x9d/0x5f2 [ 457.415848] __should_failslab+0x124/0x180 [ 457.420072] should_failslab+0x9/0x14 [ 457.423870] kmem_cache_alloc_trace+0x2cb/0x780 [ 457.428546] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 457.434100] ? _copy_from_user+0xdf/0x150 [ 457.438256] copy_mount_options+0x5f/0x380 [ 457.442507] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 457.448038] ksys_mount+0xd0/0x140 [ 457.451566] __x64_sys_mount+0xbe/0x150 [ 457.455630] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 457.460647] do_syscall_64+0x1b9/0x820 [ 457.464533] ? finish_task_switch+0x1d3/0x870 [ 457.469025] ? syscall_return_slowpath+0x5e0/0x5e0 [ 457.473963] ? syscall_return_slowpath+0x31d/0x5e0 [ 457.478882] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 457.484416] ? retint_user+0x18/0x18 [ 457.488124] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 457.492968] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 457.498143] RIP: 0033:0x4584ea [ 457.501324] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 07:11:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:29 executing program 5: unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r0, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:29 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:29 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0xffffffff, 0x10000) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f00000001c0)=""/126, &(0x7f0000000140)=0x7e) readv(r0, &(0x7f0000000240)=[{&(0x7f0000000340)=""/222, 0xde}], 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x7, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r2, &(0x7f0000000100)='threaded\x00', 0x9) [ 457.520555] RSP: 002b:00007f5205df1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 457.528259] RAX: ffffffffffffffda RBX: 00007f5205df1b30 RCX: 00000000004584ea [ 457.535526] RDX: 00007f5205df1ad0 RSI: 0000000020000100 RDI: 00007f5205df1af0 [ 457.542800] RBP: 0000000020000100 R08: 00007f5205df1b30 R09: 00007f5205df1ad0 [ 457.550055] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 457.557308] R13: 0000000000000000 R14: 00000000004d3c48 R15: 0000000000000022 07:11:29 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:29 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:30 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) fcntl$setlease(r0, 0x400, 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") mknod(&(0x7f0000000080)='./file0\x00', 0xc000, 0xfffffff8) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x4, 0x4, 0x2000000, 0x4, 0x3, 0x3e, 0x1, 0x1c2, 0x40, 0x383, 0x3, 0x6, 0x38, 0x1, 0x3f, 0xffffffff, 0x59}, [{0x6, 0xc000000000000000, 0x1, 0x79c, 0x8, 0x65e, 0x1, 0xfffffffffffffffb}], "0176eb9cdc7c7cf4263dc3c0112260918078fc1ba727c06daa306ce88a1ab87af0ff866836c5396f6d", [[]]}, 0x1a1) renameat2(r1, &(0x7f0000000100)='./file0/file0\x00', r0, &(0x7f0000000140)='./file0\x00', 0x3) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) 07:11:30 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:30 executing program 3 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:30 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="627472667303", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:30 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r3) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000001fe8)={0xfffffffc, 0xffffffffffffffff}) r5 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r5, 0x1, &(0x7f0000000040)={{0x0, r3, r4, r3, r4, 0x124, 0x4}, 0x1, 0x2, 0x4, 0x800, 0x7, 0x1, r2, r2}) setpriority(0x1, 0x0, 0x0) 07:11:30 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="757365722e736563070026e55e13000000000000706162696c69747900fadf0faf2ba36f0263501408628c99d6676aca60f745c3dca702544d44449ea820cfb2fdf2cede5a65b065d7fcafbd"], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0xfc47) 07:11:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfst', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:30 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f00000000c0)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0xfffffffffffffffd, 0x5, 0x3}) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000040)={0xfffffffffffffffb}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/mcfilter\x00') tee(r0, r0, 0x2, 0x5) readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:30 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 458.254019] FAULT_INJECTION: forcing a failure. [ 458.254019] name failslab, interval 1, probability 0, space 0, times 0 [ 458.265382] CPU: 0 PID: 31132 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 458.272752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 458.282271] Call Trace: [ 458.284877] dump_stack+0x1c9/0x2b4 [ 458.288504] ? dump_stack_print_info.cold.2+0x52/0x52 [ 458.293691] ? find_held_lock+0x36/0x1c0 [ 458.297755] should_fail.cold.4+0xa/0x1a [ 458.301823] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 458.306920] ? kasan_check_read+0x11/0x20 [ 458.311053] ? rcu_is_watching+0x8c/0x150 [ 458.315185] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 458.319584] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 458.323987] ? find_held_lock+0x36/0x1c0 [ 458.328049] ? check_same_owner+0x340/0x340 [ 458.332354] ? rcu_note_context_switch+0x730/0x730 [ 458.337276] ? save_stack+0xa9/0xd0 [ 458.340891] __should_failslab+0x124/0x180 [ 458.345121] should_failslab+0x9/0x14 [ 458.348913] kmem_cache_alloc+0x2af/0x760 [ 458.353055] getname_flags+0xd0/0x5a0 [ 458.356844] user_path_at_empty+0x2d/0x50 [ 458.360986] do_mount+0x17a/0x30e0 [ 458.364516] ? copy_mount_string+0x40/0x40 [ 458.368739] ? rcu_pm_notify+0xc0/0xc0 [ 458.372637] ? copy_mount_options+0x5f/0x380 [ 458.377033] ? rcu_read_lock_sched_held+0x108/0x120 [ 458.382041] ? kmem_cache_alloc_trace+0x616/0x780 [ 458.386879] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 458.392411] ? _copy_from_user+0xdf/0x150 [ 458.396550] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 458.402076] ? copy_mount_options+0x285/0x380 [ 458.406561] ksys_mount+0x12d/0x140 [ 458.410180] __x64_sys_mount+0xbe/0x150 [ 458.414154] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 458.419163] do_syscall_64+0x1b9/0x820 [ 458.423038] ? finish_task_switch+0x1d3/0x870 [ 458.427525] ? syscall_return_slowpath+0x5e0/0x5e0 [ 458.432456] ? syscall_return_slowpath+0x31d/0x5e0 [ 458.437385] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 458.442924] ? retint_user+0x18/0x18 [ 458.446628] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 458.451461] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 458.456641] RIP: 0033:0x4584ea [ 458.459812] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 458.479051] RSP: 002b:00007f5205df1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 458.486748] RAX: ffffffffffffffda RBX: 00007f5205df1b30 RCX: 00000000004584ea [ 458.494021] RDX: 00007f5205df1ad0 RSI: 0000000020000100 RDI: 00007f5205df1af0 [ 458.501284] RBP: 0000000020000100 R08: 00007f5205df1b30 R09: 00007f5205df1ad0 [ 458.508545] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 458.515806] R13: 0000000000000000 R14: 00000000004d3c48 R15: 0000000000000023 07:11:30 executing program 3 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:30 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:31 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = gettid() r2 = syz_open_procfs(r1, &(0x7f0000000100)='net/rpc\x00') socketpair$unix(0x1, 0x8000000002, 0x0, &(0x7f0000d12000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000000)=@abs, 0x2d) recvmmsg(r4, &(0x7f00000035c0)=[{{&(0x7f0000003440)=@can, 0x80, &(0x7f00000034c0), 0x0, &(0x7f0000003500)=""/192, 0xc0}}], 0x1, 0x0, &(0x7f00000037c0)) sendmmsg$unix(r4, &(0x7f00000bd000), 0xfffffffffffffdc3, 0x0) poll(&(0x7f0000000080)=[{r4, 0x600}], 0x1, 0x0) read(r3, &(0x7f0000000240)=""/226, 0xe2) readv(r2, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:31 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:31 executing program 2: r0 = socket$inet6(0xa, 0x5, 0xff) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x2000, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x80000000, {0x2, 0x4e22, @rand_addr=0x9}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x4, 0x4ac91e5f, 0x4, 0x1d4420b9, 0x81, 0x0, 0x8, 0x2, 0x1000}) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0xfe65) 07:11:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:31 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f00000000c0)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0xfffffffffffffffd, 0x5, 0x3}) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000040)={0xfffffffffffffffb}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/mcfilter\x00') tee(r0, r0, 0x2, 0x5) readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:31 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 458.994181] FAULT_INJECTION: forcing a failure. [ 458.994181] name failslab, interval 1, probability 0, space 0, times 0 [ 459.005577] CPU: 1 PID: 31203 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 459.012953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 459.022324] Call Trace: [ 459.024929] dump_stack+0x1c9/0x2b4 [ 459.028583] ? dump_stack_print_info.cold.2+0x52/0x52 [ 459.033805] should_fail.cold.4+0xa/0x1a [ 459.037890] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 459.043015] ? kasan_kmalloc+0xc4/0xe0 [ 459.046919] ? __kmalloc_track_caller+0x14a/0x760 [ 459.051774] ? memdup_user+0x2c/0xa0 [ 459.055520] ? strndup_user+0x77/0xd0 [ 459.059335] ? graph_lock+0x170/0x170 [ 459.063162] ? find_held_lock+0x36/0x1c0 [ 459.067257] ? check_same_owner+0x340/0x340 [ 459.071599] ? lock_release+0xa30/0xa30 [ 459.075588] ? check_same_owner+0x340/0x340 [ 459.079922] ? rcu_note_context_switch+0x730/0x730 [ 459.084864] ? __check_object_size+0x9d/0x5f2 [ 459.089380] __should_failslab+0x124/0x180 07:11:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 459.093630] should_failslab+0x9/0x14 [ 459.097447] kmem_cache_alloc_trace+0x2cb/0x780 [ 459.102137] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 459.107691] ? _copy_from_user+0xdf/0x150 [ 459.111859] copy_mount_options+0x5f/0x380 [ 459.116108] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 459.121664] ksys_mount+0xd0/0x140 [ 459.125211] __x64_sys_mount+0xbe/0x150 [ 459.129185] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 459.134197] do_syscall_64+0x1b9/0x820 [ 459.138081] ? syscall_return_slowpath+0x5e0/0x5e0 [ 459.143004] ? syscall_return_slowpath+0x31d/0x5e0 [ 459.147933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 459.153462] ? retint_user+0x18/0x18 [ 459.157167] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 459.162002] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 459.167184] RIP: 0033:0x4584ea [ 459.170364] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 459.189590] RSP: 002b:00007f5205df1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 459.197475] RAX: ffffffffffffffda RBX: 00007f5205df1b30 RCX: 00000000004584ea [ 459.204725] RDX: 00007f5205df1ad0 RSI: 0000000020000100 RDI: 00007f5205df1af0 [ 459.212498] RBP: 0000000020000100 R08: 00007f5205df1b30 R09: 00007f5205df1ad0 [ 459.219753] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 459.227029] R13: 0000000000000000 R14: 00000000004d3c48 R15: 0000000000000024 07:11:31 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:31 executing program 3 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:31 executing program 2: r0 = socket$inet6(0xa, 0x1000000000000, 0x3) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000100)='-#+\x00', 0xa1, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r1, 0x4008af14, &(0x7f0000000080)={0x3, 0xb79}) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) [ 459.562898] print_req_error: I/O error, dev loop0, sector 128 07:11:31 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x0, 0x40040) flistxattr(r1, &(0x7f0000000480)=""/94, 0x5e) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f0000000280)) syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000300)='./file1\x00', 0xffffffffffffff50, 0x1, &(0x7f0000000400)=[{&(0x7f0000000340)="d5b6db8abfb944e637252014a30eee284d545dcb06fa200a28e1497382504cf574bf823420ddfe9422828628cbf15801810641944b00561a8e280b26970dada295f8ee11c4fc0530a3e256fc41f35a8b5f130d7250c27ff7a57bbe791c1b593fa81ccc96452b24380ac23e601a5d4c2805df0764b3330be73e8779eb417799f7af3b849437175a6dfa89ac3a0d3e71c706ca6ee3882360f3d630530f10abcd03746c", 0xa2, 0x6}], 0x8400, &(0x7f0000000540)={[{@umask={'umask', 0x3d, 0xfff}, 0x2c}, {@dmask={'dmask', 0x3d, 0x392e92a6}, 0x2c}]}) syz_mount_image$reiserfs(&(0x7f0000000080)='reiserfs\x00', &(0x7f0000000100)='./file0\x00', 0x3fffffffffffffc, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="00080000ec0500006d8a2b001200000000010000b90200000001000284811f4ce10077a1907aaae6313400000010ec0302e5fb00526549734572334673", 0x3d, 0x10000}], 0x0, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000440)={0x0, 0xab}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000005c0)={r2, 0x4b9, 0x4}, 0x8) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000500)=0x6) writev(r0, &(0x7f0000000440), 0x0) 07:11:31 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 459.684781] FAULT_INJECTION: forcing a failure. [ 459.684781] name failslab, interval 1, probability 0, space 0, times 0 [ 459.696134] CPU: 1 PID: 31266 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 459.703509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 459.712873] Call Trace: [ 459.715488] dump_stack+0x1c9/0x2b4 [ 459.719134] ? dump_stack_print_info.cold.2+0x52/0x52 [ 459.724337] ? find_held_lock+0x36/0x1c0 [ 459.728428] should_fail.cold.4+0xa/0x1a [ 459.732505] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 459.737627] ? kasan_check_read+0x11/0x20 [ 459.741786] ? rcu_is_watching+0x8c/0x150 [ 459.746038] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 459.750455] ? rcu_report_qs_rnp+0x7a0/0x7a0 [ 459.754876] ? find_held_lock+0x36/0x1c0 [ 459.758974] ? check_same_owner+0x340/0x340 [ 459.763304] ? rcu_note_context_switch+0x730/0x730 [ 459.768235] ? save_stack+0xa9/0xd0 [ 459.771862] __should_failslab+0x124/0x180 [ 459.776102] should_failslab+0x9/0x14 [ 459.779900] kmem_cache_alloc+0x2af/0x760 [ 459.786390] ? find_held_lock+0x36/0x1c0 [ 459.790452] getname_flags+0xd0/0x5a0 [ 459.794263] user_path_at_empty+0x2d/0x50 [ 459.798404] do_mount+0x17a/0x30e0 [ 459.801935] ? do_raw_spin_unlock+0xa7/0x2f0 [ 459.806446] ? copy_mount_string+0x40/0x40 [ 459.810668] ? rcu_pm_notify+0xc0/0xc0 [ 459.814555] ? copy_mount_options+0x5f/0x380 [ 459.818953] ? rcu_read_lock_sched_held+0x108/0x120 [ 459.823957] ? kmem_cache_alloc_trace+0x616/0x780 [ 459.828806] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 459.834339] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 459.839866] ? copy_mount_options+0x285/0x380 [ 459.844357] ksys_mount+0x12d/0x140 [ 459.847978] __x64_sys_mount+0xbe/0x150 [ 459.851947] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 459.856955] do_syscall_64+0x1b9/0x820 [ 459.860834] ? syscall_return_slowpath+0x5e0/0x5e0 [ 459.865752] ? syscall_return_slowpath+0x31d/0x5e0 [ 459.870673] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 459.876211] ? retint_user+0x18/0x18 [ 459.879922] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 459.884760] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 459.889938] RIP: 0033:0x4584ea [ 459.893115] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 459.912447] RSP: 002b:00007f5205df1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 459.920154] RAX: ffffffffffffffda RBX: 00007f5205df1b30 RCX: 00000000004584ea [ 459.927411] RDX: 00007f5205df1ad0 RSI: 0000000020000100 RDI: 00007f5205df1af0 07:11:32 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="627472667303", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 459.934668] RBP: 0000000020000100 R08: 00007f5205df1b30 R09: 00007f5205df1ad0 [ 459.941932] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000014 [ 459.949188] R13: 0000000000000000 R14: 00000000004d3c48 R15: 0000000000000025 [ 460.041556] print_req_error: I/O error, dev loop0, sector 128 [ 460.143387] ntfs: (device loop1): parse_options(): Unrecognized mount option . [ 460.223233] print_req_error: I/O error, dev loop6, sector 128 07:11:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:32 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) write$binfmt_elf32(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x6b, 0x10000, 0x1, 0x2, 0x7, 0x9, 0x3e3, 0x38, 0x34c, 0x80, 0x80000001, 0x20, 0x1, 0x3, 0x7, 0x3}, [{0x6, 0x8, 0xffff, 0x1, 0x6, 0x7fffffff, 0x7e, 0xfffffffffffffff9}, {0x6, 0x0, 0x5f, 0x3ff, 0x8, 0x3f, 0x40, 0xe53b}], "28c30b1457e8b5f4dc05611c41cfa7e25e7eefc7114d8f5a92e95941d8842ad145336b04f69c3f46fdd2c9a0b7d7932d8717633e452ab844d46191b13d06c974fcec6d69d73b3b40954b1e9e89645f699b66c752ae8adef730f9cb2e17a7379d06afb6f5bda32a", [[], []]}, 0x2df) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x10000, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:32 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:32 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)="5f6d6170731303000000") readv(r2, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) ioctl$sock_inet_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000000)) 07:11:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 460.355254] REISERFS warning (device loop1): reiserfs_fill_super: Cannot allocate commit workqueue 07:11:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:32 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:32 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:32 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) r2 = accept$alg(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='9p\x00', 0xa40003, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@afid={'afid', 0x3d, 0x5}, 0x2c}, {@fscache='fscache', 0x2c}, {@noextend='noextend', 0x2c}]}}) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) accept4(r0, &(0x7f0000000100)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x80, 0x800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'syz_tun\x00', r3}) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:32 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000000340)=""/4096, 0xfffffffffffffc8c}], 0x1344) 07:11:32 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btr.s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:33 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000009000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./bus\x00', 0x0, 0x18}, 0x10) connect$unix(r1, &(0x7f0000000140)=@file={0x1, './bus\x00'}, 0x6e) readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:33 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:33 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x34, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)={0xaa}) r2 = socket$vsock_stream(0x28, 0x1, 0x0) signalfd4(r2, &(0x7f0000000340)={0x9c50}, 0x8, 0x80000) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x6c4b, 0x4000) ioctl$KVM_SET_CLOCK(r3, 0x4030ae7b, &(0x7f0000000200)={0x8, 0x2b23}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r5 = socket$can_bcm(0x1d, 0x2, 0x2) r6 = gettid() r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x2a0480, 0x0) kcmp$KCMP_EPOLL_TFD(r4, r6, 0x7, r0, &(0x7f0000000180)={r7, r0, 0xccd8}) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r8, 0x0, 0x4, &(0x7f0000013ff4)={@local={0xac, 0x14, 0x14, 0xaa}, @rand_addr, @multicast2=0xe0000002}, 0xc) setsockopt$SO_TIMESTAMPING(r8, 0x1, 0x12, &(0x7f0000000000)=0x1000000, 0x4) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000040)=@fragment={0x87, 0x0, 0x6, 0x100000001, 0x0, 0x1, 0x64}, 0x8) setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000380)='tls\x00', 0x4) r9 = dup3(r1, r1, 0x80000) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000440)={0x9, 0x108, 0xfa00, {r10, 0x4, "81523a", "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"}}, 0x110) ioctl$PIO_CMAP(r9, 0x4b71, &(0x7f00000000c0)={0xfffffffffffffff8, 0xff, 0x1, 0xffe0000000000000, 0x5, 0x6}) close(r8) r11 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r11, 0x8912, &(0x7f0000000080)="025cc83d6d345f8f762070") write(r5, &(0x7f0000000240)="7dfa556cb213b474057fe85c57ab5b7eb176338da8fe70bd8bc89fdbf1998e4934793cc73bd9a7a26accff291733af98571945d0b4a212ab2ebaab0fbda9d506ef723352b419fd8b02fd09714934b10ba8251fdd56233e70306adb515b2437ba0f973966090c6d629518b3a495729ffff0d0819ef1c287bbd56fc254fe3d6a719ac4e7c874a3dcd466a6b19f7cbf71231dd43dc5b49be3026af4dbb983a5182f0b19af593cc500258df05d12e52b84c7d88a9c21b9c774856613dc57bb4eb783bbb25fc7e8993409abb0c53fab0c33538a8aaa3d7d07d6e5ee09eee106c38b8a9718f850923bfbe51d74b8fdfb6e5f1acb4dc37a27", 0xffffffffffffff4e) dup3(r0, r1, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000002, 0x20010, r5, 0x0) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000011000/0x1000)=nil) 07:11:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8910, &(0x7f0000000100)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYRES16=r1, @ANYRESOCT=r0, @ANYRES32=r1], &(0x7f0000000080)="0000000002", 0x7, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f0000000180)='threaded\x00', 0xffffffffffffffd0) 07:11:33 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsz', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btr/s\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:33 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 461.213104] print_req_error: I/O error, dev loop0, sector 128 07:11:33 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="757365724673656375728c74792e63a96e100b866170616269"], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:33 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000000)={&(0x7f000000b000/0x3000)=nil, 0x3000}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x8, 0x7ff}, &(0x7f0000000140)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000180)={r1, 0x9}, &(0x7f00000001c0)=0x8) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) connect$vsock_dgram(r2, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @any=0xffffffff}, 0x10) 07:11:33 executing program 1: capset(&(0x7f0000000040)={0x20071026}, &(0x7f0000000080)) r0 = socket(0x10, 0x3, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f00000000c0)={0x9, 0x40}) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@ipv4_newroute={0x1c, 0x18, 0x1, 0x0, 0x0, {0x2}}, 0x1c}, 0x1}, 0x0) 07:11:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="627472667397", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:33 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfl\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:33 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:33 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") getpid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) getpid() fcntl$getownex(r0, 0x10, &(0x7f0000000040)) getpid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)) getpgid(0x0) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)) r1 = getpgrp(0xffffffffffffffff) r2 = getpgrp(r1) getpriority(0x0, r2) 07:11:33 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) getsockname$unix(r1, &(0x7f0000000100)=@abs, &(0x7f0000000080)=0x6e) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e21, @loopback=0x7f000001}}, [0x0, 0x7, 0x3f, 0x2, 0x1, 0x6, 0x58f, 0x6, 0x0, 0x2, 0x6, 0x0, 0x401, 0x3]}, &(0x7f00000001c0)=0x100) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000440)={r2, @in6={{0xa, 0x4e24, 0x6c8, @remote={0xfe, 0x80, [], 0xbb}, 0x80000001}}}, &(0x7f0000000200)=0x84) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673fd", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:34 executing program 5: pipe2(&(0x7f0000000040), 0x80800) r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, &(0x7f0000000140)="293daa5707dd7424917f388d8ad965b6fbbb22e13683ab4e5aa90452133845a8bd00ba789894f4fe77ee015236ce2253e815768d696c1826db25ef7bc30501fa782592eaa7b457dae868d969039869497e953b7fefb2a4f6499677c2cfabfec430c26f6052d91988ba38aa7a8a9c32164d17214402f8b59cd5784d6e19f047206b2ad1845c8631b850c5bdb6a5b454328de48649cd3806b78a3d4f8e05da68b123f0847aed2cf8", &(0x7f0000000200)=""/211}, 0x18) mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:34 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:34 executing program 1: setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000740)={'raw\x00', 0x3, [{}, {}, {}]}, 0x58) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) 07:11:34 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:34 executing program 2: r0 = socket$inet6(0xa, 0x3000080000002, 0xfffffffffffffffd) ioctl(r0, 0x8912, &(0x7f0000000100)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="757365722e7365630000000000000001706162696c6974790085aa59858e82fdf9ae873a607ddacab6f04d895b48980a9ad1d702b50e5cd6d98cb0f9f2e1a9a7cb7b25ab98d8191f54f39d4eaa4b94d39f25c5efd79a737eab5b8c17154fd5b87f3998fe2380ac37120180089f6a15e6a638bd579629358c8a9481e2bea64e37637f487fd35408de"], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfo\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:34 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:34 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@rand_addr}}, &(0x7f0000000040)=0xe8) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r0, &(0x7f0000000340)={0x90, 0x0, 0x3, {0x0, 0x1, 0x2, 0x9, 0x32ad4504, 0x9, {0x2, 0x3, 0x6, 0xec93, 0x0, 0x10001, 0x6, 0x4, 0x1, 0x8, 0x9, r1, r2, 0x7, 0x401}}}, 0x90) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000400)={'filter\x00'}, &(0x7f00000000c0)=0x54) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000006000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x10, 0x5, &(0x7f0000006000)=@framed={{0x18}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x10}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0x1000, &(0x7f0000008000)=""/4096}, 0x48) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x40000, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000140)=0x14) recvfrom$packet(r0, &(0x7f00000000c0)=""/16, 0x10, 0x3, &(0x7f0000000180)={0x11, 0x1f, r1, 0x1, 0x4, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) 07:11:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsL', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:34 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="757365322e73658d6c71f13b8db883f3a1722d637572697479"], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) pread64(r0, &(0x7f0000000340)=""/228, 0xe4, 0x0) 07:11:34 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 462.366499] print_req_error: I/O error, dev loop0, sector 128 07:11:34 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsl', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfx\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:34 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000280)={0x80, 0xffffffff, 0xffffffffdffff59b, 0x10003, 0xc47}, 0xffffffffffffff44) unlink(&(0x7f0000000000)='./bus\x00') ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000140)=""/220) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) 07:11:34 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x200000000003e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x1f, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000500)=ANY=[]) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, "7175657565b00000000000000000000002000000000000002400000000000000000000000007000000000000003f00f114ba94e0e7040025af95951b86aa6500"}) syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x200) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x404c534a, &(0x7f00000001c0)={0x0, 0x0, 0x0, "718b6575653100000000000000000000000000000000000000000700000000000000000000e900"}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000080)) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000180)=[@in={0x2, 0x4e23, @broadcast=0xffffffff}, @in={0x2, 0x4e21}, @in={0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e23, @multicast1=0xe0000001}], 0x40) 07:11:35 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673c0", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:35 executing program 2: r0 = socket$inet6(0xa, 0x80009, 0x4) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000940)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000900)={&(0x7f0000000840)={0x90, r2, 0x300, 0x70bd2d, 0x25dfdbfc, {0x2}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffff}, @IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7e5fdc68}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast=0xffffffff}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}]}, 0x90}, 0x1, 0x0, 0x0, 0x8004}, 0x40000) timer_create(0x7, &(0x7f0000000100)={0x0, 0x0, 0x4, @thr={&(0x7f0000000080)="9f64f4b2e476ce0c6a8598ac3cae2b80ee1d92a4203798af3fda8345c6147806f6354d8c13c4ccd61f10", &(0x7f0000000340)="cd0fae3e4d8afa180323fbaeee34d3310a42f6d33e0d265dbe68757a677b5f67ccaa445a1ef47e7431b638063f830f553e9cad2f13d004f8bf0273ecf8a5738aceb13c8489227cf8308d2363955b71536f2c496da87af130c067a6e762bb1f2e3a46f97d739c133f03516961070570ae732a08ea3fd51aaad7440caeab7a73dbded6fc7338b5be92d491aa003afbc36661b5fa8d3d0df27edaf62adf66bba516b0d1b70984f0b7c33f2c888ffb1a6da5e8b0024eb2822eb4bb04e90878fd7c45bf21590e2f4fba649ddcd1a06437c8e482829cfdabfc400531beab941297602a3f9fbbcf81527e"}}, &(0x7f0000000140)=0x0) timer_getoverrun(r3) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x480102, 0x0) accept$nfc_llcp(r4, &(0x7f0000000200), &(0x7f0000000440)=0x60) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f0000000740)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x8008000}, 0xc, &(0x7f0000000700)={&(0x7f00000005c0)={0x110, r5, 0x0, 0x70bd2a, 0x25dfdbfe, {0xa}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4f}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x77}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_team\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote={0xfe, 0x80, [], 0xbb}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'erspan0\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x46}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0x110}, 0x1}, 0x4000000) r6 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="757365722e73656375726974792e6361706162696c69747900438627a1cf9bfc01a42a5e8e307d14d47e7e7c1b8e0ac10008f4c4b87fe24dea7274150299c84a850f110e4107cf7a4f43a0105b110b4ef884099f80fdeaa0ac1ab773cb1e23a7cb5bd97dbfcba37b21f6020a9fc819030700000000080008001e52baf2318f75311cde6e66500800000000"], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r6, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrf+\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:35 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 462.948720] ALSA: seq fatal error: cannot create timer (-22) 07:11:35 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$P9_RCREATE(r0, &(0x7f00000000c0)={0x18, 0x73, 0x2, {{0x10, 0x1, 0x5}, 0x2}}, 0x18) unlink(&(0x7f0000000080)='./bus\x00') write$P9_RWALK(r0, &(0x7f0000000140)={0x30, 0x6f, 0x2, {0x3, [{0x40, 0x1, 0x7}, {0x0, 0x4, 0x6}, {0x41, 0x3, 0x5}]}}, 0xffffffffffffff1f) getpeername$inet6(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, @local}, &(0x7f0000000040)=0x1c) mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) [ 463.092401] ALSA: seq fatal error: cannot create timer (-22) 07:11:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:35 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:35 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:35 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = creat(&(0x7f0000001380)='./file0\x00', 0x0) ioctl$fiemap(r2, 0x40086602, &(0x7f0000000080)=ANY=[]) pwritev(r1, &(0x7f0000000000)=[{&(0x7f0000000140)='5', 0x1}], 0x1, 0x20000) ioctl$KVM_GET_MSR_INDEX_LIST(r2, 0xc004ae02, &(0x7f0000000040)={0x2, [0x0, 0x0]}) fallocate(r1, 0x3, 0x0, 0x20001) chdir(&(0x7f0000000080)='./file0\x00') 07:11:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="757365722e7365637543fb8edd2e6361706162696c69747900"], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000340)="9a984eba370af9e640a4dffa521b6d76ec488d7f1b48ef0ec6f025fc357d97c9880fd102fe473e5e3f4853de5f0d66bc0742df14c821fdc41ab09e7247096540d8b1a5da53522fe67c06760663e1af6df2eb4b2fb0c53fc3581ecc7c299daf2102aa92a89ce8b9de9239de7c2902ec657e627c473cd2fafdf2cc88f6952e761177750312d7c31da88d4664f7eba42ad2a38dbf43135c2dfeb9dd5ecb6a4ea6251f6615b9de225b16b62e29a1505d77d513e676b6b6acf722ffb5a3d9396f4791e6bc4512fe3406cee04514bc") 07:11:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfc\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:35 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673fd", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:35 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:35 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:35 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000006000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x7}, 0x2c) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x2, &(0x7f0000000280)=[{&(0x7f0000000100)="ac608e7e81067a8d1975cb29a8ce3c46471124ff0d6282896a8790203c3e3321014530d36c8222f0317090fe8d999a46a750a43409341f2c8aec8ea0885b6d000c35d16d704a0cd371b95d225159617f3f807745815bd0263ce71a124db4efa42cec7f657364b3c24701388fa87f8fad4843e0a6393751a33c51732f4c57e20cef9b4ae223b030b76f19683ea499d3eba1dde414c0091cd7783fa7f220f15259db3cca9f313170e4262d154305e6e03302e8c72e0925e67f9bd5d8d1240f35cc9d06ecfa52930fe53e92921363dbebd4aa80d4e72b975a8ee5ce422608d87e6f4bfa79fc3112004089174bd8e994789dc47bd435042a16", 0xf7}, {&(0x7f0000000200)="79cfe691d49fa76a6cc26c9222a7eea0d2005a6284920da6afe5799816595f3a4f1ffec30152f45749c454d9ba5ac56b8b23791aa75fc02ba40da6e49002266f05c607199240e6bd99c83731832b67181fa2e4451595a10d1144f32dc72b0b06f5368cf81d0b", 0x66, 0xff}], 0x400, &(0x7f00000002c0)={[{@norecovery='norecovery', 0x2c}, {@nobarrier='nobarrier', 0x2c}]}) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=@ipv4_newroute={0xc0, 0x18, 0x100, 0x70bd26, 0x25dfdbfd, {0x2, 0x90, 0x80, 0x1, 0x0, 0x3, 0xc8, 0x1, 0xe00}, [@RTA_METRICS={0x60, 0x8, "23470954972db5e42d4f5737f8dddca323d01b4d5ec9f5bff471c3a3b0085cd285a7ad8521bc7b8c28df17ac409df5b06a503582f1f2dff22ba2743b5c51b5d8b8a1c59ff5c63260d9a317f857233230d7c2e70d1d460083bc66f814"}, @RTA_METRICS={0x1c, 0x8, "25b5e8061d3af4df693141bdb43fae02526b70fe90fa3c"}, @RTA_PRIORITY={0x8, 0x6, 0x3}, @RTA_FLOW={0x8, 0xb, 0x7fffffff}, @RTA_PRIORITY={0x8, 0x6, 0x5}, @RTA_ENCAP_TYPE={0x8, 0x15, 0x1}, @RTA_MARK={0x8, 0x10, 0x4}]}, 0xc0}, 0x1, 0x0, 0x0, 0x80}, 0x44000) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x10, 0x5, &(0x7f0000006000)=ANY=[@ANYBLOB="1800000000400000000000000000000000009500000000000019"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0x1000, &(0x7f0000008000)=""/4096}, 0x48) 07:11:35 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x80) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000140)='security.capabimity\x00', 0xffffffffffffffb1, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) [ 463.826811] gfs2: not a GFS2 filesystem 07:11:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrf*\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:36 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 463.938778] gfs2: not a GFS2 filesystem 07:11:36 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:36 executing program 1: r0 = socket$inet6(0xa, 0x805, 0xffffffffffbffffb) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) r2 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0xe, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00c@@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, &(0x7f00000003c0)}) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x18) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r3, 0xc05c5340, &(0x7f0000000480)={0x0, 0x5, 0x5, {0x0, 0x989680}, 0xca92, 0x10001}) timerfd_gettime(r3, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000240)=@assoc_value={0x0}, &(0x7f0000000340)=0x8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000380)={r4, 0x401, 0x1, 0xfffffffffffffff7}, &(0x7f00000003c0)=0x10) ioctl(r0, 0x7, &(0x7f0000000500)="218643519d2f61e9c228973492d86d51df96d9bad04c2adfff7c1dd8c383d0aa10a346144daabcd7336a221ce48c72bfd35e79d2d7e239c68d003774c2582b23f840fe7ff0107462ae6459006fe40b006ac6665c55a64531f79ec598f735ca66d9ce3eca81d951d219c9a69f8cf0fabeed1e001c003fa81046dedaca136cb90fdf56ff10d9f88a92019fe41910ecaf4d52b06b89fe03905ed0441629305448abfb06ea166623ad172ad652a2c3745dc48928") ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000000)=[@register_looper={0x630b}], 0x1, 0x0, &(0x7f0000000140)="06"}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000001c0)={0x44, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="01634040000000000000000000000000000000000000000000000000000000000000000038000000000000000800000000000000", @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB="8561646600000000000000000000000000000000852a646600000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYPTR=&(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00\x00\x00\x00\x00']], 0x0, 0x0, &(0x7f0000000500)}) 07:11:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000100)="025cc8e88aff798f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="75736572e4f1ff000000000000000061706162696c69747900"], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) sendto$unix(r1, &(0x7f0000000080)="0c9efffedef8eb2950eabd5b00fe0a359e50daba9bb284687a026940b9b92dd596", 0x21, 0x800, 0x0, 0x0) 07:11:36 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) pivot_root(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='./bus\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:36 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 464.205410] binder: 31898:31903 ERROR: BC_REGISTER_LOOPER called without request 07:11:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrf#\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 464.348419] binder: 31898:31903 got transaction with invalid offset (32, min 0 max 56) or object. [ 464.383143] binder: 31898:31903 transaction failed 29201/-22, size 56-8 line 3030 [ 464.391059] binder: send failed reply for transaction 105 to 31898:31903 07:11:36 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsz', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:36 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/udp\x00') r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) socket$alg(0x26, 0x5, 0x0) write$cgroup_type(r3, &(0x7f00000002c0)='threaded\x00', 0x9) [ 464.478967] binder: BINDER_SET_CONTEXT_MGR already set 07:11:36 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:36 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f00000005c0)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) fstat(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f0000000080)={0x2, 0x80000001, 0x1ff}) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./bus\x00', 0x8, 0x3, &(0x7f0000000340)=[{&(0x7f0000000140)="4afbde9a6ca4abc392a37be86bef0f7c6352c0c135a5ef66221dd42f31e63a243950700c717ccccf6eaa0736751a51fadef6268e1a873f424ef3194ebfa6baac9cdc3f907a9d17128ef0d0a1e3a5ffaf8f3495346820ece57e7f780ec58c23a215e6aa0dc4e8e5563ae48e18c729392a27f40a412304d6f08e3cfc26a6168c7f96f4e8c3ae6bdf29bdc6ba551f544bd6b090cc818009dda2ba5b979f842a60a28c6d2d", 0xa3, 0x6ac}, {&(0x7f0000000200)="0d3802c4bee2bf272cf65f77cfabae7941004f2d67521b062dd884fdb4e05a2f30847cb136289a8e344681d92f15c72cd77beec6bef249eea983e6703c93a632e676cd733ac0400e35f19847677d9d3f68f159c93b5b97598c8d6cd70daeb4c9d5991f2f7f440c8ad9a8c73f2af4557295cfa4d78ba6fc3e43873c41cd87378f5cdaf9a941f0dbb49ebcc303b7a7fd4f04d035a9a895aa4ca85f0237be6084ff9d89d82dcffe9e68b1a1fda3405f3a7aae6753b59ad81bcc09ddfbea4e83dfd9ec6395bbc25d9b7134df025dd08cd25f9c890177c678bf037b8bea17e6ec7728f326ba4feb99fe670306e4088d84dd102c03", 0xf2, 0x7}, {&(0x7f00000000c0)="fa4a6851942490f5a80c74ec0d2b765d904cfc0333fc9acdeb0070e9ea7c7d885b98bcd15742372feeea852832e8", 0x2e, 0x8000}], 0x80001, &(0x7f00000004c0)=ANY=[@ANYBLOB='show_sys_files=no,case_sensitive=no,uid=', @ANYRESHEX=r1, @ANYBLOB="2c646d61736b3d30303030303030303030303030303030303030323133362c6e6c733d69736f38894eb10c257a6c7ff8aba1f1c5"]) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)="6e756d615f6d61707300980b0d5d649046bb48a56abde3b6085b9a5071f8431e0822b210bf2688ce0b336a0cee00ae7008d8c3477aed84e03450c99c845f68db9c7b53c9386eec06d98bbbcd3946548b0acfadd2562c2b2978041a1972f95d26c1b62cb3d301c1b2274ee72fe7d10d335682ccae89d3b7393a4576a236e8c21561f7252b98ddf4bea18d31884b0e5468dd467a6a") readv(r2, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) [ 464.524852] binder: 31898:31937 ioctl 40046207 0 returned -16 [ 464.565899] binder_alloc: 31898: binder_alloc_buf, no vma [ 464.571651] binder: 31898:31903 transaction failed 29189/-3, size 0-0 line 2967 07:11:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 464.626398] binder: 31898:31936 got reply transaction with no transaction stack [ 464.634005] binder: 31898:31936 transaction failed 29201/-71, size 56-8 line 2759 [ 464.636131] binder: 31898:31903 ERROR: BC_REGISTER_LOOPER called without request 07:11:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfi\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:37 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 464.936497] binder: undelivered TRANSACTION_ERROR: 29190 [ 464.945334] binder: undelivered TRANSACTION_COMPLETE [ 464.950522] binder: undelivered TRANSACTION_ERROR: 29201 07:11:37 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="757365722e736563cf5214493d7d30ba70616219897952696c"], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:37 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsp', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:37 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) r1 = getpgid(0x0) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='net/ip_tables_targets\x00') readv(r2, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) [ 465.034827] binder: undelivered TRANSACTION_ERROR: 29189 [ 465.059737] binder: undelivered TRANSACTION_ERROR: 29201 07:11:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673f4", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfp\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:37 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="757365722e736563757f000000000000006162696c697479005c08d4782057e0a420f450a5c6628082e0065d85c0cf15defe29540370e8d5a835785bec01288187ca1f5a3119d29111231d77bc3c5b061974b48b7db27b663b3e6af1bfe93934128f14c3b38bf96af879216247f13c9c6620d0036fbf47fc423512d34c2cde2b1899a52c021b59e284fb2745c77d242933fe76a95acebc2c21c42a1404c2dfb71f138072e88594795cb4e11ed90dc1086e6828a9f9a67da640fad0fc092b090836cb88089dc5cd3f9a0a3e8c4d7c52718d7f68a4ca0f4c0e81ae94ce7c9c8adbee31d20b41eb5146c3c348c77b695c12da9d"], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000140)={'bcsf0\x00', 0x10000}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000080)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000100)={r2}) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:37 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000009c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000980)={&(0x7f0000000500)=@updsa={0x184, 0x1a, 0x101, 0x0, 0x0, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@dev={0xac, 0x14, 0x14}}, {@in=@multicast1=0xe0000001, 0x0, 0x33}, @in=@dev={0xac, 0x14, 0x14}, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'sm4\x00'}}}, @algo_aead={0x4c, 0x12, {{'rfc4106(gcm(aes))\x00'}}}]}, 0x184}, 0x1}, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x4002, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000080)={0x0, 0x9, 0x5, 0x10001}) 07:11:37 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x1c1042, 0x400000) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:37 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:37 executing program 1: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@remote, @in6=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)=ANY=[@ANYBLOB="a3de5013672f4a440d2e9d650e9c0855e71415eaf8"], &(0x7f0000000340)=0x1) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000500)="0f0866b8ed008ec066ba4000b000eed2a807000000410f01cab98e0b0000b862000000ba000000000f30b90b0800000f320fc72a8f2a60128f00000000003000000fc7aa00100000", 0x48}], 0x0, 0x0, &(0x7f0000000040), 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000040)={0x0, 0x117000}) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x40, 0x0) r5 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0xffff, 0x102) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) ioctl$KVM_RUN(r3, 0xae80, 0x0) 07:11:37 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000100)={0x4, 0x70, 0x7, 0x8c6e, 0x1, 0x5, 0x0, 0x7, 0x100, 0x5, 0x0, 0x0, 0x2, 0x81, 0x800, 0x6c8000000000, 0x1, 0x4, 0x0, 0xaa22, 0x5, 0x2, 0xab37, 0x7, 0x4, 0x50, 0x68a, 0xe26b, 0x4, 0x0, 0x7, 0x4, 0x9, 0x8, 0x8000, 0xff, 0x8, 0x7fff, 0x0, 0x9, 0x0, @perf_config_ext={0x2cb, 0x7f}, 0x100, 0x100, 0x1, 0x0, 0x39e, 0x1, 0xffffffffffffc665}) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='security.evm\x00', &(0x7f0000000280)='selinux\x00', 0x8, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrf-\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:37 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsL', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:37 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="627472667303", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:37 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0xfffffffffffffffe) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) syz_open_procfs(r2, &(0x7f00000000c0)='net/snmp6\x00') 07:11:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) execve(&(0x7f0000000080)='./file1\x00', &(0x7f00000003c0)=[&(0x7f0000000100)='threaded\x00', &(0x7f0000000140)='md5sum\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000200)='lo\x00', &(0x7f0000000240)='&\x00', &(0x7f0000000340)='}\'\x00', &(0x7f0000000380)="0000000201000000000000010400"], &(0x7f0000000480)=[&(0x7f0000000400)=')em0cgroupvmnet0vmnet1$\x00', &(0x7f0000000440)="0000000201000000000000010400"]) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f00000004c0)={0x0, 0x6}) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:38 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfX\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:38 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r0, &(0x7f0000000000), 0x0) 07:11:38 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsL', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:38 executing program 1: r0 = getpid() sched_setattr(r0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x1}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_int(r2, 0x0, 0x14, &(0x7f00000000c0)=0x4, 0x4) readv(r1, &(0x7f0000001200)=[{&(0x7f0000001100)=""/233, 0xe9}], 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000bc000)=@abs, 0x8) sendmmsg$unix(r4, &(0x7f00000bd000), 0x80, 0x0) readv(r3, &(0x7f00000005c0)=[{&(0x7f00000004c0)=""/239, 0xef}], 0x1) 07:11:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:38 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f0000000100)='./file0\x00', 0x2) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='user.ability\x00'], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000080)=""/23) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f00000001c0)={0x88, r2, 0x200, 0x70bd29, 0x25dfdbff, {0xe}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1a8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x10001}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x40000}, 0x4044804) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:38 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:38 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) getsockopt$inet6_opts(r0, 0x29, 0x3f, &(0x7f0000000140)=""/179, &(0x7f0000000000)=0xb3) 07:11:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:38 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673f4", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrf.\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:39 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=@known='security.evm\x00', &(0x7f0000000140)="73656375726974792e6361706162696d6974790073a1e77d53f86b9795400e21a5dc892d9ec378b3f18b5aaf6a", 0xffffffffffffffcf, 0x2) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:39 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000000)={0xff69, 0x9, 0x1}) 07:11:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 467.006494] print_req_error: I/O error, dev loop6, sector 128 [ 467.021781] print_req_error: I/O error, dev loop0, sector 128 07:11:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfu\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:39 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:39 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setregset(0x8, r1, 0x0, &(0x7f0000000100)={&(0x7f0000000040)}) r2 = socket$pptp(0x18, 0x1, 0x2) ioctl$PPPIOCGFLAGS(r2, 0x8004745a, &(0x7f0000000000)) 07:11:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673f6", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:39 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:39 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='u.\x00\x00pab\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) sendto$inet6(r0, &(0x7f0000000340)="0faab3bdc610f1b7c737878045e2750ed71fab27ac0f873a09b5df8a8ad289369e20bec59f477bf39372aa64b7beb05e56413464ad325d8430d130304227bf831203917618a8c8b6c74d914c68e5e03b914334aa6c9769dfd6e241876cfa300a2ab3e5d1380dd9e271fb3d22ed3145b2d1510683947753d4dcfef25fcb2bb01c6b540d29cc4cb354f51e8051fe7489fc01f5d583b88de24b596893fab258386257adacc70b69b9db3c03e0bf77ed241959b1b2d49be27ee429cb02a65cd7b5df445a3a345dd10e10339fab98330734f33f4b4d4ad23d51a7a09aa1b56c7c", 0xde, 0x40004, &(0x7f0000000080)={0xa, 0x4e20, 0x7, @mcast1={0xff, 0x1, [], 0x1}, 0x80000000}, 0x1c) write$cgroup_type(r1, &(0x7f0000000100)='threaded\x00', 0xfffffd6c) 07:11:39 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000000)=0x5, 0x8) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrf0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:39 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 467.554832] print_req_error: I/O error, dev loop0, sector 128 07:11:39 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:39 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfd\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:39 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:40 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') socket$inet6_sctp(0xa, 0x2af1b9a2224de33e, 0x84) readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) [ 467.861545] print_req_error: I/O error, dev loop0, sector 128 07:11:40 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="627472667304", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsl', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:40 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:40 executing program 1: r0 = memfd_create(&(0x7f0000033ff3)='\x00', 0x0) capset(&(0x7f0000000140)={0x20071026}, &(0x7f0000000180)) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000100)={&(0x7f0000018ff4)={0x10}, 0xc, &(0x7f0000013ff1)={&(0x7f00000000c0)={0x20, 0x28, 0x1, 0x0, 0x0, {0x1}, [@nested={0xc, 0x0, [@typed={0x4102, 0x0, @pid}]}]}, 0x20}, 0x1}, 0x0) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x9, 0x10000003, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r4 = dup2(r2, r3) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, "9ede7a8c5ae95e48000000000000007f4f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa0500000074dbcfa6dc4d"}) r5 = syz_open_dev$adsp(&(0x7f00000012c0)='/dev/adsp#\x00', 0x0, 0x501080) write$sndseq(r0, &(0x7f000000a000)=[{0x0, 0x3, 0x0, 0x0, @tick=0xfffffffffffffffd, {}, {}, @ext={0x0, &(0x7f0000038ffe)}}], 0x30) r6 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_FPU(r5, 0x41a0ae8d, &(0x7f0000000280)={[], 0x8, 0x4, 0xfffffffffffffffa, 0x0, 0x10000, 0x2000, 0xf000, [], 0x1}) r7 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000780)={0x73, 0x79, 0x7a}, 0x0, 0x0, r6) keyctl$setperm(0x5, r6, 0x8000000) r8 = socket$inet6(0xa, 0x1000400000002, 0x0) ioctl(r8, 0x8912, &(0x7f0000000240)="0047fc2f07d82c99240970") perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r4, 0xc0405519, &(0x7f0000000480)={0x7, 0x3, 0x2, 0x42de, '\x00', 0x101}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000540)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r4, 0xc1105517, &(0x7f00000005c0)={{0x8, 0x7, 0x5, 0x0, 'syz1\x00', 0xda180e9}, 0x5, 0x44, 0x0, r9, 0x2, 0x9, 'syz0\x00', &(0x7f0000000580)=['t%am0\x00', '\x00'], 0x7, [], [0xfffffffffffffffb, 0x5, 0x8a7, 0x3f]}) shmdt(0x0) r10 = socket(0x10, 0x803, 0x0) r11 = openat$cgroup_ro(r0, &(0x7f0000000100)='memory.current\x00', 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r10, 0x1, 0x19, &(0x7f0000000740), 0x10) bind$netlink(r0, &(0x7f0000000440)={0x10, 0x0, 0x25dfdbfe, 0x100}, 0xc) time(&(0x7f0000000500)) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r11, 0x40045542, &(0x7f00000004c0)=0x1) ioctl$sock_inet_SIOCSIFFLAGS(r10, 0x8914, &(0x7f0000000000)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r10, 0x8923, &(0x7f0000000040)={'team0\x00', 0xc201}) keyctl$search(0xa, r6, &(0x7f0000000080)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x0}, r7) 07:11:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:40 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000000)={0x3, 0x6, 0xd57, 0x0, 0x6, 0xa4}) mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrf%\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:40 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="62747266731c", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:40 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:40 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0xfe08) 07:11:40 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0x4b, 0x100000000, 0x800c, 0x7fffffff, 0x8, 0x80000000, 0xe9f7, 0x0, 0x0}, &(0x7f0000000180)=0x20) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0x4, 0x0, 0x31e3, 0x8, r1}, 0x10) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) readv(r2, &(0x7f0000000300)=[{&(0x7f0000000040)=""/155, 0x9b}], 0x14d) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000200)={@dev={0xfe, 0x80, [], 0x16}, 0x0, 0x3, 0xff, 0x2, 0x7, 0xc92f, 0x100000001}, 0x20) pwrite64(r2, &(0x7f0000000040), 0x6a17, 0x0) 07:11:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:41 executing program 1: syz_emit_ethernet(0x32, &(0x7f0000000140)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x21, 0x0, @empty=0xffffa888, @multicast1=0xe0000001}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, "bea295", 0x0, "d20434"}}}}}}, &(0x7f0000000280)) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x400080, 0x20) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x80, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d}, 0x2c}]}}) 07:11:41 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:41 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\t', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:41 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cuse\x00', 0x20000, 0x0) r1 = openat(r0, &(0x7f0000000200)='./bus\x00', 0x40080, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x2, 0x4) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x15, &(0x7f0000000000)={@local}, &(0x7f0000000040)=0x14) unlink(&(0x7f0000000140)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r2, 0xa) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r3, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(tnepres)\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000380), 0x0) sendmmsg(r2, &(0x7f0000000080)=[{{&(0x7f00005fafe4)=@in6={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f00008e3fb8)}}, {{&(0x7f0000000140)=@in6={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000632000)}}], 0x2, 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f00000000c0)={0x2, 0x8000, [{0x70, 0x0, 0x7}, {0x3, 0x0, 0x7f}]}) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x0, &(0x7f0000b65000)) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) 07:11:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673fc", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:41 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:41 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="62747266737f", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:41 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f00000000c0)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x3, 0x800) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f00000001c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="00000000f15edc89d4006f5fdfec05ecb8", @ANYRES32=0x0], &(0x7f0000000100)=0x8) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='user.sHecy\b'], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r2, &(0x7f00000002c0)='threaded\x00', 0x9) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000200)=0x400, 0x1) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000240)={0x7f}, 0x4) 07:11:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:41 executing program 1: r0 = accept$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000140)=0x14) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000180)={'team_slave_1\x00', {0x2, 0x4e23}}) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000000)="295ee1311f16f477671070") socket(0x15, 0x807, 0x5c96) r2 = socket(0x10, 0x3, 0xffffffff) write(r2, &(0x7f0000000000)="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", 0xfc) [ 469.383199] print_req_error: I/O error, dev loop0, sector 128 07:11:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:41 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:41 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:41 executing program 5: r0 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x6, 0x101000) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x1f) open(&(0x7f000000fffa)='./bus\x00', 0x141044, 0x8) unlink(&(0x7f0000000080)='./bus\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/tcp\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000000)=""/126) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x80000001, 0x80, 0x200, 0x1cddbc62, 0x0, 0xfffffffffffffe01, 0x555a, 0x8001, 0x0}, &(0x7f0000000180)=0x20) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000001c0)={0x1000, 0x0, 0x2, 0x6, 0x8, 0x8, 0x3, 0x4, r2}, 0x20) 07:11:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") execveat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=[&(0x7f0000000100)='md5sum\\@wlan1{trusted!+mime_typeeth1user\x00'], &(0x7f0000000400)=[&(0x7f00000001c0)="217d2d7d242547504c813a00", &(0x7f0000000200)='security.evm\x00', &(0x7f0000000240)='\x00', &(0x7f0000000340)='user.', &(0x7f0000000380)='+(-&vmnet1selfeth0\x00', &(0x7f00000003c0)='wlan0eth0\x00'], 0x1100) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)="627472667306", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:41 executing program 1: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) listen(r0, 0x20000003) r1 = socket$inet6(0xa, 0x6, 0x0) getsockopt$inet6_int(r0, 0x29, 0x5f, &(0x7f0000000040), &(0x7f0000000080)=0x4) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @dev, @rand_addr}, &(0x7f0000000100)=0xc) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={@local={0xfe, 0x80, [], 0xaa}, 0x7, r2}) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000000)=@dstopts, 0x8) 07:11:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:42 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:42 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="62747266731c", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:42 executing program 5: r0 = open(&(0x7f0000000140)='./bus\x00', 0x100000a000, 0x89) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r0, 0x28, &(0x7f00000001c0)}, 0x10) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000000)={0x80002, 0x0, [0x3, 0x8000, 0x6, 0xde12, 0x6, 0xffff, 0x81, 0x9]}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') sendfile(r1, r1, 0x0, 0xffffffff) readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) rt_sigprocmask(0x3, &(0x7f00000000c0)={0x910}, &(0x7f0000000180), 0x8) 07:11:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede-asm)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000002ac0)=[{0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000240)}], 0x1, 0x0) recvmsg(r1, &(0x7f0000214fc8)={&(0x7f0000214fec)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x14, &(0x7f0000140fd0)=[{&(0x7f0000154fd6)=""/42, 0x2a}], 0x1, &(0x7f0000214000)=""/155, 0x9b}, 0x0) 07:11:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x11c, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673f5", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:42 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsh', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="627472667302", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:42 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs#', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="62747266738c", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:42 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='system.posix_acl_default\x00', &(0x7f0000000080)="0000000201000000000000010400", 0xfffffffffffffe6a, 0x2) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) r2 = request_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000200)='!trusted)\x00', 0xfffffffffffffffb) keyctl$update(0x2, r2, &(0x7f0000000340)="a35cdaf8d13e8662a2e0b0cc477cf73e7023477c2b33cd7abc9f8567265d07a0a1822429a7d64898313c83ba93ed6b46a751c4dde15d45f7daae25c5bc00e3f541eeddd768c1bdcebc0bd2d6fb80d49067d66fe6f19fc41f0ecf0e134025f5f63753cd6df350a860f0c2858fc9c751b9ca25c104d2dec2b9536730d619dc0e8722a6f56aec8f0c9b8a5faa67f5d947a7b3ef05c56358f450c1a770dd8ce704887df00e89fc4cf9557ad07109c290ed0f1116351c3df7c7be", 0xb8) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:42 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) gettid() ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x22000, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r0, 0x80e85411, &(0x7f0000000140)=""/133) 07:11:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x1000000008912, &(0x7f0000000280)="024a903d6d345f8f762070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0000001800010000000000000000000a00f8000000000000000000"], 0x1c}, 0x1}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x2}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e20, 0x7, @local={0xfe, 0x80, [], 0xaa}, 0x7}}}, &(0x7f00000002c0)=0x84) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000300)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000340)={@dev={0xfe, 0x80, [], 0xa}, @mcast2={0xff, 0x2, [], 0x1}, @empty, 0x8, 0x3, 0x5, 0x400, 0x3, 0x0, r3}) 07:11:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:42 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="62747266738c", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:42 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:42 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x2, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0)={r0, r1, 0x400007, 0x1}, 0x163) r2 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffd) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc058534f, &(0x7f0000000080)) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400, 0x0) ioctl$KDGETLED(r3, 0x4b31, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) ioctl$TIOCCONS(r1, 0x541d) write$P9_RSYMLINK(r0, &(0x7f0000000280)={0x14, 0x11, 0x1, {0x7d8bd35899fd11f4, 0x1, 0x3}}, 0x14) 07:11:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000080)='security.capabimSty\x00', 0x87fc0472df1d8249, 0xfffffffdfffffffc) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:43 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'syzkaller0\x00'}, 0x18) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x2) getpeername$llc(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000000c0)=0x10) readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:43 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:43 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:43 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x40000) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="75162b5662696c79000000000000000000000000000000f78e8f96df4ca67b7335a586da4a24bd8bbb0d8d142ce008ab450692fa1e1ff5088fc977030c4fb5165baf0bed7ae93fce8fed8cd521fc9be5a67cb2319a903cd62585b0913607b6e69a0d4c62f02252913b305d7a6bc5981d04bde82dd0efa0e9df3409e6ee76ab6979118fa929d48a2eaba76aee9f2773261f90ca9bc80cb9f9874f3a9c4be42deae37f8fd8426b5368426a172225cc144bb795df991ce6dd0a97afa52bc36d5d9e8664552af0abefa992f8fdeabe40ca582e8fede075"], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) rmdir(&(0x7f0000000080)='./file1\x00') syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x80000001, 0x40) 07:11:43 executing program 1: syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffd, 0x7, &(0x7f00000005c0)=[{&(0x7f0000000100)="0c9462465aae24194c0ce3abe55ce84288d4c6d0eb86680385cd7139c9b93641d83849f97ca510bbfb15d4e04868acbc3b313fc91629f343f28830a2dc9f5c9483cd5fe6f8becc5f668aad164a90f114fb762110d0432f5a047686263af4787e0558d2f8473a7926d946fa520c488848c15bbc924bf90576c498e9cab22388f4c03afafc72bc474d56b51b0d808eb540643e4ff9d6a6b17a54085fecd1bdf2496a", 0xa1, 0x3}, {&(0x7f00000001c0)="a5bc8424a0ca60f20cbd7b36bb242a3806aed5fff4c09f027252c65f03a1460022bfc60abe17401888fc076afa732c05fa38fdc340b56b6b632a19d45c3c8a10dc1058cd5a525a5ab8116c465d817afdf1644d798b06c33c949240be933ea75fec98ac9c078042d1cb7d2d40bfdfdf1dcffb93e13b4d4156b7adcbdb946b2f82c61cea7117d69dec08f4703ead5fdc9276980afa1afef82333cf0f582dd183252b7a1f09c6653d2e454af96154a975e23e1aa1aea0fe0a1440c3fd7c91535bfd5b34721378a720bf96201cde12f24604aeede4c4b41d4831cd41b9aea937", 0xde, 0x8}, {&(0x7f0000000000)="7676b2224d526a00c64ca787e296da34001507c2", 0x14, 0x57}, {&(0x7f00000002c0)="c5d3b0587aa0d207c6ea784a770e6f55d68fd3d9834b9cf166b0469b49b55cb28712945b7f272361d0242b4f56c550dab5dad04eb0b8727d5367c482c1b4ada1ff5c5c1785c171cd0c9f342d2d19339114531d39cd895fd58997ba9fe492d937689f188ef1d10df17eb75a666c78b1fceef2e755272400b1836550cd089b", 0x7e, 0x40}, {&(0x7f00000003c0)="bb9936b8afd0f52063c5a74dfceab3b53c05aa840f6a95ace4f22415077314b792efcc2c4d3963c9303d9260015726263fdf3bdaac3fbb02ce8f2e4bfd4d94fde64c9c158ace6818bb5e8228a5abdc32de6298cf69165bb8020200c4c1c50d1dc9046dfe8082c4d22ab615b53608f116d246a61ab151f8851806ee6c43f07e90061bbd37782fb8058403823b59d6936e18", 0x91, 0xfffffffffffffffe}, {&(0x7f0000000480)="88952f1d8926e6ccd4e5b2c26dd9e743bad3771ffb5e0ea2b017210b1e28c2130d9d316bf5dece3f6eb2e292b7be58686527f508bc48e942b4bb37e0c0030d05f8d84d9878be032d7c6b9304ce75c40ecbdfe63d9e0d4f90d4804444165d08b379d4bbb5fca66c673d88ad8ad04b4035a0a673db3e99b597fd1fc3508c0b0d7f313fd6001a573d0d10f41616cb6dec0fa9d656718f927ad8f426810debe1780a281cd53ffc09d769f80b5c691a6c1f9b20", 0xb1, 0x201000}, {&(0x7f0000000540)="9df968f01e3a979b817b6d99bd827a1ee657ba0d1775374a789a0abedcc30540fcd47d57ae5448f8563134bffd6d2f4418909f7c05fb6e675620901be4ee88a447dfbbb30a821302e037f54fd27eb32eaf7129", 0x53, 0x9}], 0x0, &(0x7f0000000380)={[{@allocsize={'allocsize', 0x3d, [0x38, 0x6b]}, 0x2c}]}) 07:11:43 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x800}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000000c0)={0x102, 0x2, 0xe77c, 0x101, r2}, 0x0) 07:11:43 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 471.491996] XFS (loop1): Invalid superblock magic number 07:11:43 executing program 2: r0 = socket$inet6(0xa, 0xfffffffffffe, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="8e7365722e736563726974792e63dc006162696c69747920007ec3135d32d65cba03da4a00e669c7c96f163518378aaabcad5a140dff05398ac529dc981359fbb7fd3352fbf43316927f7eac89aa202d9b6b595ba9d7471c684e0f2552ed70c52f4edf296a5656b7ddd334955032d8ffcc7147680f67e18df7408f12f8d634b1d4ab754d36ebab2889ea23cbb2d8214e460334ae421c26136ba2a0cddefd9d7a7dea1f6d2cf9b767782dce6da7ce724def8011b527f3b40c890000000000000000000000000075db2dcb3f1f83b8aa72e51b7672de263ca54523633a3cac4e2ed96a45c40a1d6de5422b2b3fd162e42fb99cadd3afb5fb557320f537edecfd6595dd23a60502a319ab04f5345f883391246c864f2aecba3c2f94ee2db06713ee2eb36d7b5892d4fdb3915602"], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000080)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x1) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:43 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:43 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:43 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./bus\x00', 0x4, 0x3, &(0x7f0000000440)=[{&(0x7f0000000140)="b9c4ece796cc14dde98329409ac14e1b00af16c6904b1fee5699190abc6a8267d1815f8788128cfd30b819c73c396dce7dd91d73a1d697aceefbb35d72b4d810f1c767a61286073718ce7d16fab55e69bdeac89a96b7f32d1c8dfe4fec41f207e0ed", 0x62, 0x81}, {&(0x7f00000001c0)="6211e9e7153f2adf8bf91d9fe00787d96ee8a5f7602dd1f6d512b86a479234fbc11826c338822d88751041bc4f1e3b670eb41c3c3421e1e7f85563eda580e94ed48092ce9d4c42c5d87d69d31bf7640715956a7c18ed00053bc8f25b71b89cb50feeebea610cb7a7c992b6b510bfd6d360d5af1717dcffdcb6d5f1cae79f163b23b76b809b43d1562dd49ebb89afc86117d9309ef4484e10919676a35c9c959d6ca74a82ddfdf7abb092a8c9673f46d62487659330e8fe6b33f5bf4c180735594ac940d3787cdeb5eba7aa3d01eecf1cb6b879bb225261bfce8487fa1a501b05", 0xe0, 0x5}, {&(0x7f0000000340)="20e7e72b6d6498b21b4a5aabec3062e201ee2451f91f2dc93c352e43483c921982fddb8bb3008f6b2abbf9b53e95472c4ccf5918536168533757bbe336bf4397c9201aecd8687a2f187fe03061a2b71dfada488bcaf045d80770790d14185d39c22932db1ceb2fac42dc76144f8f11ea33ea6860efa7a21819c5aa7057287403e4fb4722198bdf170a431e871c98c0f300e954fe17458e98a6fe1c85e77e5dd07f49bcab452e2abd19e88bc59042012dbd4a9c7ac6e781a88d4df895a319b25595ff95e1aa4cd12eb0b1df8241babef313b4487bff49dd04dc0157be1231a28753b0343ead2f0aef330cb38135b0", 0xee, 0x4}], 0x4400, &(0x7f00000004c0)={[{@numtail='nonumtail=0', 0x2c}, {@utf8='utf8=1', 0x2c}, {@shortname_winnt='shortname=winnt', 0x2c}, {@iocharset={'iocharset', 0x3d, 'macgreek'}, 0x2c}, {@numtail='nonumtail=0', 0x2c}, {@numtail='nonumtail=0', 0x2c}, {@shortname_winnt='shortname=winnt', 0x2c}, {@rodir='rodir', 0x2c}]}) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)) getpgrp(0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000540)=0x0) r2 = syz_open_procfs(r1, &(0x7f00000002c0)='timers\x00') readv(r2, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) [ 471.682775] XFS (loop1): Invalid superblock magic number [ 471.801989] FAT-fs (loop5): bogus number of reserved sectors [ 471.808073] FAT-fs (loop5): Can't find a valid FAT filesystem 07:11:44 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8, 0xa000) ioctl$BLKRAGET(r1, 0x1263, &(0x7f00000000c0)) r2 = openat$cgroup_ro(r0, &(0x7f0000000100)="6370757365742e6d656d6f72795f7072657373757265007a991d3572f1a4a46f946d89a91f26ae8b03ad5edfe591f072640d91ffeed7a003cff3c35b27650abef77db92440104693f439e8e19ce3998cd1b6afffc547", 0x0, 0x0) read$eventfd(r2, &(0x7f00000002c0), 0x7) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x2, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 'nr0\x00'}}, 0x1e) 07:11:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x400000000000000) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="757365722e73656375726974792e6305000000000000007900"], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x2a8c02, 0x0) 07:11:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\t', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 471.915604] FAT-fs (loop5): bogus number of reserved sectors [ 471.921576] FAT-fs (loop5): Can't find a valid FAT filesystem 07:11:44 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:44 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:44 executing program 1: r0 = socket$kcm(0x29, 0x1000000000000005, 0x0) r1 = syz_open_procfs(0x0, &(0x7f000018cff6)='net/kcm\x00\b\x00') sendmmsg(r0, &(0x7f0000009140)=[{{&(0x7f0000005b00)=@pptp={0x18, 0x2, {0x0, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x80, &(0x7f0000005f40), 0x0, &(0x7f0000005fc0), 0x0, 0x40080}}, {{0x0, 0x0, &(0x7f0000008f00), 0x0, &(0x7f0000008f80)}}], 0x2, 0x0) readv(r1, &(0x7f0000000580)=[{&(0x7f0000000480)=""/192, 0xc0}], 0x1) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2e35, 0x800) [ 472.174675] print_req_error: I/O error, dev loop0, sector 128 07:11:44 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x300, 0x22) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip6_tables_names\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:44 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:44 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f0000000100)='threaded\x00', 0xffffff91) 07:11:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:44 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\a', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673fd", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:44 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x9b9, 0x14000) r1 = syz_open_dev$rtc(&(0x7f0000000700)='/dev/rtc#\x00', 0x3b61, 0x14000) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vcs\x00', 0xc40, 0x0) socketpair$inet(0x2, 0x8000e, 0x7fffffff, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$key(0xf, 0x3, 0x2) r5 = accept4$inet6(0xffffffffffffff9c, &(0x7f00000007c0), &(0x7f0000000800)=0x1c, 0x80800) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000840)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000880)={0xffffffffffffffff}) r8 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r9 = accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f00000008c0), 0x80800) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000900)='/dev/net/tun\x00', 0x40400, 0x0) r11 = getpgrp(0xffffffffffffffff) fstat(0xffffffffffffff9c, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getgid() r14 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) r15 = syz_open_dev$sndpcmp(&(0x7f00000009c0)='/dev/snd/pcmC#D#p\x00', 0x81, 0x2) r16 = fanotify_init(0x1, 0x0) r17 = openat$audio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/audio\x00', 0x80, 0x0) r18 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) r19 = syz_open_dev$dspn(&(0x7f0000000a40)='/dev/dsp#\x00', 0x9, 0x0) r20 = syz_open_dev$sndctrl(&(0x7f0000000a80)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000ac0)=0x0) r22 = geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000b00)={0x0, 0x0, 0x0}, &(0x7f0000000b40)=0xc) r24 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/vhost-net\x00', 0x2, 0x0) pipe2$9p(&(0x7f0000000bc0)={0xffffffffffffffff}, 0x80000) r26 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r27 = timerfd_create(0x3, 0x800) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000c00)={0x0, 0x0}) lstat(&(0x7f0000000c40)='./file0\x00', &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0}) r30 = getgid() r31 = getpid() lstat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r34 = syz_open_dev$sndmidi(&(0x7f0000000e80)='/dev/snd/midiC#D#\x00', 0xc769, 0x2000) r35 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000ec0)='cgroup.threads\x00', 0x2, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000f00)={0xffffffffffffffff}) r37 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000f40)='/dev/vsock\x00', 0x2200, 0x0) r38 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000f80), 0x80800) r39 = syz_open_dev$usbmon(&(0x7f0000000fc0)='/dev/usbmon#\x00', 0x9, 0x0) r40 = openat$mixer(0xffffffffffffff9c, &(0x7f0000001000)='/dev/mixer\x00', 0x0, 0x0) sendmsg$unix(r0, &(0x7f00000011c0)={&(0x7f0000000140)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000680)=[{&(0x7f00000001c0)="885be5f33771eed9a8c0e58a13b0c397568130f5bf9aa36ad2eccc91c823a73066f96515cca9bf17dc0610e29cea7ffb8abf1d195ddf0bb33c155d07769e5b477abdcaa52d4f137d501038080db6f53a7c0ad2fdc2cc0c63018b6b61c80641f77759a8724ada567e77f0c87533dae2b5466571dc3442eacf945b82b496e035d45fb26d3080e11d34f9ab877d761a14022fc4a0a05acab33c63501bb96aea0da9ffd329668958cf5779873672cfa94d87c4b3bd", 0xb3}, {&(0x7f0000000280)="f2a29a23a623426dcf8cf2b590d2de75c1bb209df49c0908e9f856427de19141b05d0c5354cdc0980b9421d873d2e38f1a795ce9a72b42d17a198db3457f783b5eb627faa8d3b17d8198338395a1d2949dcc308a87c580ac3e149fc4e2c1cdcc14a560ae6985e3f49fbca90cbf1c2128ca3a995da8edfb9bc99d204467e09010720af60098508c894c16b80d0619eb827e5107bddd353f23503e73729a7d1c97a8e931b2c302ddad7d4a625dd49801ac4ed0b9c1e071fd513b13d2f76530497519cd1ad99f55d2342b589cda8776b76f287bd2b0303e1b416896e4d324fa7fa6f0e29d998175fa5b528f6b5c58", 0xed}, {&(0x7f0000000380)="b0175fd76a3c6b9629172131b0caa9277e6e1a2723cff7c0c878e333c76111ff8f6549f00ce326ecadd4422fb610ba416c17408eb4f4e9a9322aa0b2cec7026d48743c433000624eb2d5ebcc2aa1726885aef8293ebd7c6d9f3a0435aff1b8058118ffe32b56be9a3058c1f1bbe87058cfd877bc8c97bb3121542d498800f33c6adcf9cbe85671f1fb107dc014982ea67ea0c5591f579aad611ef9d09ddc6b4af766eefe9c02a5a826ed6dd3a3a818a3d674c5aacf9b6207", 0xb8}, {&(0x7f0000000440)="04c6ce578eb58e858292f2984d168d7115a0e38ec9579c4fb8a3a68e723920f96c7acc5c7bfdf23531aa20ea81f2bdb427e25bf7a1d4977bdbb7e70d38b5ba9caf10a29eca28cfb96d32aed18983b0508d0b762f568e85bc7a6063d59d349d6a0f988a593cf402d5ec9218eb452b9baa2d2999383e45417935de4b8f98bdcce2a8a1e224413b238a4c393a3c7160c4472dd0776f685d37fbb0a0934bb9cd38c07fea9f5408fbc1550571b174", 0xac}, {&(0x7f0000000500)="17edc2c9e86db1a5f723b2238a4e992b6abc4b77818dc6e61a8af914b128a1c31b19aa70c66a9134edc8e94c1fb61709fc90325534e77cbec1f7fcae004b996b287aabac161d55a7a9ae8d", 0x4b}, {&(0x7f0000000580)="70b32229be20f169447bac40a3a55032951c0f45f94bc8a98f255bca34e631fb787b42b6491b216000aff221d7e9154c948a0e02be1ab0e2aded8c6ffc2c324371760b3ed36c35e975e22353e88299941d4d5b06f80f22ab20ba61d1b9eb20f6b1ae3700fbb3eadf0e3102dc56763c41d4d2ef6fb13d06febba2b20dcff0c6316dbe7a57f34707b10fefae6ebc4be50f8aabd92562c77cc6dca4e72c0528e5baaf36cdb354b2", 0xa6}, {&(0x7f0000000640)="4228187597d31adcffe2e3e559f12fb5497b8769db7d2941a834f8c4fa21892afa6c410b4113bf07", 0x28}], 0x7, &(0x7f0000001040)=[@rights={0x20, 0x1, 0x1, [r1, r2, r3]}, @rights={0x30, 0x1, 0x1, [r4, r5, r6, r7, r8, r9, r10]}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @rights={0x30, 0x1, 0x1, [r14, r15, r16, r17, r18, r19, r20]}, @cred={0x20, 0x1, 0x2, r21, r22, r23}, @rights={0x20, 0x1, 0x1, [r24, r25, r26, r27]}, @cred={0x20, 0x1, 0x2, r28, r29, r30}, @cred={0x20, 0x1, 0x2, r31, r32, r33}, @rights={0x30, 0x1, 0x1, [r34, r35, r36, r37, r38, r39, r40]}], 0x150, 0x810}, 0x0) r41 = socket$netlink(0x10, 0x3, 0x1000000000004) writev(r41, &(0x7f00000a8000)=[{&(0x7f0000aef000)="580000001400192300bb4b80040d8c562806f0ffffff04106a9643c218fe59a2e04a03ca8164243e890000000a215a0004fbf50dfff90003a5000004001ce1ed5e0000000000221f100001000700f8ffff0000ec6b0f536e", 0x58}], 0x1) sendmsg$nl_route(r41, &(0x7f00000000c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@newlink={0x30, 0x10, 0xb00, 0x70bd2a, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x200, 0x400}, [@IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x81}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0xffffffffffffd358}]}, 0x30}, 0x1, 0x0, 0x0, 0x11}, 0x40) 07:11:44 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000200)={0xffffffff, 0x1, 0x7fff, 0xd5, 0x0}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000280)=@assoc_id=r2, &(0x7f00000002c0)=0x4) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000000)={0x0, 0xeee9}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x2, 0x5, 0x200, 0x3, 0x101, 0x80000001, 0xe, 0x1, r3}, 0x20) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000140)={0x400, 0x4, 0x8, "7175657565300000000000000000000000000000000000000000000000000000000000000000fb1d7c1c000000000000000008000300", 0x8}) readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="627472667302", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:44 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:45 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="62747266731c", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:45 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) sendmmsg(r0, &(0x7f0000002000)=[{{&(0x7f0000000100)=@in={0x2}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000280)}}], 0x1, 0x0) socket(0x10, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/udp6\x00') 07:11:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsh', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:45 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x80000001}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={r1, @in6={{0xa, 0x4e24, 0x71cf, @local={0xfe, 0x80, [], 0xaa}, 0x4}}, 0x3, 0x20, 0x9, 0x80000001, 0x84}, &(0x7f00000000c0)=0x98) mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:45 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 473.362332] print_req_error: I/O error, dev loop6, sector 128 07:11:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:45 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)=@known='security.evm\x00', &(0x7f0000000100)='security.capabimity\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:45 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:45 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000380)='/dev/snd/seq\x00', 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x200040, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000003c0)={{0x80, 0x2}, "706f72743100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000000)={0x6, 0x8000}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000080)={{0x80}, 'port0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}) 07:11:45 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r0}, {r0, 0x2000}], 0x2, &(0x7f00000000c0)={r1, r2+30000000}, &(0x7f0000000140)={0xf1}, 0x8) mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r3, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="62747266738c", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:45 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs#', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:45 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="a6bd19ca4217055ad5"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x15, 0x0, 0x2}, [@ldst={0x7}], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000000c0)={@empty, 0x0}, &(0x7f0000000100)=0x14) sendto(r0, &(0x7f0000000080)="e2d12b3e38e981ad044b2d380bc369a3318cfcf1372ba44b4d4d1ca002d3012bc3eaf9d5cab116ae6b06262ee9fa79946af1", 0x32, 0x4000, &(0x7f00000001c0)=@xdp={0x2c, 0x1, r1, 0x1c}, 0x80) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040), 0x4) 07:11:45 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="627472667306", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="627472667303", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:46 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f00000066c0)={0x7, 0x2, 0x5}) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) sendmmsg(r1, &(0x7f0000006500)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000100)="b31f511c7f44b01c187ae6d46b949d5eba62d4250ef96413ebf6ab209cb3b16b51ec8e52092e20754d6a35e18d16d7676d9166c78ab68fce12392c85161a086498dd37185cb901481c2bbcbdc3ebdfadb15baa21f7cde5d11888c2b040d6dc63cf2892d8", 0x64}, {&(0x7f0000000840)="316c1cbea04df176160004cd20967fb18a16ad35e487aba3f25269c68f4e86df06585a190a8dd022d16d406a2e1420275c02fc4f78d9fccc4363c72a1a825779cb46e546c4a8264e10645817c4793fa06f486cd0e4fcd133e5bdea1cc07a06f310fcc0b3d12e10bef2a96b2fed35b7d9ecc6b3477d27fb9edd843d73d84edab9c232e1a526e150a919b548d94af3ab5d5d34da16ea3388e535de2ec9a273ceed03173617ab7cb717ee38b2fa2285936bdfd8a1f3a6b6f3da485e5669a5f14c216407b4b8d5a8bd17309c8bbe18870971a74e6793bc034e34e549b45d12777db2aa43db9cae264ae892f6573af2b6305ccdbd46c3c661ba38c60d79f07a2dd9a23fcbed8efba1d77c7c2187329299853b1e0bd76182ab6b5f5c592b2f0cf2f963e043b25a09943da6f965725ffe7c3a83449c367dc00f90733c7d71359f8d9c53b8816f829fa3c5b70973f7b657cae96a67fafa52c21d3afa4cc3f6ae1918e145606db41266bf7a704ebd7dc686ff503b6fc3d57f8ee33b2b1a0d13a009e7ec238cc9c0c831ec3788094c9be5805134b8d7408773965cba2a5674cc6804dd63ed8fa353ad0b8405ecd49aa1757d9a9096972469e57be0c3405582678e5552991202bf08b9c9f2a507538ce8c61bf55d284b2c5960742d8f9a5f3d753701667c5cbec6f70a09aa62f9b1da41b2ddc88fe9c037053488143c614c4515a85772fbe179e5372d9831f6589681704e1688263eb62bc298ae985489e8cd0e15859cc8a5b06c760c430fc142c7caeb91f796a98832f37cdedf1fae450b9243aa785b353bcb61c8f23a83fa6f21edd81b56965a8125d0093133e07aa11bd89c8a8e43bb1bd784b89ba0b49451fa5091164498c96b5b0da3999911626cc2b8830d140cdf5794c9dde00d5f050d985b7841b52a0f4925891938a12db97bebd077b567d7cbffffbc874c1bbcabcb8eae8b91e1447dd235fc7338aadcb7eba9beb762f0848ea09357d73a138c9eb5e9c1b254c40d2c86d8b50785e0c490838c9000c015f6ae1f5a2dd18042c4d7a94fa816bf2badc3da9198dde13e928f98d7e0a3e425abb69300f64fb1b03f2c2a99ff40382eeadddbb91bd9dee38c0c3eb6edea163f62aa8b456ae497406caf8425738c269d8f0e6ff317ff330f9243a78c7c27fd08744953cc0d8f2b052a08403c62cc3561a9b703f911258e54f4bcc17d9bde534830389a4c125f05d30a5cf6c2a20b2e23137fda27aee63b460c14f1aa257f9e093dfca9af0e68ac2dd6b85cd2341782894f8f24f4ca469ef09dd2418a0a9017ce517dc7ca950bb9db66e5c2eee386cf80514233faf90f496956b6f78f845da4a9c389de40ea0ed9f7254c06a827843d6241bffd6469d7661e4fb7b9c3fc61bc3cb030b94f987d3872184d99d02775801249ae8560e2a068dcfcee2e1d1c101b9c8f9a537de446e866437e63337956207fb5424db76adcca91738081ad018d968bc7fddf9ac2d4a2d189945fca9eb3050b9d8bf6b79fcb58c5d0060fc29aab8e8d19ebcc36eb2209dd728bf581ce2e05c6985d098bd141183f418b5486520b24a75c8a31e8303ebdc04b4c5242ede9f5dc6f6eeec60faa0e9e279345c4d0b890cbecb92f479dbb294a074fdcbb95b77735b2c62e9c2bec48cbdb1cc3ee15df90ddbf8b5a86bcbd8121eb0cf32f6326e7ae29d3a298d4c63e995508009b8a6e15133c6c19b8b394affefda7b148209ba13d732ee5ebe483a7ea59920fbe2c34994a429953c74249e4c5235c50143b3d17e64bfa564269d11f662b93396a47dcdd58dd49ad42e72fbb2488c87ddda8aef25f1a61d050f01cf0c51d2f2822eadc47a50d56d5a58fa5f056302969425f5551a3b74dd594a147b466620c20efca5ec8fbbabde62389200d1d9c7955b8d85ad63b51f37d6413cd609b6c0b63d624b254b17c2b5e00da83f2576b6b2554c68a3a0f8437444cc10f2249cc8902402d03295887fab459aaa6eb7a4dacb9b850f7551fd95cad4747d1cabb8eafdc58e393c0eb7e05933c2c57f272d31c5926bb4b403994c3846cab4b1175ddac8a8f0db76f17e7c420b4f8da9949f64ccba2a7b99228921694c79eeedabc13ef52d6c8bfa5df3a1ddef35490b07ea2b66443d6aebee8d9668d1d0ee039819865e65aa5530c686313c4eb4e23ad864bee811df1165d2e9a1143a651319812db8057023a4d58b6e9f8a2ba5ec914151124d850a7283f89640bbb3e7cf5c33f0eeaed66a41c9202d3719d6e11d9baccb4fbdc47654b7011a9401dc9c3f1fd0a0cca9672c9f3f765d5a57062aafb33a41ad03edc2d45310af4cae3c8dca51566d8ed1926e15c16010c63d2062164e0abdd2c54a1f3320ec6e37db25424036bbb805c6e5463de856f0ba692986a50af3d468430aa87e85958498791647e449633fd28a3ab32dff29dc4c6abb5aa680b5cc130ef77780293de86d68a2f5f0778c1dd3b109c5b38847ee2c25e3282c839e20befaae88e3ff457a668b90ae09c5c8c9b66a47a23668b7e7334ec4adb8f02258e8c944a818c01353b06ac99b18cbd038e4b8a0c8b0729999bb3c9f63b012f96ba8cc8789edb8acbe4cee4863d06b46da720e2058540728122b8d2fd8861bbe79b5eff28a4bb02ddfc29b40740313fe660ed66232342a34e5b578204f87f1685d289a73f20bc5311c7a6f5617f9bc150d443f328b974ea3f61c96f726eccfb45904230787c3300ce4fe2f8744ed5ca42b7fe1b1f00bc2ec984caa03b7431200735d61547ae3a1ad662890ba565caec1c48a95a555ddc9ad584a7886be8709c029f237c6a366cef77d408136dc4ccb2d8e6c4711c7ba25a1ad93a2f35d54a81c56e96f46093b1585eda8f09a6034d83c791e7478e7b4e2b725d39a5e661d20e30a9f48c5fc563a02041f8a19895ed05dfd1181ba101f0a4e8f95bbba5734bd6b34f59ee31c51d30bbb02f7b67e515bd42850c63913743bbc4e8c3c13816ee8557240c64b9b343294ce8b0d6e1dec2e2534c82b9a47bb02466f1c114022aedb78bd4e20a583a81713d5f9efdd3369092f1062a8ce18c78723c0a6a60532a93b0d375ac939b51f8fd4f4a1d08ec67310c0a307da8d5950e35d33fed510a4e08a27e3e9445816a71cdd809a193642d713c2cd2cc49de3ba6a0f07bd3ebb6a1986f07ec8786889b8fe78ea067706410fdd774efb84a5ec74d6dfcdba70f34d1a57890043a66644f8a693e988c8f533841060222ddea573f182064046c2873f6b28bca4bc292cf76d4a774f9ef9d242af8050c584ca0be3fb80064e7edad4b01a14ac710c19093a494cf2abe848a1aaceb0db3ef60f549694a9c127e0e62fd2f1ef8c93230f4f2d02c9b612da2cda2d4737b20bdc88688203fc29d80d5fbb171e0e771dfe0cc3a317ce6606d9d5ac68fe7f145d65eee965f641a0cf0289538d565274c7ecea32bbd1744560aeff09e59de0158f357b119dcc37920071c1a914d2218a7682fa64d9097ec32fdf4f5913b8eee036ca5b769c40ebf292f8ba68be443f70fb67a0b699a8eb7689671346a5162e9434ae0b040fc85ce48580fd9df310c4267b72030c691c71bbdded31b5d099ce8308e205966217d53ed0839c8038558493bd83724999259ef83ed10128e3ee3ced474a618f0ab11aa2c1c825a8595c7faa42fd5b7d72a2e30d56dfa5b7218b379308c81dd0c36ffafa965edb960652db17b4ae3c189fac2a977a287b4654bb3e58ab179be7040fb9ef99ad3882e74e3a3241549274cebc0600495216d919e76c0b98afa82cd2bd665e0bc2842cd12659b409fc490b4b48f20ca3c6b907a4e92a8ad58e15fdb6e78dc2c1acc27078dde3525645811655d050f62d1defef8533076642922d421feb5feddf312f61f7ff219c3e577fef2ea354b1fc72d5fdc1c7634fd39425b98e20ccac2d2f7c45ffd02355ef0de7c0138fad5186560fc41103d1673e45ff5c6d5c79b5bab30de6966ac1b27c4d4a1c4d7ef555c8f9b9df575c1851b0821165f3f324a6b57d8c6b426aeeabb5bfb2fb37f929f4a938ce76b836c3cea5c79347e25982a0c7d7c2e2c1891447d6bf2e62c96a03e4835f441f1a16c2fd458353b00a21a26aee3cafbab18d67e314d43483544e86f98e838f7b32679effc71b6076604ec2547f1426d6e32e83ed07a1a8e2762fb0123644643efb91f198aa0950ef9ff50a29ed99e69c099475bdade4dd430070ada0acfe76efc7a08fff3edebe031a51fa29037cc8f6fd93ba15545f65c069ee4156b7b4dd885077038ef21d40d5e5605423c485d66344243c2b3ccdd6d19b02763d5b1c2951e3efe5a29b6a2f758c4b21bdd3580f2496429e57fa28aad865dc1f9984fa0c219f755af87cd7c3d65d2961885e8352782396cd13b95138bb0edf79be0dc8c42171710f1349c0b3b2b394ddbf75a6d6c1878c5d3f30a8d40c546405609df98d938c900c1d39dc45807aaea8d4681fdf8c74aeaa7080b7ccece5a929e13bef6583a8fe7aaf2d86533f446ef148b1a43be8d7b211e1fd1288e329435c292424db48622ab19ca525827c52612a466111ea7a81c6a9a636e611e09bba8c744258e04b5747fd10d549cbd142ba50474dd5715e3df1d2c153c1537ccf2062437b2a45d2ee699f42b50c7c388dc04c5d193be1beaeaa2b1d7b4b288c1ee76cf7fa8d9d8b4c7ebf11b952cb8dc928c537da2d9ca23fd7424bf82c707545ed414ecbb33794579da8e0fa177acab3b5c9eecaa45c0410c101894fecb6e289b1eb6dfb2481243f86d690a7ef1ac6ebdb8ba6dd7a1eb40194c6fe213180c74260e66405856ae7c568e39b7520053158de19c0139bd0240e4e42885a73f892ff600471ce21ff36d89d006b02a22dc0e01a4fdf5eb84aa7fe879a306ee0718b386e639a71801af41f9b70c7a9905a7b3cabf413f0f7079cd17672984bc3984bd65645ada5b521048144c3ef398aa62c123e157ab0f213a1d8bf2b11e509dd202fd9b3eedacd50b3c5ccf1a9dcb447c3cb8174e157a20138f16246a6f46deee2684de272a18d7add40a042d526dc2ab87119014a91d119a71fc23c5cf68695cc0e76c97236410d5442bfd6711aa63f9ad7401654cb84ba352801b30d305fe7d4b8f51c71a3983cbc7b244003a680c29c42dde5afe3d187d5486ba2135e8ec0a5c95208e6c306dc02a3f747626840a71d12641eb9bc14aa013a53b0edb420086b1d6867aeca2fbd7f995946cf501e5a45bc60e85305209a12cd95a0b9bc3b6d2ca069c85d9812e9cc290daae3f112933510061de9415841a2707ccaa1608d9cbedf320c820d7e9a843cdd93ac74915412ea8f2abdcd853195a33bc554a6f6778bd53c2f515a2675cc90536e58983849119f1112758316b62865d7beeecc6597611717baa90622fa7363b2fefbcc76da3153929443948c07fca3ea4679cb48bcb6730d9d53a3822c60ef0cd301a6c267e8866ebe0757b7af4b5625812a427e230ebb3983917f115798aeb7546809ac9875a4f54235bd8546eb66a631cb4ecf1cd173bfd5d02d815cd453f78d6b661a1c99de9e99e3045fa90bd9e6334f9ee8c5fcfa53b2ea7cf3a901aed334baf52eeabc20d75732531623de30aae296bc1700d40797dee3878644d999a43658a8d70248f83c0095d7a6d6fb60e00bcc1581e9e5a5f66a236ebc40170b64084fd175bee58cf902202ded9298d28f65ee206d244382fef0f8efbccc1a32a396c806c4c76796251b7e09a4de74443a83dd4919c3717ff2bb9405ae0ac5b3d6af587f16d0d40d0b2bab901dcfc", 0x1000}, {&(0x7f0000000080)}, {&(0x7f00000001c0)="acf64c2b087a9403a08b580994177d970046164def498785e45c723f5201a1ec81b73e287b23a4d98d4a86b750847cf5dee8a31ee90301aeb33804a590af55e48d5e89ef0b38767f3c32862978ba98b589769879dfa84fa67b147287c96805473e1fbd61b009800c02411b3fbcbb0675df5ce739d3d10a87e6f2728d11351d0750add0393b13d590ada9fd2aef280ae99277ea343a1ed47b2c51f6b9d454bb784d7698cdbab0112c3aca3a97ae2a852641ccc9ef", 0xb4}, {&(0x7f0000000340)="4b0263818cd7a7acc51cc6fd9d0dc5df497cc4fdb6d3bf2295eb60c7ab2e0b47b42062989cf89afd36d530363f167c15e82a380f360f771ff1e84efdc5ed3879ddbfcec57408b328e781fe60bd5b016198d391a2a920ca98d82cfdc1377bd3fb2670dcf4a5b33c506cc80767bed4a1b13e9d274bb83c4489e72b70064858198c4bfd0af9ad0d15cb7369bc385eb48f64ad9111e3df3ae0c09e12acfa", 0x9c}, {&(0x7f0000000400)="29347dafc7fcb250681d213569154200a9b97d8ade9ddb807897991fb4659d45c89ceaf5877d35d0a214cdaa9cc18cd3ec6c0a2279fc6cfd78867c9da119352b88903730690217b3955245bfd683450270387bd754421e3bf84c2a71daee3f35b6a34e4172355bf835125f7e14cd2c999500caf3d19e12a6c5dbf7746fb4a85f1a3b526fae263b9ade6e4b00add0d5eba78835ed98c6e53593de62c162a1", 0x9e}, {&(0x7f00000004c0)="9a3d1f45a5a67eec1e77dcb3416d9c1f4d9f1b14ab93c6e5bff3ace5985a4f162a91839ab16bcc3748c0f6ba32cf0570aac30bb46ca8b548de75bdec3454de3837f2691f377432fd7fedc6bbbd0c3e605745468b57eba5094b7fc1fa5a2a459f84411e6792eedf9ed845744a09f8260b18bd381d3b1f054668e5b4217b8063314a313e61e651dd2e821a841ad6f28d18696c7578400e3486551f09ac923fdf75d6ee1bbe5a7da1fdacce6b0afc2a094063ff0f7363ef2b8f6d2d08ce366ffd24aabfdef6ebc6c9e8a3fd94699197", 0xce}, {&(0x7f00000005c0)="3f36b050828d7517b43c873edbfc06006ba088b0e5442b23dce2e248223feee373efcbff18ab512ac2e857de789705100a7c04623e8e7fb98a4f56af38fb6e157fab6a590fe03d2d17a39e1d800b5c61bb99a27f96376a6e91841073e2356715f5740d4898683f8b5addac5682ddfd11b75fe36d4d08a15046154bee23746b5a4d1f1da22f6d83aa1c71d515b982fa76da35041450cbf459323300bf5b188546001d14af0a3c0ea937b071720b4173fa063e2e1411e1d34197d4adbc893a5504e388ce65ac9e8d22b76945f5211f4ba7a5b46a8071ed1b4951c888c6e4f1f36fd984802ca23ab882bd4be01704ffc832", 0xf0}], 0x8, &(0x7f0000001840)=ANY=[@ANYBLOB="80000000000000000d010000ff000000a7dd274abd94c74742803c1c48ce2edd188c292c37ceb85e172b81e6240067cff36c76c201ac5241a4aa59808461576a7673aa2034012f955fe67d07a82d62bd9a7548865358a45dc97806b5c0309d773024b9cdeddc8e6ad973407622b3eaaca5f161858c731da8dd2f4989f97f278b001010000000000000130100002a050000592658c8a599ed4c7c34333e352ea8d6ad8f7e4205986c64c248ae5aa221f924168255a24716f54aafa717b0b44dde189819ab2fb0d784b8c61bd674576a2d6aa44111b11ebe12f39abdc72ab1b754c1e21067728cf74ca806dadf9c0c0f7e2403015f80a2eceb40c26c16f766c813c3e3f0299078b0f7eb131b81d890c83295ea102b0ae1f0acffebf6745ba87961b1def247aab9d81b88300f72f5c95c0457f33b5c47478502a26d46023eb437352e7864dfdda6e287351d7f4e4fee7215637daf6b97ce76831d83232dbfcc1485d6de9d5fe14535277d3e1e6e456d759a1e51c8ed686f5b691e6f6a03828dafc8b5fdaff1ac1091ea3671b849ccba122cd11bbe156e09711b48fc67c0fec406518456f12c68d3219d4f8a0bb4ecc88484580ea9fd93c2b003c674a385dc7146c016a522deb65de0b875e0e6128642385d51face81c02424e5cc502e5a61ce351784ed813e22687da27f40a25e1770c60342e4567bc2c0ab14eed7745e89b97ee593de85fcd55ad8f100918d606f2999c8d31efc75709195c4a7f54f292b10403aa4a12b8425111f1ec111ccc9b6f27d271e3b19474c8d42a78135cf9c94ad32a2f978138603ecfbef83135a614b907cbffb1269584fb72a62b4d75737d00d39532c687d779e0cb025598d9964c06c5c77f7bb560c06bf6c7fe4110665b0c5aa92e2ed80a605f59988a1ec27c91bad0f95ecb5657fe5198654ece3c4faed761393b03373298ce2b3924f4a2bc6a77bccae7fe6138ca1b05974f5f3e7d52cf27d45b5f686da224c8f9de055de7cf81ce868730151c7d018e36c2c9289c442d0cc31dc79856303106d08a03b2430775b741370ab454ae4bc55ca1fb373e19445199cb1d26399815b2d0fd73786ce00abb2a2fc16332843ec5022a0a7a93e14bc08b160edc92b2547164e8bc3ccc481963dabdee6b3dca2e32412b97ed8f77b6e473f092ea38cd344daebae5b156ba9a42c57a5fbd79328efd73cb1f02a52c813a33fa3eb3cfad0ffae1675cf5930c89840cf3d3d9388598eb9af115001f50d39ce0e56e90300c6dfdbf5aff483fc2f0dca02861d49c7ed8af83bf5e7ef667d52e33d0e50954325c8a0bb716b3113e85f8b76115f9e0bf80265d1167377eb93bb01a38c1c45f5d1d6d8d6b314612d43a28d9c977de3ee4a7db6ae0d4a596109a7e49d6622f3fed762021adee4db557f54fc9e4d9a8ff46c752bb60408fb22f57dacf86a62d7ad1d0559a5552a6760aa18ca71ab5acff65b315ef4847abc6240466bc9481ef507000000c50287ba2f814d1a5aac2e6e89504a2ce29fb91d2d93b7adc2995f25d5452086a3535bddf06842718a2360aa664c7f58c9c222b99f24278ac0352bf8aded01e0d7cd3f509a7c62dc775e9f61ac8b66c4560cc5f8844008d2e57068c1b99a78ad7bc0de1ab8e88a60ec496f30508e08865d2b7f9018a961afc47a99a34cb4e97a7c4f50493af6f912df5078a9e4fa502a5493c9a3022121b2b8df8ed73d18a828bf5eafd83757f033f85fe2284cb53d55bde7b97a12f3ed356f891724e9e4e305579a3513750f183dd152cca2d9175eb7effda3dfc9cb92e8add1c1c41bd620077b0030cea39ec22b2cde7eee795e76794f983d009453275d80673134f143ebcf3e4962f7b57e28aedfcb99e5c6026991d0588c4cfcff4e7ff6d431927299bd53cd1ec3ea958907ca1d6edea909919beaa557c63d723581de225c86fa2bc17a8f300049f1ba4bd7ca86d669533c993d23817f767e655784143d6428ca87f4a2b44f19d88a7a1a7eb4b1cb2345649dbe8b67fa99d595262fc96a1becfc049468f334b940ea3abcd6b955bf522ccc3c8b252c6c79a2124e9939b6ca8c7279e3a866a023ecfa6b9b61f1f0f5721630ccd1573a0f60a4e57125fe8ae262e3ef2b903305b16bb5a91fbdf0bb8cd2df1174dc1ffb3e899b90c7f2564b22e70fc8a1b71a295a2eb7c7285609f90d70cdbc1e3cf11dee771b615e9f66b8482473bf4f374c2d64fa6a4336e0c4f4fe4b207e6ff999dd89a3c4015d63c51501be97bd28058370b534e1cb51fceccd916326ffe7c57358d51ae6e01336003580468cc70eeb4040cfbe26e78a00f38a7c2b7d565d206e13abbcab3100b6a012a5cb53d9603e0226093aa500b371dfc16cd3b21ad22084530837061d31c8414d10f0f98a842361dec3d8893ed798b9edcbc6524883ed31b65772e00e624796ef81b7001acd1d63f26bbc141e742b1098562c38fee0a7ff72651c703a746e476159b72cb0a97a4d18182a188c70d11148fa13b272f7b1ed5e8442845f0bcf816a55301f93faee586f4b88c4918adad1a6c4cbcc0918cc0cadf2fe31d8e9db0fe987e5aee56447fc4fccc6af73519298c59b717028fda5f434e7de0c5d316b4f4d0c22350462745134129d18d3199a3418e1a498ae1be0f4801394fdad5e39aabe8e557ffd1fee407489a4bd85a23e62dfb36ebfeb3d883bd87dd0537a0fe8815bbbb11dc1422d5fb875a2722a5aaf956bac8b915543f20f5bb25636a54e3267b3f3fe454bd825eea217f3cc8f25fce6b02cbafa8a256fc8b8a5004abfc0b6bb1674c5f114c3121d31ff482d2be52cce6d58d5f49a58f19fe369ea226ba3896875c020b42da094f7194bef978bb9291f12859e1bc96e35e147b1eec03fbc393c2d34f61747daebe6a69f6f7c4035c42441bd82fc5c1f201ac4e8ed9a132bc4919c323645afb27f6c3099ed69cc3adacb055b9e167ab7bc810caf712b2099501c7b287e609bb930aba5a09c872b1b2127dc20eb33a9e1816f90beae2de0c570e65700f06c3a6635094fafca5c25046832b72f5b129e39110c2feba4051b2409f6aa03262e0f228ab69fd3e814895ad3dc7fa7dc2f8cbbdb0ae85b3aa3cf8d20c4972a4348ba5ac762c58f942187a23b00f81619fe2c114c7ec4bcfdd3dfc5253266f6b981087665af9877cce7d4c0b3403742f21c4f343125c9eeab7a2de1863f7338acaf54d85a17a81d0eead6dc824ad448723b864e25e80050510dc953fa772f037e29a0edd013a41f3a2c98d7752707f3873f9a340ca23e197f7ede87ccb4a6f9be9cca7983138681fd0c0f3e3c5ce7c86b352557b1f2d24c0a27de3a813c24bc884ebff404d49a36c8fd1cf2aa98168edbf0584da78f30e724fc93fa9c8c7c0c407f2e983af0bb188340b8ba9716aa22ccf9850672e2fc4de0a346001351ba9cdd4176e53660d8f59b1857aebdce911c734f2bb516bf9d7de04545f5aa21e9a1dce191010c101c85730dbd6ac239a53cc2f2639b4f48765a8d4180c14cfa8f4e96161d1b51c007687982761e2704e5d4b6a4bf91b13e2c69ca46f6bc410ffce85fb35e7c93e99b6c61d5d5dd77f1ecffca02f247e8b6cafe54b4390844353dd28dbe14ac3cc8fff31ce032c539aaa3eafd094e0fb689b8a469f9ec4e928c9ccde59c02ac523ea28647aa640b55390d7bed58f4bb18667c70a468b098a6b11d087d98d6b94fca3dc1e496e1075994c1c2d752bdf4d54b8588f607b9552ed8cc0da522cb44344e2e9f636532581fde4afe099c9e4fb3fed9a9b3966b7c4c3349e1677cab0472a27be9b7acdd21cc18ad58b258f83267421049a1bbb1a7cb38f6107c0f1e5b60bc5f39050c61671c8741d5d586c212719ccfcbb353d32e50193996a8fc5898a49ef741b6b245e8f40329ea6034502e2780acac6d95a77f15d2080c03c5c749475012157d54a0ca99c0b7d818ec6e3a867c44d5103063f6a10f1c3047855cb9a9ad455e20dc5674093d4c56d0b9d0602a0084fdc7fca558f7a0a15c6b067fb4bf4e01848b3eb9a08fcace8eea34d033d21b2d4d01748cea4bc972b92a42314fd3c1848a5b7a4533e27bf9904403e7fca24f1a8ecfade9dc7e899740eb773f8e087a6bbfb48edf2f7d36cb544c4056d7e67268ae1d42edfe0cc6d7089bd41621623980d6b5c2d5a7d933fcb5178cd45cf744ef861195e75f5df0d435a7724cfc070178d847bdae5c3fe2c7d101d55cb0eb91a384369807fef498938254041efc032cb5520b6c0e6a44fb3c068f2e03cb7ba1ebd8e4fdb3583aafa0072cd719868fff7647c4c544654ea7ee7c5c2e7ade09e4cef25bc2494beb826193b9a9ed7b4aa302b7e2ce9a252f474cdf22ab20ab012007d29fa09da26e988ce26deed422213169fe803e1acd5ddd7557012b9731f3ecb7cccb82fbfab08cb32d4248b1641d6d888e23d75204dc37c83dbb1d8919069dbfd83e94838a69204e874f58b023c4a142376f01722387227395493a87f517c11ed5b9a1dd72bb1904b0f04eeda91588f9af59824e43371941c560908f2e88deaa253f665a7b59f73c794eee4623273506d31cf39d40f41fb3ac87656722488c896fe00113dc340cef6cf4cc1991fe1a3007e968f026dc3e979d1ef253d1fbddd568e977e95a9d8edca4823b33766ef78aa385c21e7f71e7075360240a80c8a0491803766c0f9e45b86a8b658adb9a681ed4febc2a66d22d5737197cbc5f171a6eb60bb6fceb3f68def5dc7b44c54af961be85e48992a69882ec16bd1dfba3cdddd69427be309f65e9781cc974df81050134206b4c95bb6765cb1ab18237e0624398be86cdf314f86710c218d633c74bfcdfb595088cc7b5761e411fb9da24499e0a3315596ac4287fdf9bc9ef46441946aa1373416d3d89a8eee5c182bfc542d6fb24e66c990ca9d36c0792df63f00c69059f84993df65287807d35eae97242c4d68005cf1cc98c5f9f24c7f36f9cb34c3efdc030911300603bad4ba4000366c84e4ad666fdecb44633713414b50b7cb38b2abe1ec28e9943f43157982aba5d7d9c396c227c70451dafc5ac211182417891d6b1d2acf16517b940e815756c3dec556c05ba1efe66afac3b3879c08ccd6c7922192040e67b6f6d23df47bf6635d245bb393dc44146a0afc43044acfb1915a29cd88d0cd78ee145a697a77ec450f75cf76ab738181dfa1f75072ccddbe21a266659acfc3b60d78abbe3c4d853cf1e9b80533777245398e30d1641da0c8d471f484ee2b6473980800a33fae233fbe5112c0f6ef1f9f1b7ea379625a02d4dd0f9d276ea48d1d5e68f8990abe500afe5a899220e025d44dad6d82d59ae8ab57933d7f329563e3c21a9daabbc0b31bb8906dfda32ecab18b0518a9af4b988fd1621d098199e172e79a7c301639d93b5a1f3f2853a78b9ca1391e2777bbf60c131998fd6ad169b23f2a5152ccf699d0bb05992e98e07b8e1d10b865979148f9c45d6bd5d2c975d9603ce9f8e09749d623555f00b73bdcec220f2a95655b5b6f1d95708d9b8aeac499900d3ceb10c4c4532181808e82b528ff96cab307241e6e324f61822d089657054149b316744e7499925dc6244ec651955b305ffa90ed1b48da4800ae5dd10a740afa12a12e4a8ea64dc46067f821c31b19d4a7f137ce83430067c79a429585ebcd19cbacd060270e58f809f6aff4139e5a9a860c37331fc8f9b3da2afd6b8d4631bf591087df729c0ad48315eed7fbd1cbd73c9f2002477659d7920487076530795130d59b9fc5ff83a083d322648ea9b8139a36454a9fdbb40778bc231cb414a90c6cc61ed012497b29f5ef276a2fbc2166c089c6c1dea49ad19c27aa207191c7f562a597c7b57eb8fac245b194ba3c97503b34315f151ed5f130fce015712b6514941811012338d12c42a5528f4c9f95fadf4df334dc5d608c9ebb4d99069493954c0a5de7fd33891fbd341cfef151c8f4c15f1f31154c3bb3efca32a68d48779e000000000000000050100006c0000002724b05604dfe5d70dfebd8d00b4d4135610fd775734f1fdd7cce091287134b1bc47537e31d9c888a8e91d964be82d9ca55f2e57cac36c381742509810ee741ad32a51b87131376c140b3f4808fc2be8a626003e26f16eab25fc0a8892ace81241612e3e3e2c38ae8707cd59cab0f28604fc2e7a2411e58965038fa55463868e1f75a51723bd1f7aeba37b576fa5c9b531b3c3a59cc12814ce27a6f028884caf26bab76ba7194be4e27a9179bc27c6c27248c54b8d776750d7ca9244dfe54d8888cc6aa398c9c400e1d144cd1ce900003000000000000000000000000000000068f158f26dba6275cf92ced5347bc4a9f5ef286a9e66f3e4bb1d568a8e55000098000000000000001100000006000000c630cfe80275011dfb0222966c7a70bdb029d291f2245330d6a5099dff65e6096a2288a732e3baf1d6aa4b41bd172c9b681a63410c6ff2824272ae2c1901bfb5ccc9a0367b0acbd0f5181bd4522a7a6b00599c431b14ff6f1b8f0f7bae04d8d89d88a504ea945a2d11050b51126ba01d00daf8f93fb0f7ec5cd96a1af2c73de1d82285d559bb61"], 0x1238, 0x24000090}, 0x8000}, {{&(0x7f0000000740)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @rand_addr=0xfffffffffffffffd}, 0x4, 0x2, 0x3, 0x2}}, 0x80, &(0x7f0000002a80), 0x0, &(0x7f0000002ac0)=[{0x80, 0xff, 0x100000000, "652ab2020669f66c7bdce8e2ed0ffcdb1728e97b6788ab372b6cfaf986d7e1cbfaeb4b508c6753561a4a41b6423069e76f616b7be043a6bdc496b41184a3d9107151f815a98e30c02d78bf60446a1d5d1eb2c43fea2938a090be7690cf3043bfe32e85b2b7f282d27d8c"}, {0x48, 0x84, 0x9, "1dc4b53e816e515681d6462e5f165f46c0aec619d3d6e9fb76dad16fe03f745019d18c70d06323d2bf024f30d279a2dcb774eb5682"}, {0x18, 0x139, 0x2, "06c051e0008366"}], 0xe0, 0x4000}, 0x4}, {{&(0x7f0000002bc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x1, 0x0, 0x3, 0x4, {0xa, 0x4e24, 0x7fff, @mcast1={0xff, 0x1, [], 0x1}, 0x9}}}, 0x80, &(0x7f0000002c80)=[{&(0x7f0000002c40)="d708586aba40bf8a7ada3742f9c7f4f8e23ab88adf15567d5dd99c35310d9ba692acbe032bf7112257b13384db92b4b1f27ffb17decec5e206", 0x39}], 0x1, &(0x7f0000002cc0)=[{0x50, 0x1, 0x6e, "360d24238b0b4c1e807b273ca2d47233ca5976ab19316d6a0b46b378a9da7c2f043d09922af8822b31f344ffd58db863017661e871fae82a77"}], 0x50}, 0x1c61}, {{&(0x7f0000002d40)=@sco={0x1f, {0x755, 0x9, 0x80000001, 0x5, 0x7fffffff, 0x81}}, 0x80, &(0x7f0000002f80)=[{&(0x7f0000002dc0)="6c71b879ac8697a84a95a1c3f7d43af52738b31baff095ab1000e67220087f07adc9239d0ac8b86b0113bfedaa3c61f39805e7346035d918cded7ca07a8e83b6d2b49b7671a6345354d32b4165c7b23b5493f873f614f2f90b75a79766479bcb12fa8d2dc375a252b55dd249a040baceb8efef7d27522bbaa6fd79a1ec66fb6b27ab12732c643c9e65c2fb0440000c76fe70346e1cbf1037ae881dd50ae7196cc212eebb0aba0dbce1e08f33899fe8977692a1cc877439344fe227f51a50571b438e8fd2c4f8968ce8", 0xc9}, {&(0x7f0000002ec0)="96f27cb209d40ff9c1d808ef68c9b702bb3b9e6ca70af874aa7734c3ce0b2b2e9be73947e7e2ade950412d7ed60e6af6b429a3a9d651e919f4367083ce8147c238e4f358e90c2b55e6fe5e3e8a2a1c132dd4a4018420dc670850cdb44be9916f37c9a1dec6350cdf83e3ca777e84d5e9a9e82017326278445c85790765899e519f733990d2e6a42e3e53281a20a9d70ce84fbe86d18b2e3679161fe28031517cad58b8279b4e78894b195f829cf6ceb4e43028d8661aaa341057d1048927", 0xbe}], 0x2, &(0x7f0000002fc0)=[{0x38, 0x1, 0x6, "4d52a80abe551457165d54c47678279869286eab742bfd9d33f321f1741a7ca8fcc94588"}, {0xf0, 0x11f, 0x24, "f2970dec185802b6f7eac70292bac9d51aee3e1cc59929a72da588cf26d88f9eeaf68b45d4df78c51afa64eb4734e3ad42e8f297367bba68b56e2484815b840c86f482279c641e35ea5d4efbc396243aae8c60ac40456416e69ce9e1b90d49ffd59f729c17fb584b46128868e721ebdb3222b5efc498fa0daa7b3e3455f7582ba82148c03f2d0e5555a32da5ea76f529c3af97030cb5282c02fc449f1ddbc4ead164b64b9a04bd8ab3ae093e49e569abcbf38118c39cb6d8c0d46572169414d2cb84afb5bc5f21911b706c01de944631e9d177a36b4391cf806edcfc11"}, {0xd8, 0x0, 0x1ff, "99a8586fec1ead5b217a201bc263e5cebe34eb0247401e9e1cfae56962c3c9b54d51bac1ab44d30d979895878d04bffe211f95d975bf1f057380b03920059a361d2c15bd3e43989fd5997ea91adec79232dc0c53a752eff16923c881cac01ba2002b00c55109d0bd41d6d7a91db6b576502eebdecd878ebac796cd1f4232c1171fbbace3a3911639679e577557539ac5f2500afc135e55afaa3d4de48aacd241f48d2827849725d602b78c3f7468d0b72ba78c479920e778f745f6593cf0a980160f2899861c3902"}, {0xc8, 0x11d, 0x6, "1ef6b584f14f8c3d949ef6e145f5fa5f8b505059995fa58039c47de8b15e640e4d967370c943df7d21a167130b3a64cce4a250d4ead1e638a69924d68ee8023e8fdc53cb9dc91a1c0c6a0dac754e619fa13b13c99a4e92eba11c67fbeed20315d796be635e8ad9cf5a2683b9c7fdc212c71031d5c5913663effb94a53d56a76b064b4ac47c464dd2e883a7f789fca31c3479003bec0ac43fb36dd2591d4733e6c2554ec3ef02206cad6017307d98975da8a906"}, {0x18, 0x113, 0xe2, '0'}, {0xa8, 0x11f, 0x200, "989cd4845f451587b01812aa8308a3abca85df28a3939ebb147aa350ddbe5b950558f1379fa006901cfff1e1a7d01c0ea2e79899c5d2bbefd1973c72923275e540aba449894a99e80fdd2a373c4d2508ad991098c66dfad5ddf223d327538dd1fc2e777c7e6b0b7f1ee60631e6ff4e9d49599c6fee8f70ec54a362207451ae0a835d6b8f397ff3dce1d07fc30a62336a25eac985f9702406"}], 0x388, 0x402b1fda0269d1ee}, 0x1330}, {{&(0x7f0000003380)=@vsock={0x28, 0x0, 0x2711, @hyper}, 0x80, &(0x7f0000004b00)=[{&(0x7f0000003400)="c5ed1b6c3fb0fffc985303915c03038d816c6686e02b1c911c6fa93ec91a42382f5e6a9eafd4798c04289405611b407e5bead650f4c11e8dccf6f1a63cb89dd128593fd39754a2f81bd165ca1653d2059aaf9cfe0a1c624b91ccaae3a420e875bb601d9f457be815b2b1de63b354c6e482a22ffcde5909efe9005870d86b78232cd278346961b8264bc8e29473bd0984adf95cf0ec5f97ae40dc9450d0e8e21f228e902ff55b8c8e763705afce612328bf39d88501972425", 0xb8}, {&(0x7f00000034c0)="39bdf30ecc8516f387b36c27ec218e46808c4d2002c399cb2315de974e7ec0de15a9ba276fa4bf074ebb1b771492d2c31574bd6aee84ba7e84282a79aae884fa39c73e9166cb7219d7a5ae1f3e4ab6dc0eba2e37ace70999d8ec52785799216ee1eb949a93dfe04c092f", 0x6a}, {&(0x7f0000003540)="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", 0xfc}, {&(0x7f0000003640)="7cc265ab3d848f553d42a4163c4bdb43af94d91a571d8cef5ad4d4e067157ef22955a2871e5dda9a803d769ce59e8deb7dd213e548905029b6ad07459b1e6b5e820af7dbf190526bbf740edb8ab6e50b0f686d22559cc81fc1c9f984c0e095fcfcde11337d7c113040d7177206099687f33cd8d360f8c0baa9a5063d7b68b2fd86433c6c4633a1b2f19aa959e915902fce2250a623b05fd3e52e523cdbd997586a5c2095ef85ec95dc7e569090dc9b3fd5228f3c39f7919282f472cfa4563b94880c9903d10414", 0xc7}, {&(0x7f0000003740)="66efdd9e072250487e48c7fca94d2190bd502f3fe09346349243d65b74acc8b4e50b31d6f65118e2ba4accf11464c16fe7517956819d027dfcdb2ea3b0495b15bc416fc064bae75eca41258a522d4a7cade6631e8b06f7bbc326acdd6d92495949588f5feb3ea86cd33d26825825182ce609e9b6bd433c0bbb1ccac1574b7f61629510df730bbdd6d9a3194ad27be6065354ef2894e6870748f00beb3a9468897d46457cb999c6987274053394e41aa733af54304f6bbf4b1081e8591ee7280929520a3b9a3abcf8c9e1c92d55f013334cb8f9b814f8dc0cd308432f7957e6943a90c83328", 0xe5}, {&(0x7f0000003840)="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", 0xfb}, {&(0x7f0000003940)="9e1f084579f55ddff79918af8ebe51a8c924fedaeecd3085b3eeeb5a4666a1946ba902f462afed8f1672923ecfd4910461060e1f1546c79b7c209475e8fe897cfef28805a703f9ffa3fe54c3504d12e5beab3b6471adbf6f4bd2d9e3915264966b77478e48702de17e3eaed483e35c86bc1531fe1038d701c267bd0db422fff4c4759521cbade50070fd8ac6cab89d175ab5999ff1f2430a56a1733938febb6cac8f188d18884d2c3311292736089f", 0xaf}, {&(0x7f0000003a00)="4f9051d2d8bbfed12a62c23ea6193a70d09951c1610f33ca24a5660f0f881c41fb9359438e40b5bbc2843895edbd9999a3189659617ceb87265b4a6107875237fb46a4af29b721c429a9006b214e613464ce966a09f0a5d566c703db324fd6962627503585e19874602296f5d43b0a4190bd704ef301c569cd951e0a9b97f1ff2bf512754b090c763f7cbb90d9102b3f1efed801de731c8c8f54e02de2b69d75dbfe5c0eea3372568a938f5318803be8ba88d4177a4f7c1ace01cd7e1b2886a42302241bdfc7e5ca180745ea1f92660f98ee0b7e781345a49ea761ad1b91c2aea7ccf2f719f0106f05fb9bfed6e0f0e76206b16fdb518007bbdc350df2cef3df17484d810276f95713223ce06689202d62c5c556cf8687d678efa8232b473e8712527f3b1884eb2dd39e2ec546d6f7814ea8af41da3818740fef501e0c4834d06d71d4f17230cca4c80bea9365dad3658bf1f1bdfcb1876eca27e05941d7369bbbe50a1b4ba6cace8f8e726d6c6c53ae2b4208b27daf5ac2639d80f4a32f36b704acf76ae0560ff4ce26b3ef9f8e562ce7be54083fc4b35414158d2a7e01b723fbe5ee7dd438f3dd3b179607709255bd7d2078516bca2b0b6f39224da4c14a60e69476a24700036a052948331faf9330a61864d4086edd575c56d61a7b24f36c1db8045145148f6538138f5f379890b436ac73f6f019940fc3c84be810bc9f9b22c7785f2e4b9c53e19f6d8771883a6b27a590beafe4f53805e8a61f3ced45365f61d5fd2ed149ef9385a4ca221f0bb41d331d2c2118f5e8b89a69e7625d31ac1aed99a184e48eb9e848284fda79f4c3e9fb895d3f9e63ddcdef41f333e94b22f5ddc3ca79fa83b1d18c6587727c4706350da76b2a7e70ef73f59d82f589ae4e41858696f3336a1d479b326db13dc9dacf9a0658e6cbde354f1888ba76f1c551738c6d7dc06089ddfe1581ae79df351cf2914ff76e7a0d59a53ff2c95747287be4ce55fe33043e8b2e052ff689af02db1d57e26aa30c6ad1002433e3cb10afbf25b88eb0dd14e51dd318e7af2ba663116bf5b9e2c562a01eb918417116d40d6bb392bb5e29636f1ea3521c64694ca45924f7def2afab656b55af1e89aff82c5d6d4bc06f8594ae0d3f4bd2c5b2a3fcdd246bdf4e107375e796f533bf5be5cdb2800f2a371d3288fae453983fc7534594b2cc5c75f305ec4a951d551a1dcd580c0b367c8bd339f577000acfa77c5317aee8bb34935000d1fca179af91ceb0035a59b549bff016ab448ea2bbe459ec0afcf7f0c760ce0ba77a0c98b93fb5e60d364ca48c7888b270a6403aaced944957514265496a2f47cf5304df6ec285af7bf101fcac9a9e39489ce818ac5f35aaf654beed81d3ad8ec7a128aff9d326bf66078714c2c3c0b20038f7b313d272213d977e79c1ce749168f933604366b1e2ca5ef75a738e1bb940dc355020b2036c928b8b2ce42628546edf57c5a0c125b3ac8bee9b9926f2b2166a949de33d394328d376d21fc9de62eb0b6416654deaa50f199628bc2562a0d8adfb26546a58eb9a045ff4061a50b1424cc2303ba9fc67ef685b2a2b8bc09059ceea03a5c7a257397fb29cf42b70c871fb5fa72a0c94c289770fbeb862649af064814543d2b0d965208d77e26bd8e5fe63def78a1d418a9925e991924c455dc48fc234e793b8aaa9f732d501cb16ec903e95822edfd6e06c4d2e062fc265b3f8a0df6a66e13ecdb6b0ffa867d7190f28bc92869aa2e9e4f937d94583740618ab0e3c5b1cab10ef9a36a18d6da98f9fe850517f6d8ac43772b123ebf7812ffe6f670fb40fbc45e7febcf04652e1082913e61b281977fa2be77659e02a182b66e09de487bc2970288ec9e2d1053c325d84168fc881ae4ee8034e8c0482fddec380bf244cc590f44db77b0f4f0b828802be91c63d986b3f65564d961a522f7dc0cfe69fdf94a5f5a0c1135f3a1ddb3626fbae7d088c55bfcfb5a7ca730c7ac01ed6b146316ddcaf91a0aee2ef0cc9d5d9818759b5059fb77d8ce530b8aeff9d60dfe2b776375271871f4bf14606855132a85aad184e056110b7b52dae61d4040c649148652aaa33ee8f5408629980c336af99198ffb349242270f65486757edc453b65f4e6af38ff4e0f128a1a6527fae92b7a7f69bd2921e26e6da2d06f65c0045298bfd6d02d31b89b4176d5627c8fe5274467d77956cc0d800b89de1f01b51c6fbfec8874e22f080a663dbb4d7a6f207094cde5ae2e9d72f16dda595c6ef33957bcaa29af3cf8c7f81c84dd2f78f47bcb31f67b27773beabaed583de263bc8def4e1e6ef9cd7d1f1e17a7a417a84ec9f27ab3fa0ba59a12bafaff9600f8d4d91904c6045c699e8a22c79ea3ceadcab2a3ac8ac7f5782bfab36d79f156e69ad877dadae1f5d8a5282ecd936d3ffb0e0aca212f32033b960ef7a761dd1c715ab00925e53e0f15d9a90695222dad19d7607c4387271bf6dbd659f12c0c5fd1ab49a31df5c61ac0ef763b58648b33f3dec2832aee96cac7e2819c982bbedebb0443e55ec8f8a537c3c1558bcdcf81ce3ec3edbabb9dd44e24068b8bb4630bbdac19e31dfac5fb6622271d8a82074faff430e5982996a71331c2859ebe74fbaef51014464698a6bd2840ed1a44b4e2566d784e7fb372c5f2b413ea36dc0ce02f5feaecb672f23f85e727a9cf52865e7504eaef91cfa5eeac8bf474ac2a4936ce0648a84af676911e3e76a0e81b536936d12632058cd0f94ae9c372f31fbe81bad5d6b4e878e3c73a4393aba86e3219d70273f4dba451a5fc3e19f18062b6650bf80c64b81a79815d47a744fb493f808ed11597d9aeba89fc013425adc5e9c9af073284ef6a54f21500d6c478e1e899ad79c3bf4e6e4fc192a9bdd946d354751a01ccedfa9e53bdd349d740b1089413f1d589feb6d3b94eb6433f143071eb1fd29477e8740d56410327295701b54c7f4f2895bb7c1dbe1f1f88a32d720107862bf53fa6ea7ed8dfa65130d50fb9139cf698109a83bff3b1c8af86ae9feaa42ab25ab010fe46839007bb4f65510c3e797004873f449dec48fb937723339d6188038164aadc2a44980da4865ab26777c395ee86dd7630a4a52e813fe48b4167b25c6028d2dc2f3c1de212e1dff7c04f377626a108ab63a05b03250e8103e640a5d654f1c2133aae1f131b4c31a9348a6eb3d5fa8728b2262f1b6ff29234815a386557ea2a6dee0b141876340bb45194879461baef0fa75fcd1e0fb4343e6a48df3485e19e8a30641866bac87b6cb4034f8314cbfe1d2c919f43d2318ea29e25057ea1eebfd3f4e2cf286f49d4466e2f04e73310cb6fab294d1cd9711a831e052e1a88dba3a142387f0e85c3fb91fd450b54ee786a857139a0c237edd8f0ce87de913a7d6f637c553b8589f5127c5f7c725976487adc8c2ac1c41e46db19c407ec2589e7a52a1a89427b22b0f1a54aed118c3476fcd472d157c9c02a2519275326b8b5f2dd240ee751cd6f6e4a393023be2fd4aea8965ef53ec205fd18ac04b06e976103577bada326422adecde38a34b5aac1449381b9194aab179ff86be26b48650c8e457d9f43345d9210eaad87ea81098b99efa73ee7560ddbe9271b72d34f6d6b16a367e37e9a10b1bb6c9270841fd1b88acd42ebd6504680bc48ee23191f479f79741896bdeed6eb173cd7d22ea3d68439c85e8e7eded06c84f7aa2037de1c29b7f025b49d4e5de39dfa0c7bb7b2a7ee481a01e103cb28bc5f0acee6725f0d21dc72f8e93f0cea9978aed184d279a42b3934431ccb1b8ec4ae3584676f4f16d16ebc8822cd2df8ed65588066335704bb4563b2e839a8db1e402302bcc10906cbdb516bbd4277a90aa539de2cc449bed940869d27b0bff1441e0e34dd6ad618dfe5acef19ff0cea117b5e24ea8e20631ea057f567e69ec9b94e026b451238470f7c20bdd65126ef2162425fd3a60136fbe9f486124471c59d769c2c154a46e1326e761ee34cc968efbbe0e75aaa59760e73c207083e71bf1f32cf42d3165a74d37a9df7e10af97b82c2558d6881dce5421692263eb5c95ed98d5bbe220a840bc0aea7a669928755046849594eb7dc3fc718c7a78581ab5e0217dc64454aec48897cd24a76097a85e127cbbed235f563c91ff9af9a8872ef2c282b4cf69a411b82db0d2925dbe38ac898f493b36c5682279cce57a17fea076a07e86695945ddfd06ee6a5eb67383e9f19d22047b815f78f3660d2955e14bf96d395f855fb65842c48a3f2e2634649f6569a5da15fb45c515ab23909ebb31b20ec85123cc6a3ba5ab3da728eba61c17abaf34d5866ae7cce0c40938f3e2af719467b79a2fa6eb739d90df36d7401e133e7afdc5fd36a1b9fdaf4d514121ecf65f867e5a7b931ba7965ef6faa3e80ac8ded16498798c12bc966fc47113ba6010b8b2e37f8a0f6d9738784317973135b6fc43ad3a8a3141fa5b055d68dcfa0634e2b73bc2c9e1537566a70ab161f925d097eba5ce8552c94c356bfbe10d6400b323a05fed7e17d84ed4d38805d795f6e0658f00d6baa60d5555b399ba804bc401fc04324cb8178703a27c282e4efddcda56404642e483c3c27fa60d7b9b68fe49d99e8b89296b537c4022f4a019248be2845b52adacfaf80bd609bc0be0de20af82beaf1bcf07685bb0dd2e50637d4a070797cfb5583db5effbe66b2ac27957001adcda01e516d7a581f680de606d7259c4314a83dfca94807b06635b41d75460f322c8d3735ec4a014cca1ec4110c203ab41d4273c81c505ad15b575648f849ea90486b6bcfdfd097ea14d2a8482ac7634ddaf1edf9e7f2b3680d9675eb38b0d1fbe0501def94468e1bdf49235728802f2f12ce66860423bb286178e997dea19fd8b19d7342d9f00f514ea0b91a41d2cd97b76e70a4d6bfab7f73773626c838fb52171207ffa63183fcf1933e2f59b0b8592981ec97c13f8901df4804904ddfe581d849af0a80c5b8fa44e6d1343c611c5958bafe980a8e57bda1b9c2848174d65382bbb51beb326bca99c1aca188baa3eccf9e5e13729e2289657464e04f4ea868e0028fa363bbbdd6645219d4662499e3ce05582458fca0b8e20d6bfab67e09324b7aa39370d580bbb35898fa676bac998fddeceb923d94b375d40a772c2d0ccfd65a19178277042543ea01b80a62f4ddeda0c21a3c9ddce88da400c33f341deec77dfc4ca121cbc15b7b1a77cc6c9881d84023880b341182e0e35b42269e888714ba87a8307d899a881bb76a346c9eb6224936346e93670ba86fec6f1b4d5debdfa01f778e4a472fb0ecea598237fd3625bfb51c1f4bf1d9d38f52de9297ec2c15461ff1df17aa09acf56796ed475eafdeb0aecbaf541c78a865bd213f7e9b125820ac6c2ce7db804e0f3321f287cdc650ee5625e1308d956631d658f1987ae7019b1fd683bcc5f50c5a6432bde4b2accd0e5abbef8bb62ebe2e0899b8f3ce82ac60ac1d5c2cfed002f3afb4a8eeb3be5d164a43243e462c7c71567af55f97979b4cce53715d4b67a87c0bdf27ac9679cb2bddf46672257ae7e01197381c00c27dfc023f8484bd34e663aae7f8db873286f57aa584b8e232071f988fcddb9eb51f1f760fc20c70dba1a4f457626142a5d98882a3f89b4ee4f1ee54afa42efce7118e090614f67d8bde40b807368e9b28edbdaa076a41a244c626d8130a5433ed8643af59629d67c11306e68b5eb1c6fefa7bdc24258a301b82968d46488d10103d420378cbbea56b29617ffef3fd065280c8c5832bc8574ef774260b6aedd9e4e86", 0x1000}, {&(0x7f0000004a00)="c67653d8f3894612009a9e19468ee32e1161cbe954d00eaa212a3768ae67c18eb81a875fb058f5244fac55d173d9af8a69ba3eaa089c57821298f32467a122225858008dfee2912df25a93c6735f95030f1a3d6a0ec1d6c5b2dc015868c5adf31a0245889ccf1b477cbc1ffdec7d6105b3c254daf32526e5155f21dc2ad2a98fb7b1574958aa009ffeb7a652e830c0b183d66cfe6afac2c20847f3128ffe290151b0cc092cf03966f02a90cea87e39835a3e1eefb2fef13e73b446d52a6ea0a4b2936130dcfd0aea48f92e60c2da9dbaa8d741058a47e491d19e748ebb982241", 0xe0}], 0x9, &(0x7f0000004bc0)=[{0x48, 0x113, 0xb2e6, "6720c22ca4ddb05d08b3c51e8d602a03043cd62e8183be1cdb83358140f94ad84ed58594f011e9b62f3c7e5d606ea88e011f8c0265b8aa4a"}, {0x90, 0x0, 0x1, "83f9e212e50b2a081b395e7a537e9f7259e673428bfccf76aa8f7559324c038135613256f01c4721477a0803df255cfe3fdc798e2fb50501a3fd07cd284d716cebd565306b7d58b7d6b9a449c3f73e37c783af54092e207173019b07ad8e77dbd29c141e106e11b0f4f8301f06b516f7c6588de7862bb8b53cd2af"}, {0x40, 0x109, 0x7fffffff, "09ace7b136b8ae68a232cca6126d56ecac70cc2b286f448218f9f040b781a1d58507c702e58051ba3a9ada6fe5"}, {0x58, 0x0, 0xffffffff, "c262ca7f08426a68bd9a4f0afbe54c052799b7889ae989e830d0709c78ad693acb7aa857fb7be3f1404d80c6745aa5343f6e78ac01a62080526c1b59ee4d072b6ad059c3"}, {0x20, 0x13d, 0x2, "74f0e0376d4f94a8fc"}, {0x40, 0x109, 0x4f, "de5b62b9cd5c8525872dc3dfc02dc9f8883926df362f48bbe6944e92c2536e600ac5cd5f3e60262bda65b635e9db"}, {0x28, 0x10d, 0x8, "227282a7f2052db8f161b03209672502a8d0b0d034d32913"}], 0x1f8, 0x8000}, 0x10001}, {{&(0x7f0000004dc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x1, 0x0, 0x1, 0x2, {0xa, 0x4e21, 0x7fffffff, @remote={0xfe, 0x80, [], 0xbb}, 0x400}}}, 0x80, &(0x7f0000005080)=[{&(0x7f0000004e40)="7484be6e54ceb0116bbe70466d50f6e29c96a2abf857d05145131297883532a4ceaec5dfd8a363868982d7d5784de87b27a485b672a31c09df7e0e0988d778eedb8847af27373442eee746b9b18cee0511240a8fe8aae52a6d34eb4c10102d2e2e99dd7885bcae41db10a263122c440605bee06779ffb28ae513a85d5fde21d6a8e0bba7c8270eb70f024f8c794b0f96666bc7194603f721c373fa62707e78a9bbe0", 0xa2}, {&(0x7f0000004f00)="0fb96f89655e2268851a21b369bce2c2a5de97c2e5db8e6548b8b5c0d85ac27fc0584fac51e63167291a2f48c3e37f128b9ec9db9bf8018b92f252ad5d9468", 0x3f}, {&(0x7f0000004f40)="5364c6de2cced8df6720a3", 0xb}, {&(0x7f0000004f80)="3f0e4f711b734735d9a4768a34b2ee46c46cf4b5e0b9c9e46cbf669b7e3d52687def8e5b84c6093216fe2df47cae97d968513bbda4adc1ae8719120f633c51b560fc97860c06b85629ea42", 0x4b}, {&(0x7f0000005000)="94ecf3d0ad26b7253402cfbfc58b2aacfef5a38b2c3078f26edcc9572cb5d1667c60c90ad2610feea78c37b3f48f7b79ebc97da3d85ed2c2d6", 0x39}, {&(0x7f0000005040)}], 0x6, &(0x7f0000005100), 0x0, 0x24000000}, 0x93}, {{&(0x7f0000005140)=@pppoe={0x18, 0x0, {0x1, @random="6d5b4d2687ae", 'bcsh0\x00'}}, 0x80, &(0x7f00000053c0)=[{&(0x7f00000051c0)="610281c5b5664e2f61f11d37871dffa0f759c1325557182e5f699dcc72fd2e172cceb2a8824a2cbe6d9313bae9c802861245fde2ef439f187c754a6f6b8d09515e907fca14611e611c49fb02c759f131b2d4886fcd4f403c40ef659f03ed69c8c24cbd77ca2772e49d1b393b065d67ece4e5f8adea6e9d86918afeb796d2673d1b425df03c930cf73dec1b36d99ad6506d1929179368902fe4a6345d84bd5cb2d8c2babc0e1fcc96795cad77aaf0d44c0c57bce1d80068a53605ad1749d5b6cc2083b411dffbe08a5d2d4d", 0xcb}, {&(0x7f00000052c0)="7cabb403120274032a316033bb9ecf3b29c11f479a8e5c7c7cc2584c59b268108a35173c1a5c2ccdfb31eb19fc1397f37a5132abe96ad9ce6735af49356d4160dd229fdd850c11ad5f4b789c96dd6a47984b2ece90363ab81206590a700c00de9f42341ceaae192182fcb7a3803c701ac8e9d92ff201a5aa175157277fc4d7e8b69c9fb7ca57991018583f258f435e7346d19bed9392c87f87bfc9a29e12ce251e0f1c317e2e801da8bf34c978a99f83bf1228c43ea7776e42bd49d878bb65e1b101af01ff", 0xc5}], 0x2, &(0x7f0000005400)=[{0xe0, 0x0, 0x7, "ccec84ad0281c322e6cd570e10740d3decdeff0b2402c90c803b40deaf3551ee3424873a521b28d68ee1226f1a716d7de453f41f8800a49f3b7fa79390434b3db9f95a4cdc7b54b0c0cfdf22e243b8e14a8cfe71fdfa8af30388c811a2829cabdfc4ca032fea0952842166eee9bbd8221d2650274e7597094659a48c128c99f631439effa690df73bd4df304d44ad1f9c31136f74c340e988ad5dd349d084a4e7ab4b70b9146062f04bc7abd31ebdf495d974bfc599931a617729f7eae2e150a8382fea1398f0dff5f"}, {0x1010, 0x0, 0x5, "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"}], 0x10f0, 0x80}, 0x100000001}], 0x7, 0x40) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:46 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:46 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:46 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000240000006a0a00fe00000000850000003f000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) write$P9_RCLUNK(r0, &(0x7f00000000c0)={0x7, 0x79, 0x1}, 0x7) 07:11:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x200, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x16}}, 0x10) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r3, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\t', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:46 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x4) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r0, 0x4) write$FUSE_BMAP(r0, &(0x7f0000000000)={0x18, 0xffffffffffffffda, 0x1, {0x40}}, 0x18) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000140)='./bus\x00', 0x8, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="45c0a8b0b2f5c2be8632fa8cec20b5cb543351e809b61c556003feb11364470e9d86433092983b8388e35d4c011d854f7ddb700524bd245f16909f5a8e12df9fc124639e88af19df212c2377fa0304b9a30ba5534f902f5530b797e5f630cf", 0x5f, 0xffffffffffff8001}, {&(0x7f0000000340)="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", 0x1000, 0x8}], 0x28000, &(0x7f0000000240)=ANY=[@ANYBLOB='dfgraded,\x00']) fchmod(r0, 0x20) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\t', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:46 executing program 1: r0 = socket$inet6(0xa, 0x80007, 0xfffffffffffff004) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1000009, 0x400032, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, &(0x7f00000002c0)="0f0926f20f01180f229066b9490b000066b80040000066ba000000000f30f082913c0000650f00db660f3803c6660f3a61367cf9c33e3e0f350f01cf", 0x3c}], 0x1, 0x0, &(0x7f00000002c0), 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r2, 0x4040aea4, &(0x7f0000000100)={0x40, 0x10001, 0x20, 0x1, 0x8}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) connect(r0, &(0x7f0000000080)=@nl=@proc={0x10, 0x0, 0x25dfdbfc, 0x1080060}, 0x80) connect$pppoe(r1, &(0x7f0000000140)={0x18, 0x0, {0x2, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'bcsh0\x00'}}, 0x1e) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, &(0x7f0000000180)=0x102000) 07:11:46 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:46 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:46 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)=0x0) setpgid(r2, r3) lsetxattr(&(0x7f0000000240)='./file0\x00', &(0x7f00000001c0)=@random={'btrfs.', 'veth1_to_team\x00'}, &(0x7f0000000280)='security.capabimity\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="756c65722e7353b558762d9c25eb6563607269747937636170"], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, &(0x7f0000000340)=""/149) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='cgroup\x00', r1}, 0x10) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth1_to_team\x00', 0x0}) mlockall(0x2) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000200)=r4) 07:11:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673fc", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:47 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:47 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673fc", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="757365722e73656375726974792e636170616269ec69747900"], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:47 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000000)={0xe, 0x17, 0x1, {0x5, './bus'}}, 0xe) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f00000001c0)=0x7, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) r3 = getegid() fchown(r1, r2, r3) renameat(r1, &(0x7f00000000c0)='./bus\x00', r0, &(0x7f0000000140)='./bus\x00') write$P9_RCREATE(r0, &(0x7f0000000200)={0x18, 0x73, 0x1, {{0x32, 0x3, 0x1}, 0x3f800}}, 0x18) readv(r1, &(0x7f0000000040)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x100000000000011d) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x400000) 07:11:47 executing program 1: r0 = semget$private(0x0, 0x4, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x161000, 0x0) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000040)={0x3f40}) unshare(0x40000) semtimedop(r0, &(0x7f00000a8000)=[{0x0, 0xffffffffdffffff9, 0x1000}], 0x1, &(0x7f0000000700)={0x2000}) semop(r0, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000003000)) 07:11:47 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 475.252337] print_req_error: I/O error, dev loop6, sector 128 07:11:47 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="757365722e73656375727218433bc109b4e07076d6dadd6974d90981a46e916cba93afd03b7cd277b6a70b991dfc64736de6f7df6856b8daabb5e55a022e5cad567a2776b7fec6887b6938e4024664274e8ccca12120de83e7fcdfc1a54b1887caa46e6ef1a79d8d65375e8ac33353d44f86045c506c3bc556501b5411b31cc005f85e390f0632e41d0848bce66b8b54d12c2c54a2aff6062c7100054d117e2da15717db6c0a24541bbfe1aeb7a263b66d69aea56cf68c5c56c88b0fcbbc3b2094c866c2679a4d37665cbc7a"], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) r2 = geteuid() getresgid(&(0x7f00000001c0)=0x0, &(0x7f0000000200), &(0x7f0000000240)) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x110000, &(0x7f0000000440)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xf000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@allow_other='allow_other', 0x2c}]}}) 07:11:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:47 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x410000, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x80, 0x0) mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x10, r1, 0x0) r2 = getpid() r3 = syz_open_procfs(r2, &(0x7f0000000140)='net/dev_snmp6\x00') readv(r3, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) 07:11:47 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:47 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:47 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) readv(r0, &(0x7f0000001340)=[{&(0x7f0000000000)=""/3, 0x3}, {&(0x7f0000000140)=""/195, 0xc3}, {&(0x7f0000000080)=""/42, 0x2a}, {&(0x7f0000000240)=""/68, 0x44}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x5) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000040)='./file0\x00') ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f00000002c0)) mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:47 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x8000, 0x0) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000100)=0x101) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r2, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:48 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:48 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:48 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000002000)={0xaa}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2480, 0x0) ioctl$RTC_EPOCH_SET(r4, 0x4008700e, 0x8) setsockopt$inet_mreqsrc(r3, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@local={0xac, 0x14, 0x14, 0xaa}, @rand_addr}, 0xc) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'irlan0\x00'}, 0x18) close(r3) dup3(r1, r2, 0x0) 07:11:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsz', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:48 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="2321202ee2376ee0815578"], 0xb) close(r3) poll(&(0x7f0000000040), 0x1e6, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000000)={0x1, 0xffffffffffffffff, 0x2, 0x0, 0x0, [{r0, 0x0, 0x2}, {r0, 0x0, 0x9}]}) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r4, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x3b7) 07:11:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000140)=0xf, 0x4) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e23, 0x3, @remote={0xfe, 0x80, [], 0xbb}, 0x4}}, 0x2, 0x5, 0x9, 0x9, 0x90}, &(0x7f0000000080)=0x98) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r2, 0x6, 0x9, 0x4, 0x8}, 0x14) 07:11:48 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:48 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="627472667302", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 476.512240] Unknown ioctl 1074294798 07:11:48 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:48 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000080)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:48 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:48 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000140)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) syncfs(r0) accept(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, &(0x7f0000000180)=0x80) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001380)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000002440)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000002400)={&(0x7f00000013c0)={0x1c, r1, 0x300, 0x70bd2a, 0x25dfdbfc, {0x11}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000001}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') ioctl$int_in(r2, 0x5452, &(0x7f0000000040)=0x7fff) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x40, 0x0) timer_create(0x3, &(0x7f0000000200)={0x0, 0x6, 0x4, @thr={&(0x7f00000001c0)="4e95", &(0x7f0000000340)="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"}}, &(0x7f0000000240)=0x0) timer_settime(r3, 0x1, &(0x7f0000000280)={{0x77359400}, {0x77359400}}, &(0x7f00000002c0)) readv(r2, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) [ 476.820524] print_req_error: I/O error, dev loop0, sector 128 07:11:49 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 477.345488] Unknown ioctl 1074294798 07:11:49 executing program 1: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000080), 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000100)='securityproc\x00', 0x2) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0x9) futex(&(0x7f000000cffc), 0x800000000005, 0x0, &(0x7f0000000180)={0x77359400}, &(0x7f0000000040), 0x0) 07:11:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000780)='/dev/amidi#\x00', 0x9, 0x80) connect$nfc_llcp(r1, &(0x7f0000000980)={0x27, 0x1, 0x2, 0x7, 0x94c, 0x8001, "0db11f8d6a6588698ddcff1c718c8e613dc8e3683612c297ecfa6b88d37eb78b41b459b1f5f08abaef1eeb07481584181938ee4fa9949e0533278d1c508b06", 0x7}, 0x60) ioctl(r0, 0x8912, &(0x7f0000000340)="025ccc3d6d4c1e5bcc2070ced7c9e05a4a39c5bacf066d953c1c9b7652716312540d64060000000000000082621c820ae23a931fea4539e42a954551566823309b5a6c8d6489b8abfdf9abb6fdff7610b452d9b912c44fb249aefc7e234415005412fcf6e2e0a4d0b971e045de507f5b5ea7becf5b158bf708dee85e8384c4904ed004e232c6035477551c397bb5e8b25c0dd138a87a789d96b9e15e0fc6cc35724c2bccc4dc441d4318abad318dc0f615a85ebe91672ef9884fc4ba5586ee9ce81e29b1be81474a3c93a27f27faf710e234daf493698a22fcc628c4f3") r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r2, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:49 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000000)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:49 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:49 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 477.462288] print_req_error: I/O error, dev loop0, sector 128 [ 477.476181] print_req_error: I/O error, dev loop6, sector 128 07:11:49 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:49 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:49 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673fd", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:49 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x8000000000141042, 0x20) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) r2 = shmget(0x0, 0xa000, 0x100, &(0x7f0000008000/0xa000)=nil) shmctl$SHM_UNLOCK(r2, 0xc) 07:11:50 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:50 executing program 1: r0 = perf_event_open(&(0x7f00004e7000)={0x2, 0x78, 0xdf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)="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") 07:11:50 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:50 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) bind$llc(r1, &(0x7f0000000000)={0x1a, 0x30e, 0xde92, 0x5, 0x8, 0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x10) lsetxattr(&(0x7f0000000080)='./file1\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="757365722e5e656375726964b12e63618d6162696c69747900"], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:50 executing program 5: r0 = open(&(0x7f0000000040)='./bus\x00', 0x80, 0x20000) unlink(&(0x7f0000000080)='./bus\x00') unlink(&(0x7f0000000000)='./bus\x00') seccomp(0x0, 0x0, &(0x7f0000000140)={0x6, &(0x7f00000000c0)=[{0x4, 0x14389200, 0x200, 0x200}, {0x3, 0x4, 0x0, 0x31f4}, {0xfffffffffffffff8, 0x9c, 0x5, 0x2}, {0xce, 0x0, 0x0, 0x748}, {0x6a, 0x0, 0x166e00000000, 0x2}, {0x5, 0x400, 0x0, 0x7}]}) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000001c0)) syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x3ff, 0x0) mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f0000000180)) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000280)={0x0, 0x7, &(0x7f0000000240)="b79d2cb6c5c003"}) readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:50 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsl', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 478.514908] print_req_error: I/O error, dev loop0, sector 128 07:11:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfst', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:50 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:50 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x8000, 0x40) ioctl$SG_GET_COMMAND_Q(r0, 0x2270, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="757365722e73656375726974792e6361706162696c697479ff"], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r2, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:50 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') symlink(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='./bus\x00') stat(&(0x7f0000000140)='./bus/file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) fchownat(r0, &(0x7f00000000c0)='./bus\x00', r2, r3, 0x1000) readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:50 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="62747266730f", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:50 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$llc_int(r0, 0x10c, 0x0, &(0x7f0000000080)=0x400, 0x4) splice(r0, &(0x7f0000000000), r0, &(0x7f0000000040), 0x2, 0x1) 07:11:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs#', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:51 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:51 executing program 1: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RSYMLINK(0xffffffffffffffff, &(0x7f0000000180)={0x14, 0x11, 0x2, {0x4}}, 0x14) ftruncate(r0, 0x208200) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) utimes(&(0x7f0000000000)='./bus\x00', &(0x7f0000000140)={{r2, r3/1000+10000}, {r4, r5/1000+10000}}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000005f00)={'filter\x00', 0x4}, 0xad) symlinkat(&(0x7f0000008ff8)='./file1\x00', 0xffffffffffffffff, &(0x7f0000012ff8)='./file0\x00') close(r1) sendfile(r0, r1, &(0x7f0000000280), 0x80000000005e) 07:11:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673f5", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:51 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\t', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:51 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x3000)=nil, 0x3000, 0x0, 0x8000000011, r0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$RTC_VL_CLR(r0, 0x7014) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000180)={0x29, @remote={0xac, 0x14, 0x14, 0xbb}, 0x4e24, 0x3, 'none\x00', 0x2a, 0x1ff, 0x3}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x100) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f00000000c0)={0xff}) syz_open_procfs(r1, &(0x7f00000001c0)="6e65742f69705f6d725f7f332e178135d80e681892636163686500") readv(r0, &(0x7f0000000100)=[{&(0x7f0000000340)=""/4096, 0x1000}], 0x1) 07:11:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:51 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\b', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:51 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") unshare(0x20040800) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000300)=0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0xfffffffffffff72d, 0x1, 0x1a3e, 0x1000, 0x0, 0x431, 0x10001, 0xf, 0xbbb3, 0x8, 0x80000001, 0x575, 0x0, 0x100000001, 0x3, 0x10001, 0x1, 0x4, 0x600000000, 0xff, 0x921, 0x100, 0x4, 0x1, 0x80000001, 0x7, 0x200, 0x5de3, 0x0, 0x101, 0x1f, 0x7ff, 0xfffffffffffff001, 0x2, 0x8, 0x42d1aeff, 0x0, 0x6, 0x0, @perf_config_ext={0x8, 0xfffffffffffffffc}, 0x0, 0x4, 0xffffffff, 0x7, 0x401, 0x100000001, 0x8}, r4, 0x1, r0, 0x2) r5 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x2, 0x4000) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r5, 0x12, 0x2, &(0x7f0000000200)=""/105, &(0x7f0000000140)=0x69) r6 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f00000000c0)={0x0, &(0x7f0000000080), 0x0, r6}) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f00000001c0), 0x10) 07:11:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:51 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\b', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:51 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000140)={0x1, 0x1, 0xff, 'queue0\x00'}) memfd_create(&(0x7f0000000000)='queue0\x00', 0x2) r1 = getpgrp(0x0) prctl$setptracer(0x59616d61, r1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:51 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000480)=@generic={0x3, 0xff, 0x3}) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x7cf, 0x2, &(0x7f0000000240)=[{&(0x7f00000001c0)="5f67cdf92dc38a7db46ed933223a08e2d5fab475df17fe1c14ab31513e14e998c94cbd179dfbb23b02dd18b78c8f9b9071fd1c04ab6797e9886e13cfbe33c8d1182c9b65c74f9016d33bc8d3c8694e8aff4822c6bab5d29828bff57f185af782d7a07e341d8d2c", 0x67, 0x6}, {&(0x7f0000000340)="d10567cbe13aa7d1159ac82be9ba63d5cadb77f9331c9ca700c05d35c964addb4c1a5aec058dc12d16d847755fcef73c24b51c806d9a2e7f1ab81ffd6fc9171d8c43befdea700a9544c92c78fd1411c003", 0x51, 0xa0e5}], 0x80000, &(0x7f00000003c0)={[{@balloc_border='block-allocator=border', 0x2c}]}) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='user.seckrity.capability\x00'], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000400), &(0x7f0000000440)=0xc) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="62747266737f", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:51 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsp', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:52 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaa001b207f5c5eeb88644501001c2100000000009078ac1414bbac1414bb00009078ac1414aa"], &(0x7f0000000080)) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200000, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000040)={0x1, 0x0, [{0x4000000b, 0x6, 0x1, 0x7, 0x6, 0x826, 0x2}]}) 07:11:52 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs#', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:52 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') ioctl$sock_ifreq(r0, 0x89b7, &(0x7f0000000040)={'irlan0\x00', @ifru_hwaddr=@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}) readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000000)={0x5, 0x2, 0xff, 0x40, 0x80}) 07:11:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:52 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000080)=0x2) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000100)={0x4d57d686, 0xffff, 0x5a3e, 0x0, 0x4802, 0x10000}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:52 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000000280)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000100)={0x7, 0xffffffffffffff80, 0xffffffffffffffe1, 'queue0\x00', 0x7fffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000540)={&(0x7f0000000240)=@setlink={0x24, 0x13, 0x21, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_AF_SPEC={0x4, 0x1a}]}, 0x24}, 0x1}, 0x0) write$P9_RCREATE(r2, &(0x7f00000001c0)={0x18, 0x73, 0x1, {{0x42, 0x2, 0x8}, 0x7}}, 0x18) 07:11:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:52 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:52 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000000)) readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:52 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:52 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x7003, &(0x7f00000000c0)) socket$inet6(0xa, 0x0, 0x3f) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x4, 0x0, 0x9, 0xa, 0x101}}) ioctl$sock_inet_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000180)) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000040)={'nat\x00'}, &(0x7f0000000100)=0x54) close(r1) ioctl$KDDISABIO(r1, 0x4b37) pwritev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000040)}, {&(0x7f0000000180)}], 0x2, 0x0) 07:11:52 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB='usty.ca\aability\x00'], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\a', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 480.572687] print_req_error: I/O error, dev loop6, sector 128 07:11:52 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673c0", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:52 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673f5", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:53 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000003c0)='./file0/file0\x00', 0x140) nanosleep(&(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:53 executing program 5: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x2000, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') acct(0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) [ 480.817351] print_req_error: I/O error, dev loop0, sector 128 07:11:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:53 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 481.028413] rtc_cmos 00:00: Alarms can be up to one day in the future 07:11:53 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 481.082627] rtc_cmos 00:00: Alarms can be up to one day in the future 07:11:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:53 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') socket$nl_crypto(0x10, 0x3, 0x15) mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x17, &(0x7f0000000000)=0xcc8, 0xcd8a1f47cf1e3e4c) 07:11:53 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfsp', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:53 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:53 executing program 1: recvmmsg(0xffffffffffffff9c, &(0x7f0000003e80)=[{{&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/196, 0xc4}, {&(0x7f00000001c0)=""/122, 0x7a}, {&(0x7f0000000240)=""/156, 0x9c}, {&(0x7f0000000300)=""/42, 0x2a}, {&(0x7f0000000340)=""/95, 0x5f}, {&(0x7f00000003c0)=""/107, 0x6b}, {&(0x7f0000000440)=""/203, 0xcb}, {&(0x7f0000000540)=""/2, 0x2}], 0x8, &(0x7f0000000600)=""/63, 0x3f, 0x8001}, 0x9}, {{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000640)}, {&(0x7f0000000680)=""/186, 0xba}], 0x2, &(0x7f0000000780)=""/159, 0x9f}, 0x100000001}, {{&(0x7f0000000840)=@nfc, 0x80, &(0x7f0000001b00)=[{&(0x7f00000008c0)=""/89, 0x59}, {&(0x7f0000000940)=""/24, 0x18}, {&(0x7f0000000980)=""/5, 0x5}, {&(0x7f00000009c0)=""/205, 0xcd}, {&(0x7f0000000ac0)=""/4096, 0x1000}, {&(0x7f0000001ac0)=""/27, 0x1b}], 0x6, &(0x7f0000001b80)=""/170, 0xaa, 0x2849995b}, 0x9}, {{0x0, 0x0, &(0x7f0000001d80)=[{&(0x7f0000001c40)=""/111, 0x6f}, {&(0x7f0000001cc0)=""/144, 0x90}], 0x2, &(0x7f0000001dc0)=""/89, 0x59}}, {{0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000001e40)=""/202, 0xca}, {&(0x7f0000001f40)=""/90, 0x5a}, {&(0x7f0000001fc0)=""/43, 0x2b}, {&(0x7f0000002000)=""/4096, 0x1000}], 0x4, &(0x7f0000003040)=""/177, 0xb1, 0x4}}, {{&(0x7f0000003100)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000003340)=[{&(0x7f0000003180)=""/23, 0x17}, {&(0x7f00000031c0)=""/184, 0xb8}, {&(0x7f0000003280)=""/9, 0x9}, {&(0x7f00000032c0)=""/115, 0x73}], 0x4, 0x0, 0x0, 0x20}, 0xd9}, {{&(0x7f0000003380)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @remote}}}, 0x80, &(0x7f0000003440)=[{&(0x7f0000003400)=""/18, 0x12}], 0x1, &(0x7f0000003480)=""/23, 0x17, 0x5}, 0x6}, {{&(0x7f00000034c0)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @remote}}}, 0x80, &(0x7f0000003840)=[{&(0x7f0000003540)=""/103, 0x67}, {&(0x7f00000035c0)=""/248, 0xf8}, {&(0x7f00000036c0)=""/234, 0xea}, {&(0x7f00000037c0)=""/41, 0x29}, {&(0x7f0000003800)=""/33, 0x21}], 0x5, &(0x7f00000038c0)=""/156, 0x9c, 0x2}, 0x800}, {{&(0x7f0000003980)=@nl, 0x80, &(0x7f0000003ac0)=[{&(0x7f0000003a00)=""/180, 0xb4}], 0x1, &(0x7f0000003b00)=""/93, 0x5d, 0x35}, 0x9}, {{&(0x7f0000003b80)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @local}}}, 0x80, &(0x7f0000003d80)=[{&(0x7f0000003c00)=""/109, 0x6d}, {&(0x7f0000003c80)=""/222, 0xde}], 0x2, &(0x7f0000003dc0)=""/162, 0xa2, 0x2}, 0x800000}], 0xa, 0x10022, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000004100)={0x0, 0xf0}, &(0x7f0000004140)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000004180)={r1, 0x9d56}, &(0x7f00000041c0)=0x8) openat$uinput(0xffffffffffffff9c, &(0x7f0000004280)='/dev/uinput\x00', 0x103, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000640)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000000b000)={&(0x7f000000f000)={0x10}, 0xc, &(0x7f00005a6ff0)={&(0x7f0000451ccc)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6}, {@in=@loopback=0x7f000001, 0x0, 0x32}, @in6=@loopback={0x0, 0x1}, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}, 0x1}, 0x0) 07:11:54 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0xffffff98) 07:11:54 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:54 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000000)=0xb13) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f0000000340)={"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"}) unlink(&(0x7f0000000080)='./bus\x00') ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') r2 = getpgid(0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000140)={{0x5, 0x6, 0x9, 0x800, 'syz1\x00', 0x6}, 0x6, 0x0, 0x6, r2, 0x4, 0x4, 'syz0\x00', &(0x7f0000000040)=['-\x00', 'numa_maps\x00', '\'lo\x00', 'bdev:\x00'], 0x16, [], [0x2, 0x5, 0x9, 0x4]}) readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:54 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673f6", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:54 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000008000)={0x9, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x1, {{0x2, 0x0, @multicast1=0xe0000001}}}, 0x1af) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000012ffc)=0x90) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x8000, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f00000001c0)=0x9) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f0000000100)={[0x5, 0xfff, 0x30000000, 0x1000, 0x7, 0x6a, 0x2, 0xea, 0x7f, 0x20, 0x7, 0x9, 0x81, 0x96, 0x5, 0x9], 0x7002, 0x4204}) 07:11:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="627472667310", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\a', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:54 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\n', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:54 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl(r0, 0x20000000008912, &(0x7f0000000340)="025cc83d6d345f8f762070") r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000240)='ppp1vmnet1^[{keyring\'em0/trustedcpuseteth1]keyringeth0\'\x00', 0xffffffffffffff9c}, 0x10) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000300)={0x8000, 0xff, 0x8000, 0x700}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10}, 0xc, &(0x7f00000bfff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00\b\x00\b\x00\b\x00\x00\x00\x00\x00'], 0xc4}, 0x1}, 0x0) 07:11:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:54 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="627472667304", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\t', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:54 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000000)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:54 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\t', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 482.309545] netlink: 12 bytes leftover after parsing attributes in process `syz-executor1'. [ 482.398663] netlink: 12 bytes leftover after parsing attributes in process `syz-executor1'. 07:11:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:55 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:55 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:55 executing program 1: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) getsockopt$inet6_udp_int(r0, 0x11, 0x66, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = socket$inet6(0xa, 0x802, 0x0) socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000200)=0xfffffc1f) setreuid(0x0, r2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback={0x0, 0x1}, 0x0, 0x2}, 0x20) 07:11:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:55 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r1, &(0x7f00000002c0)='threaded\x00', 0x9) 07:11:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)="62747266731c", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:55 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200000, 0x0) readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:55 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x10}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x0, &(0x7f0000346fc8)=@raw, &(0x7f0000000000)='WPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x4000000}, 0x1d) [ 483.212815] print_req_error: I/O error, dev loop0, sector 128 07:11:55 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:55 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673f5", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:55 executing program 5: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r1, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 07:11:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:55 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x40101) write$sndseq(r0, &(0x7f0000000080), 0x0) ppoll(&(0x7f00000000c0)=[{r0}], 0x1, &(0x7f0000000100)={0x77359400}, &(0x7f0000000180), 0x8) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x4, 0x22001) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f00000001c0)=0x7) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f000023efa8)={0x80, 0x7d}) 07:11:55 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:55 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r1 = openat(0xffffffffffffffff, &(0x7f0000000540)='./file1\x00', 0x400000, 0x14a) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000580)={{0xffffffffffffffff, 0x3, 0x80000001, 0x1, 0xf7c}, 0x6b0d, 0x5, 'id1\x00', 'timer1\x00', 0x0, 0x0, 0x9, 0x101, 0x5a21db0c}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) r3 = getpgid(0xffffffffffffffff) setsockopt$RDS_RECVERR(r2, 0x114, 0x5, &(0x7f00000006c0), 0x4) sched_rr_get_interval(r3, &(0x7f0000000440)) lsetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000800)=ANY=[@ANYBLOB="757365700e73656375726974792e6a6162696c02"], &(0x7f0000000080)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r2, 0xc0505510, &(0x7f00000004c0)={0x5, 0x1, 0xda, 0x3ff, &(0x7f0000000480)=[{}]}) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000100)={0x6, 0x4, 0x2, 0x1, &(0x7f0000000340)=[{}, {}, {}, {}]}) r4 = mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3000002, 0x10, r1, 0x0) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f0000000180)=""/64) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000240)={r4}) write$cgroup_type(r2, &(0x7f00000002c0)='threaded\x00', 0x9) syz_open_dev$sndctrl(&(0x7f0000000680)='/dev/snd/controlC#\x00', 0x10000, 0x2) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x10, r2, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000200)=0x1) 07:11:55 executing program 7: syz_mount_image$btrfs(&(0x7f0000000000)="6274726673ff", &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:56 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip6_tables_matches\x00') getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000140)=0x4) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000080)='./bus\x00') mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x0, 0x11, r1, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r2, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r1, &(0x7f0000000000)={0x20000000}) 07:11:56 executing program 6: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) 07:11:56 executing program 2: socket$inet6(0xa, 0x1000000000002, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=@known='security.evm\x00', &(0x7f0000000280)='security.capabimity\x00', 0x1a, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000000800)=@random={'user.', 'security.capability\x00'}, &(0x7f00000007c0)="0000000201000000000000010400", 0xe, 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) write$cgroup_type(r0, &(0x7f00000002c0)='threaded\x00', 0x9) [ 483.975067] print_req_error: I/O error, dev loop0, sector 128 [ 484.028747] WARNING: CPU: 0 PID: 2199 at fs/btrfs/volumes.c:1071 close_fs_devices+0xbf0/0xfd0 [ 484.037457] Kernel panic - not syncing: panic_on_warn set ... [ 484.037457] [ 484.044838] CPU: 0 PID: 2199 Comm: syz-executor3 Not tainted 4.18.0-rc5+ #149 [ 484.052115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 484.061472] Call Trace: [ 484.064077] dump_stack+0x1c9/0x2b4 [ 484.067722] ? dump_stack_print_info.cold.2+0x52/0x52 [ 484.072937] panic+0x238/0x4e7 07:11:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000000380)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000000240)) [ 484.076142] ? add_taint.cold.5+0x16/0x16 [ 484.080308] ? __warn.cold.8+0x148/0x1ba [ 484.084396] ? close_fs_devices+0xbf0/0xfd0 [ 484.088733] __warn.cold.8+0x163/0x1ba [ 484.092644] ? close_fs_devices+0xbf0/0xfd0 [ 484.096989] report_bug+0x252/0x2d0 [ 484.100631] do_error_trap+0x1fc/0x4d0 [ 484.104532] ? trace_hardirqs_on+0xd/0x10 [ 484.108695] ? math_error+0x3e0/0x3e0 [ 484.112507] ? note_gp_changes+0x550/0x550 [ 484.116752] ? __blkdev_put+0x3f1/0x830 [ 484.120743] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 484.125601] do_invalid_op+0x1b/0x20 [ 484.129327] invalid_op+0x14/0x20 [ 484.132789] RIP: 0010:close_fs_devices+0xbf0/0xfd0 [ 484.137712] Code: 46 af fe 0f 0b e8 00 46 af fe 0f 0b 48 89 f7 e8 f6 24 ed fe e9 de f5 ff ff e8 ec 45 af fe 0f 0b e9 fd fd ff ff e8 e0 45 af fe <0f> 0b e9 a8 fd ff ff 48 8b bd 58 fd ff ff e8 8d 25 ed fe e9 35 fd [ 484.157084] RSP: 0018:ffff8801c2ce7050 EFLAGS: 00010216 [ 484.162457] RAX: 0000000000040000 RBX: 0000000000000001 RCX: ffffc90005831000 [ 484.169734] RDX: 0000000000004fd9 RSI: ffffffff82ccc560 RDI: 0000000000000007 [ 484.177008] RBP: ffff8801c2ce7350 R08: ffff8801a9e28780 R09: 0000000000000006 [ 484.184284] R10: ffff8801a9e28780 R11: 0000000000000000 R12: ffffed003859ce2d [ 484.191558] R13: 1ffff1003859ce1d R14: ffff8801c2ce70e8 R15: ffff8801bb0cf248 [ 484.198838] ? close_fs_devices+0xbf0/0xfd0 [ 484.203174] ? btrfs_alloc_device+0x8e0/0x8e0 [ 484.207688] ? do_raw_spin_unlock+0xa7/0x2f0 [ 484.212113] ? kasan_check_write+0x14/0x20 [ 484.216355] ? wake_up_q+0xb3/0x100 [ 484.219986] ? __mutex_unlock_slowpath+0x439/0x8c0 [ 484.224908] ? wait_for_completion+0x8d0/0x8d0 [ 484.229501] btrfs_close_devices+0x29/0x150 [ 484.233812] btrfs_mount_root+0x143c/0x1e90 [ 484.238123] ? btrfs_decode_error+0x70/0x70 [ 484.242434] ? save_stack+0x43/0xd0 [ 484.246050] ? __kasan_slab_free+0x11a/0x170 [ 484.250453] ? kasan_slab_free+0xe/0x10 [ 484.254410] ? kfree+0xd9/0x260 [ 484.257676] ? mount_fs+0xae/0x328 [ 484.261200] ? vfs_kern_mount.part.34+0xdc/0x4e0 [ 484.265943] ? do_mount+0x581/0x30e0 [ 484.269649] ? ksys_mount+0x12d/0x140 [ 484.273443] ? __x64_sys_mount+0xbe/0x150 [ 484.277573] ? do_syscall_64+0x1b9/0x820 [ 484.281620] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 484.286968] ? kasan_check_read+0x11/0x20 [ 484.291097] ? do_raw_spin_unlock+0xa7/0x2f0 [ 484.295490] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 484.300067] ? do_raw_spin_lock+0xc1/0x200 [ 484.304289] mount_fs+0xae/0x328 [ 484.307653] ? debug_check_no_obj_freed+0x30b/0x595 [ 484.312657] vfs_kern_mount.part.34+0xdc/0x4e0 [ 484.317226] ? may_umount+0xb0/0xb0 [ 484.320836] ? kfree+0x111/0x260 [ 484.324196] ? btrfs_mount+0x84c/0x215e [ 484.328160] vfs_kern_mount+0x40/0x60 [ 484.331963] btrfs_mount+0x4a9/0x215e [ 484.335750] ? kasan_check_read+0x11/0x20 [ 484.339881] ? rcu_is_watching+0x8c/0x150 [ 484.344036] ? do_raw_spin_unlock+0xa7/0x2f0 [ 484.348446] ? btrfs_remount+0x1710/0x1710 [ 484.352674] ? __lockdep_init_map+0x105/0x590 [ 484.357178] ? __lockdep_init_map+0x105/0x590 [ 484.361668] ? lockdep_init_map+0x9/0x10 [ 484.365712] ? __init_waitqueue_head+0x9e/0x150 [ 484.370365] ? init_wait_entry+0x1c0/0x1c0 [ 484.374593] ? memcpy+0x45/0x50 [ 484.378303] ? alloc_vfsmnt+0x779/0x9f0 [ 484.382347] ? mnt_free_id.isra.27+0x60/0x60 [ 484.386749] ? graph_lock+0x170/0x170 [ 484.390534] ? rcu_pm_notify+0xc0/0xc0 [ 484.394413] ? find_held_lock+0x36/0x1c0 [ 484.398463] ? lock_downgrade+0x8f0/0x8f0 [ 484.402599] mount_fs+0xae/0x328 [ 484.405971] ? btrfs_remount+0x1710/0x1710 [ 484.410198] ? mount_fs+0xae/0x328 [ 484.413732] ? mpi_free.cold.1+0x19/0x19 [ 484.417798] vfs_kern_mount.part.34+0xdc/0x4e0 [ 484.422376] ? may_umount+0xb0/0xb0 [ 484.425990] ? _raw_read_unlock+0x22/0x30 [ 484.430135] ? __get_fs_type+0x97/0xc0 [ 484.434014] do_mount+0x581/0x30e0 [ 484.437549] ? do_raw_spin_unlock+0xa7/0x2f0 [ 484.441944] ? copy_mount_string+0x40/0x40 [ 484.446190] ? copy_mount_options+0x5f/0x380 [ 484.450591] ? rcu_read_lock_sched_held+0x108/0x120 [ 484.455594] ? kmem_cache_alloc_trace+0x616/0x780 [ 484.460421] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 484.465956] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 484.471481] ? copy_mount_options+0x285/0x380 [ 484.475961] ksys_mount+0x12d/0x140 [ 484.479575] __x64_sys_mount+0xbe/0x150 [ 484.483537] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 484.488548] do_syscall_64+0x1b9/0x820 [ 484.492426] ? finish_task_switch+0x1d3/0x870 [ 484.496927] ? syscall_return_slowpath+0x5e0/0x5e0 [ 484.501840] ? syscall_return_slowpath+0x31d/0x5e0 [ 484.506764] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 484.512287] ? retint_user+0x18/0x18 [ 484.515990] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 484.520831] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 484.526002] RIP: 0033:0x4584ea [ 484.529179] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd 8f fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ba 8f fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 484.548414] RSP: 002b:00007f5205df1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 484.556132] RAX: ffffffffffffffda RBX: 00007f5205df1b30 RCX: 00000000004584ea [ 484.563660] RDX: 00007f5205df1ad0 RSI: 0000000020000100 RDI: 00007f5205df1af0 [ 484.570919] RBP: 0000000020000100 R08: 00007f5205df1b30 R09: 00007f5205df1ad0 [ 484.578177] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000013 [ 484.585432] R13: 0000000000000000 R14: 00000000004d3c48 R15: 0000000000000000 [ 484.593304] Dumping ftrace buffer: [ 484.597058] (ftrace buffer empty) [ 484.600747] Kernel Offset: disabled [ 484.604357] Rebooting in 86400 seconds..