_memory+0x261/0x460 [ 302.684644] shmem_alloc_and_acct_page+0x126/0x670 [ 302.689579] shmem_getpage_gfp+0x388/0x27b0 [ 302.693896] ? shmem_should_replace_page.isra.0.part.0+0x10/0x10 [ 302.700031] shmem_write_begin+0xeb/0x190 [ 302.704167] generic_perform_write+0x1c9/0x420 [ 302.708763] ? filemap_page_mkwrite+0x2d0/0x2d0 [ 302.713418] ? current_time+0xb0/0xb0 [ 302.717247] ? lock_acquire+0x170/0x3f0 [ 302.721217] __generic_file_write_iter+0x227/0x590 [ 302.726138] generic_file_write_iter+0x36f/0x650 [ 302.730886] __vfs_write+0x44e/0x630 [ 302.734601] ? kernel_read+0x110/0x110 [ 302.738489] ? rcu_read_lock_sched_held+0x10a/0x130 [ 302.743491] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 302.748231] vfs_write+0x17f/0x4d0 [ 302.751762] SyS_pwrite64+0x116/0x140 [ 302.755547] ? SyS_pread64+0x140/0x140 [ 302.759434] ? fput+0xb/0x140 [ 302.762555] ? do_syscall_64+0x4c/0x640 [ 302.766509] ? SyS_pread64+0x140/0x140 [ 302.770382] do_syscall_64+0x1d5/0x640 [ 302.774262] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 302.779435] RIP: 0033:0x416987 [ 302.782607] RSP: 002b:00007f2401f3da60 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 302.790300] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 0000000000416987 [ 302.797554] RDX: 0000000000000048 RSI: 00000000200002c0 RDI: 0000000000000004 [ 302.804811] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 302.812064] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000003 [ 302.819329] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 302.829853] input input496: cannot allocate more than FF_MAX_EFFECTS effects 04:37:17 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x4000800) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='configfs\x00', 0x0, 0x0) chmod(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 04:37:17 executing program 3: syz_open_dev$usbfs(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x2, 0x193401) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000080)='./file0/file0\x00', 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f00000002c0)="89a4363ac0ed02000af9fdffff01004d010000000000000000000000ff0801000000000000001b00b10e0700000001000000000001fffffff60001005f42f26e5545e791", 0x44, 0x10000}, {&(0x7f0000000340)="10aa5e78bd58e5797e136e978efed1ecdb2f7abf63bf5c4fef5417d72a9174cffaaaf59e4b069b57c205bf6ba6c262b37fc5a92e6565b28fd2dcaf50de71fb08f812542a0166328cd32400159ab05af180aad57e4ad79a63d293380e932e35ca7f394c4253be8607bac153ae29cbbe7a76b925011e36dda2c4f9c4827e318da67340900c85938e279d42ee4ad1f96f8fbe3e7e699127e229f7c6f7f63ebc5377a3cda5b00e82ec63f1df0111ef6a1becefb179d3a6aa7476f68bfe21f528b6a88dde3b1a052b4839b24e6427", 0xcc, 0x40}, {&(0x7f0000000280), 0x0, 0xffff}], 0x1020c84, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f0000000100)={0x0, 0x3, 0x6, &(0x7f0000000000)=0x7f}) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x8000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r1) open(&(0x7f0000000040)='./file0/file0\x00', 0x8200, 0x24) 04:37:17 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x4, 0x0, 0x1, 0x7}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x3e) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r4}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r4, 0xfffffffe}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000080)={r4, 0x80}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={r5, 0xefe10}, 0x8) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x202) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:37:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) utimes(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0xee00) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x40, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@max_read={'max_read', 0x3d, 0xacff}}, {@max_read={'max_read', 0x3d, 0x81}}], [{@euid_lt={'euid<', r2}}, {@appraise_type='appraise_type=imasig'}, {@smackfstransmute={'smackfstransmute', 0x3d, '*\\}-}&/$!{'}}, {@smackfsdef={'smackfsdef', 0x3d, 'btrfs\x00'}}]}}) [ 303.086115] input: syz1 as /devices/virtual/input/input498 04:37:17 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000100)='NLBL_MGMT\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r2) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000d00200009800000000000000680100009800000000000000380200003802000038020000380200003802000004000000000000000000000010000000e00000020000000000000000626f6e645f736c6176655f310000000000000000000000000000e2ffffff001f00000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a45435400000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc18795000000000000000000000000000000000040000000000000000000000000000000000000010000000000000000000000a800d0000000000000000000000000000000000000000000380074696d650000000000554e8269000000000000000000000000000000000000000000ffffffff4f970000001b000000000000f9000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000ffff000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000380071756f7461000000000000000000000000000000000000000000000000000100000000deffff460d0000000000000000000000000000280052454a45435400000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028000000000000000000000000000000001ec500000000000000000000000000feffffff"], 0x1) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000400)=ANY=[@ANYRES64=r3, @ANYRES16=r1, @ANYRES32=r0], 0x24}, 0x1, 0x0, 0x0, 0x4000880}, 0x240048b0) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0), 0x1000000, 0x0) 04:37:17 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:17 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r3) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x858) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 303.229383] BTRFS error (device loop5): open_ctree failed [ 303.321711] FAULT_INJECTION: forcing a failure. [ 303.321711] name failslab, interval 1, probability 0, space 0, times 0 [ 303.332942] CPU: 0 PID: 23561 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 303.340813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.350156] Call Trace: [ 303.352758] dump_stack+0x1b2/0x283 [ 303.356387] should_fail.cold+0x10a/0x154 [ 303.360539] should_failslab+0xd6/0x130 [ 303.364511] kmem_cache_alloc+0x40/0x3c0 04:37:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000047a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000380)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r1) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000080)={r1}) r2 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r2, 0x0, 0x0, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}}, 0x4000114) sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x1c, r2, 0x10, 0x70bd28, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8c1}, 0x4000) [ 303.368573] radix_tree_node_alloc.constprop.0+0x1b4/0x300 [ 303.374286] __radix_tree_create+0x32b/0x4b0 [ 303.378710] __radix_tree_insert+0x98/0x500 [ 303.383030] ? __radix_tree_create+0x4b0/0x4b0 [ 303.387607] ? shmem_add_to_page_cache+0x236/0x7f0 [ 303.392537] shmem_add_to_page_cache+0x552/0x7f0 [ 303.397305] ? shmem_alloc_and_acct_page+0x670/0x670 [ 303.402405] ? __radix_tree_preload+0x1c3/0x250 [ 303.407078] shmem_getpage_gfp+0x13fa/0x27b0 [ 303.411509] ? shmem_should_replace_page.isra.0.part.0+0x10/0x10 [ 303.417707] shmem_write_begin+0xeb/0x190 [ 303.421861] generic_perform_write+0x1c9/0x420 [ 303.426447] ? filemap_page_mkwrite+0x2d0/0x2d0 [ 303.431119] ? current_time+0xb0/0xb0 [ 303.434919] ? lock_acquire+0x170/0x3f0 [ 303.438898] __generic_file_write_iter+0x227/0x590 [ 303.443831] generic_file_write_iter+0x36f/0x650 [ 303.448592] __vfs_write+0x44e/0x630 [ 303.452331] ? kernel_read+0x110/0x110 [ 303.456237] ? rcu_read_lock_sched_held+0x10a/0x130 [ 303.461255] ? rcu_sync_lockdep_assert+0x69/0xa0 [ 303.466009] vfs_write+0x17f/0x4d0 [ 303.469557] SyS_pwrite64+0x116/0x140 [ 303.473355] ? SyS_pread64+0x140/0x140 [ 303.477237] ? fput+0xb/0x140 [ 303.480364] ? do_syscall_64+0x4c/0x640 [ 303.484340] ? SyS_pread64+0x140/0x140 [ 303.488228] do_syscall_64+0x1d5/0x640 [ 303.491810] input: syz1 as /devices/virtual/input/input500 [ 303.492114] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 303.502892] RIP: 0033:0x416987 [ 303.506085] RSP: 002b:00007f2401f3da60 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 303.513824] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 0000000000416987 [ 303.521090] RDX: 0000000000000048 RSI: 00000000200002c0 RDI: 0000000000000004 [ 303.528367] RBP: 000000000078bf00 R08: fe03f80fe03f80ff R09: 0000000000000001 [ 303.535640] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000003 [ 303.542918] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:18 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f00000006c0)={0x4f4, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x4d8, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x494, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x490, 0x9, 0x0, 0x1, [{0x58, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @empty}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x21}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, [], 0x32}}, {0x5}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5, 0x3, 0x1}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x3}}]}, {0x124, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, [], 0x1}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, [], 0x1}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1a}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x5, 0x3, 0x1}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x1}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}]}, {0x118, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, [], 0x1}}, {0x5, 0x3, 0x3}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x1}}]}]}]}]}]}, 0x4f4}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x15, 0x4, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x20, 0x0, 0x9, 0x301, 0x0, 0x0, {0xc, 0x0, 0x1}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x8}}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x1009) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="4c000000100001040000000000000511734b8235f9f010af82ec262bb4b7e8d30872997cd0ba7b38ac30d3e7fa34c701ac64438374312aeceb5423097da8be73a1ba77a6f7b5d2dbf14b13edaca51217d6e57582d124d67f38e022898a534f36c34bae7b0a53a84a2fa96aad36482936f0389b1e5efb97d20c8738fd79b9b045452bab0469eaeab7f9f2c138518d301997fb88a15a10030372c9f239b87a0d1109b84bf8d30ba15384a86315ae932860711875c74234831be604124f053209b66087ab6a5a46a744eb1a256e62fba518bb904f4962ec21e6a4c1c4447f3175aa967a903532497bae1653a7de55ff630bba1325694d8645d863800ade4aea89232c52897a5baf8210ae8fc781040ab636ebfdcba3dd2e1848945c7fac1f65da536176a8e7aa7b56999f9c845a1c1571573cb448e9766e49dbd57372125659", @ANYRES32=0x0, @ANYBLOB="2b030000000000001c0012800b00010067656e65766500000c000280060005000000000008000500", @ANYRES32=r6, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r6, @ANYBLOB], 0x4c}}, 0x0) 04:37:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000340)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10003}, {&(0x7f0000000080)="6758ca07c812a11eb8a2c76b258895df43cc0a5fb98652b68b80a9d259e94712f58341c86cfba339b3be0e64754eced0fb2d38640f2b98bdfd418009208a4a1cf3020b386a0622b20c715048e8fe28a96f51db17750afe3ea5e7d7e291d04b0744396afc6c857a3a07118665b38594ea802dd252065b04cea43d766e5daadae6c0de363dcecc15901faffdfb9e325bc736d85fe8aad786e48a3eed1624fc10b12bd124488678b1c07e1fd6816c1841c7d2db4e8e53cc1bb4a0f23930859fd1a2a844a9c761451969d6828005a79c663d115ad01f5a3d378c3f94fb1d1bec570a13d532dcabf3736255de4ad7bbeb1afe941af9", 0xf3, 0x7}, {&(0x7f0000000200)="eab262e1cc9537e3f2678d645f5c9c5b9e3b2773db9f6c470d4f243570e6b76b3829fdb4fa311039c767ab11e2b14a4af2af504d05813f4133b5038bf52f029cfb278111c712fa279aef5a84a11cff4110df610a4a40f52ab519729dbfcdb968ee91de59ad4c2345b2ab7e0c3fadc474d2d3db1d922a7cef67b933174c52", 0x7e, 0x8}], 0x0, 0x0) [ 303.616497] input: syz1 as /devices/virtual/input/input501 [ 303.677049] nla_parse: 9 callbacks suppressed [ 303.677055] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 04:37:18 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r3) ioctl$UI_SET_PHYS(r3, 0x4008556c, &(0x7f0000000000)='syz0\x00') ioctl$UI_DEV_CREATE(r0, 0x5501) [ 303.727570] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 04:37:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r2, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r5}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000040)={r5, 0xfffffffe}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000340)={r5, 0x20, 0x9, [0x401, 0x8, 0x19, 0x2, 0x50, 0x5, 0x9, 0x5, 0x8001]}, 0x1a) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r6, &(0x7f0000000280)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r7}}, 0x30) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r7}}, 0xc) sendto$inet(r2, &(0x7f0000000640)="dd8a59ee44155d31bbc943357379636530cf95a741ea27efae1e515c4e8022042954c0a67801affcd45dfa7638329947a3b6a25a64555f2f74daf16da4cd166301e594df730d7294bdb459ffa543818c0fad7d45275a3947884589b252930026121ef435d303e65fdb340536917de6e0da09b4927606a0442e2c4cdb6c6723cad24312b0b638479ca028e116a1c59876a131fa57dddb5d9a7ed87c0b23a413caa50226d6cbdfbfb1352830b8a482d549164391a3909680a790979e29fa0a613892ddc061393d0199a0aff322c375abec7422d9039461916cf25a2d", 0xfffffffffffffc6d, 0x0, 0x0, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000140)={@multicast1, @multicast1, 0x0}, &(0x7f0000000180)=0xc) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000200)={@private1, 0x5d, r8}) [ 303.793826] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 04:37:18 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="2b030000000000001c0012800b00010067656e65766500000c000280060005000000000008000500", @ANYRES32=r6, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r6, @ANYBLOB="8cc47bf60095cc7703fbbd800ed35467dc481e1f5992e6775c448566854124ef05323c9f65a9bd3e342ecd60a3c0bcb51617f64ab2ddfc4b06c6c674b02a176c80ad79075c1b3e50c3768aa9fc17998b89e4e0f5093a1fda1176f50bf37f8562466a6305658383c8c095b7776dfe022e37f67a01e8b3c96b8be367baac555b5d56cf1380943f8d6a380d0a39e412bff222a972f6a082bd241cc71433e4868fa93bdb"], 0x4c}}, 0x0) [ 303.841616] input: syz1 as /devices/virtual/input/input502 [ 303.921194] input: syz1 as /devices/virtual/input/input503 04:37:18 executing program 1 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:18 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x101, {0x4, 0x3, 0x0, 0x0, 0x8}}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 303.973150] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 304.020900] FAULT_INJECTION: forcing a failure. [ 304.020900] name failslab, interval 1, probability 0, space 0, times 0 [ 304.050337] input: syz1 as /devices/virtual/input/input504 [ 304.063207] CPU: 0 PID: 23625 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 304.071094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.080444] Call Trace: [ 304.083033] dump_stack+0x1b2/0x283 [ 304.086663] should_fail.cold+0x10a/0x154 [ 304.090818] should_failslab+0xd6/0x130 [ 304.094792] kmem_cache_alloc+0x28e/0x3c0 [ 304.098944] getname_flags+0xc8/0x550 [ 304.102760] do_sys_open+0x202/0x3e0 [ 304.106479] ? filp_open+0x60/0x60 [ 304.110020] ? SyS_pwrite64+0xca/0x140 [ 304.113908] ? fput+0xb/0x140 [ 304.117017] ? do_syscall_64+0x4c/0x640 [ 304.120992] ? do_sys_open+0x3e0/0x3e0 [ 304.124911] do_syscall_64+0x1d5/0x640 [ 304.128830] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 304.134033] RIP: 0033:0x416921 [ 304.137217] RSP: 002b:00007f2401f3da60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 304.144924] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 0000000000416921 [ 304.152192] RDX: 00007f2401f3db0a RSI: 0000000000000002 RDI: 00007f2401f3db00 [ 304.159459] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 304.166727] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 304.173992] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:18 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_MODE_SETPROPERTY(0xffffffffffffffff, 0xc01064ab, &(0x7f0000000100)={0xfc0, 0x8, 0x20}) dup2(0xffffffffffffffff, r3) getpeername$l2tp6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @private}}, &(0x7f0000000040)=0x20) ioctl$UI_DEV_CREATE(r0, 0x5501) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000080)={0x0, 0xfff9}, 0x8) [ 304.235044] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 304.309005] input: syz1 as /devices/virtual/input/input506 04:37:19 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000100100000a000000f300000000000000cfa243d5bb0e667d0ce65cc81625920b2820fdaaa80308d68e8410aa3b217328a8fbed3b929745d1ea748042130c4e495a0c14e6bdf8f4f236389f4ca525718506b590ee526cb323489551f9f429524581ebfba63b25b4ac543eaa20bc582588e47446d4c3aa271a4cf7b908d6018ad9d5d7c622e99e3e507a48a72fc1908c3e74175fa3fed85a8936658a234c4292cd005387ced55396e02acec84d768d2823"], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000380), &(0x7f0000000480)=0x4) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0100000001000000280012000ccdeb51ca9449cc93000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="700100001e0020002dbd7000fcdbdf2507000000", @ANYRES32=0x0, @ANYBLOB="1002000000000000", @ANYRES32=r4, @ANYBLOB="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"], 0x170}}, 0x0) [ 304.375706] input: syz1 as /devices/virtual/input/input507 04:37:19 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000240)={{{@in6=@dev, @in=@loopback}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:37:19 executing program 1 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 304.498183] input: syz1 as /devices/virtual/input/input508 [ 304.509205] FAULT_INJECTION: forcing a failure. [ 304.509205] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 304.521059] CPU: 1 PID: 23673 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 304.527461] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 304.528928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.528934] Call Trace: [ 304.528954] dump_stack+0x1b2/0x283 [ 304.528974] should_fail.cold+0x10a/0x154 [ 304.528992] __alloc_pages_nodemask+0x22b/0x2730 [ 304.529022] ? generic_file_write_iter+0x37a/0x650 [ 304.566875] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 304.571719] ? trace_hardirqs_on+0x10/0x10 [ 304.575958] ? up_write+0x17/0x60 [ 304.579406] ? generic_file_write_iter+0x2f8/0x650 [ 304.584341] cache_grow_begin+0x91/0x410 [ 304.588405] cache_alloc_refill+0x28c/0x360 [ 304.592725] kmem_cache_alloc+0x333/0x3c0 [ 304.596885] getname_flags+0xc8/0x550 [ 304.600680] do_sys_open+0x202/0x3e0 [ 304.604393] ? filp_open+0x60/0x60 [ 304.607928] ? SyS_pwrite64+0xca/0x140 [ 304.611811] ? fput+0xb/0x140 [ 304.614732] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.2'. [ 304.614917] ? do_syscall_64+0x4c/0x640 [ 304.627432] ? do_sys_open+0x3e0/0x3e0 [ 304.631319] do_syscall_64+0x1d5/0x640 [ 304.635210] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 304.640396] RIP: 0033:0x416921 [ 304.643581] RSP: 002b:00007f2401f3da60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 304.651283] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 0000000000416921 [ 304.658546] RDX: 00007f2401f3db0a RSI: 0000000000000002 RDI: 00007f2401f3db00 [ 304.665807] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 304.673072] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 304.680335] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da43651c0ed02000af9fdffff01004d010000000000000000007a0000000000fffd9a000001000000040001fffffff600008036576a5d4badfeb500000000060000000000000000", 0x48, 0x50000}], 0x1020, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.opaque\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000140)={'security\x00', 0x2, [{}, {}]}, 0x48) [ 304.738182] input: syz1 as /devices/virtual/input/input509 04:37:19 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x98, r1, 0x0, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x7c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x28, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}, @WGPEER_A_PROTOCOL_VERSION={0xfffffd40}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x20, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @rand_addr=0x64010101}}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) syz_emit_ethernet(0x106, &(0x7f0000000480)={@remote, @local, @val={@void, {0x8100, 0x2, 0x1, 0x4}}, {@ipx={0x8137, {0xffff, 0xf4, 0x7, 0x11, {@broadcast, @broadcast, 0x9}, {@broadcast, @current, 0x1000}, "d998aac15ecf9abbf3a5ad3c351e097a0926e50c16739d37e4637edbc23bc993d04628435c3cd9799da7858803de2f9fabc0460e4c51bef691b87b6a2ad85214ea3f630d7b356029eb583f9fdd106ecba8146ab136872b50da3f3c49a7b13a3e6e8f1ffc8fed04d7adaa72faecf4e87087579739da87450ec26c776af70ea4262313a69ad8a1ea9349bd2c9594e728c8eae8002b1f576833405ba13713567081e76fced980dd66db4d19f98abc3c37321c01dd554f4f4f4f5bb5a2fec05dc043b7567b64842665d61888473668bbbc5e91b687222d67"}}}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 04:37:19 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='pids.current\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r3) ioctl$UI_DEV_SETUP(r3, 0x405c5503, &(0x7f0000000000)={{0x7ff, 0xff, 0x5, 0xff}, 'syz0\x00', 0x45}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) rt_sigreturn() r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x80000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r4, 0xc08c5334, &(0x7f0000000240)={0xbdd, 0x8, 0x1, 'queue1\x00', 0x6854}) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:37:19 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) unlink(&(0x7f0000000000)='./file0\x00') ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 304.914452] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 304.976010] input: syz1 as /devices/virtual/input/input511 [ 305.033190] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 305.053922] input: syz1 as /devices/virtual/input/input512 04:37:19 executing program 1 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:19 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, 0x1406, 0x2, 0x70bd25, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x20004040}, 0x1) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 305.187944] FAULT_INJECTION: forcing a failure. [ 305.187944] name failslab, interval 1, probability 0, space 0, times 0 [ 305.228807] CPU: 1 PID: 23741 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 305.236697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.246044] Call Trace: [ 305.248633] dump_stack+0x1b2/0x283 [ 305.252277] should_fail.cold+0x10a/0x154 [ 305.256429] should_failslab+0xd6/0x130 [ 305.260404] kmem_cache_alloc+0x28e/0x3c0 [ 305.264582] selinux_file_alloc_security+0xaf/0x190 [ 305.269633] security_file_alloc+0x66/0xa0 [ 305.273863] ? selinux_is_enabled+0x5/0x50 [ 305.278091] get_empty_filp+0x15c/0x3e0 [ 305.282072] path_openat+0x87/0x2aa0 [ 305.285793] ? kasan_kmalloc.part.0+0xa6/0xd0 [ 305.290300] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 305.294802] ? kmem_cache_alloc+0x124/0x3c0 [ 305.299120] ? getname_flags+0xc8/0x550 [ 305.303093] ? do_sys_open+0x202/0x3e0 [ 305.306980] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 305.312347] ? path_mountpoint+0x960/0x960 [ 305.316582] ? trace_hardirqs_on+0x10/0x10 [ 305.320845] ? __generic_file_write_iter+0x194/0x590 [ 305.325949] do_filp_open+0x18e/0x250 [ 305.329765] ? may_open_dev+0xe0/0xe0 [ 305.333566] ? __alloc_fd+0x1bf/0x490 [ 305.337380] ? lock_acquire+0x170/0x3f0 [ 305.341351] ? lock_downgrade+0x6e0/0x6e0 [ 305.345513] ? do_raw_spin_unlock+0x164/0x250 [ 305.350009] ? __alloc_fd+0x1bf/0x490 [ 305.353811] do_sys_open+0x292/0x3e0 [ 305.357529] ? filp_open+0x60/0x60 [ 305.361081] ? SyS_pwrite64+0xca/0x140 [ 305.364965] ? fput+0xb/0x140 [ 305.368067] ? do_syscall_64+0x4c/0x640 [ 305.372037] ? do_sys_open+0x3e0/0x3e0 [ 305.375922] do_syscall_64+0x1d5/0x640 [ 305.379811] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 305.385012] RIP: 0033:0x416921 [ 305.388201] RSP: 002b:00007f2401f3da60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 305.395916] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 0000000000416921 [ 305.403177] RDX: 00007f2401f3db0a RSI: 0000000000000002 RDI: 00007f2401f3db00 [ 305.410443] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 305.417705] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 305.424966] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:20 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0800000000000031f02ac22c4e44002700a9c40c00010076", @ANYRES32=r4, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0xc0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}}, 0x0) [ 305.455143] input: syz1 as /devices/virtual/input/input513 [ 305.531032] input: syz1 as /devices/virtual/input/input514 [ 305.575537] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. 04:37:20 executing program 1 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:20 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f, {0x0, 0x0, 0x0, 0x0, 0x200000}}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x8001, 0x0) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0x4) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) socket$inet_udplite(0x2, 0x2, 0x88) prlimit64(0x0, 0xe, &(0x7f0000000280)={0xd, 0xffffffffffffff81}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r3, &(0x7f0000002a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) socket$vsock_stream(0x28, 0x1, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) vmsplice(r4, &(0x7f0000000180), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x5, 0x0, 0x0, 0x3, 0x0, 0x0, 0x40000000003, 0x0, 0x4}, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video2\x00', 0x2, 0x0) 04:37:20 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000100100000a000000e700000000000000"], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x38, 0x0, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x87}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @remote}]}, 0x38}}, 0x20000001) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 305.699715] FAULT_INJECTION: forcing a failure. [ 305.699715] name failslab, interval 1, probability 0, space 0, times 0 [ 305.727900] CPU: 0 PID: 23769 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 305.735789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.745143] Call Trace: [ 305.747730] dump_stack+0x1b2/0x283 [ 305.751380] should_fail.cold+0x10a/0x154 [ 305.755577] should_failslab+0xd6/0x130 [ 305.759611] kmem_cache_alloc+0x28e/0x3c0 [ 305.763766] selinux_file_alloc_security+0xaf/0x190 [ 305.768812] security_file_alloc+0x66/0xa0 [ 305.773042] ? selinux_is_enabled+0x5/0x50 [ 305.777298] get_empty_filp+0x15c/0x3e0 [ 305.781299] path_openat+0x87/0x2aa0 [ 305.785031] ? kasan_kmalloc.part.0+0xa6/0xd0 [ 305.789522] ? kasan_kmalloc.part.0+0x4f/0xd0 [ 305.794024] ? kmem_cache_alloc+0x124/0x3c0 [ 305.798338] ? getname_flags+0xc8/0x550 [ 305.802307] ? do_sys_open+0x202/0x3e0 [ 305.806192] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 305.811569] ? path_mountpoint+0x960/0x960 [ 305.815801] ? trace_hardirqs_on+0x10/0x10 [ 305.820048] do_filp_open+0x18e/0x250 [ 305.823851] ? may_open_dev+0xe0/0xe0 [ 305.827650] ? __alloc_fd+0x1bf/0x490 [ 305.831450] ? lock_acquire+0x170/0x3f0 [ 305.835426] ? lock_downgrade+0x6e0/0x6e0 [ 305.839574] ? do_raw_spin_unlock+0x164/0x250 [ 305.844066] ? __alloc_fd+0x1bf/0x490 [ 305.847867] do_sys_open+0x292/0x3e0 [ 305.851577] ? filp_open+0x60/0x60 [ 305.855109] ? SyS_pwrite64+0xca/0x140 [ 305.858992] ? fput+0xb/0x140 [ 305.862090] ? do_syscall_64+0x4c/0x640 [ 305.866077] ? do_sys_open+0x3e0/0x3e0 [ 305.869961] do_syscall_64+0x1d5/0x640 [ 305.873853] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 305.879036] RIP: 0033:0x416921 [ 305.882214] RSP: 002b:00007f2401f3da60 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 305.889918] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 0000000000416921 [ 305.897174] RDX: 00007f2401f3db0a RSI: 0000000000000002 RDI: 00007f2401f3db00 [ 305.904439] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 305.911702] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000003 [ 305.918964] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:20 executing program 1 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 306.081457] FAULT_INJECTION: forcing a failure. [ 306.081457] name failslab, interval 1, probability 0, space 0, times 0 [ 306.124905] CPU: 1 PID: 23794 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 306.132796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.142143] Call Trace: [ 306.144734] dump_stack+0x1b2/0x283 [ 306.148366] should_fail.cold+0x10a/0x154 [ 306.152543] should_failslab+0xd6/0x130 [ 306.156518] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 306.161331] ? loop_get_status64+0x100/0x100 [ 306.165739] __kthread_create_on_node+0xbe/0x3a0 [ 306.170493] ? kthread_park+0x130/0x130 [ 306.174475] ? lo_ioctl+0x87/0x1c00 [ 306.178115] ? __mutex_lock+0x2cb/0x1430 [ 306.182197] ? __fget+0x1ff/0x360 [ 306.185653] ? loop_get_status64+0x100/0x100 [ 306.190069] kthread_create_on_node+0xa8/0xd0 [ 306.194573] ? __kthread_create_on_node+0x3a0/0x3a0 [ 306.199584] ? __lockdep_init_map+0x100/0x560 [ 306.204073] ? __lockdep_init_map+0x100/0x560 [ 306.208563] lo_ioctl+0xca9/0x1c00 [ 306.212105] ? loop_clr_fd+0xac0/0xac0 [ 306.216003] blkdev_ioctl+0x91d/0x17c0 [ 306.219892] ? blkpg_ioctl+0x8d0/0x8d0 [ 306.223785] ? trace_hardirqs_on+0x10/0x10 [ 306.228041] block_ioctl+0xd9/0x120 [ 306.231669] ? blkdev_fallocate+0x3a0/0x3a0 [ 306.235987] do_vfs_ioctl+0x75a/0xfe0 [ 306.239783] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 306.245402] ? ioctl_preallocate+0x1a0/0x1a0 [ 306.249856] ? security_file_ioctl+0x76/0xb0 [ 306.254261] ? security_file_ioctl+0x83/0xb0 [ 306.258671] SyS_ioctl+0x7f/0xb0 [ 306.262045] ? do_vfs_ioctl+0xfe0/0xfe0 [ 306.266032] do_syscall_64+0x1d5/0x640 [ 306.269920] entry_SYSCALL_64_after_hwframe+0x46/0xbb 04:37:21 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x6c, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x50, 0x8, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8, 0x3, 0x3}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x804, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 306.275099] RIP: 0033:0x45c9f7 [ 306.278281] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 306.285985] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045c9f7 [ 306.293251] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 306.300539] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 306.307799] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 306.315059] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:21 executing program 1 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:21 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r2 = dup2(0xffffffffffffffff, r1) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) getsockname$inet(r2, &(0x7f0000000080), &(0x7f0000000100)=0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 306.671834] FAULT_INJECTION: forcing a failure. [ 306.671834] name failslab, interval 1, probability 0, space 0, times 0 [ 306.687154] input: syz1 as /devices/virtual/input/input517 [ 306.705465] CPU: 0 PID: 23823 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 306.713344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.722691] Call Trace: [ 306.725276] dump_stack+0x1b2/0x283 [ 306.728909] should_fail.cold+0x10a/0x154 [ 306.733089] should_failslab+0xd6/0x130 [ 306.737058] kmem_cache_alloc+0x28e/0x3c0 [ 306.741200] __kernfs_new_node+0x6f/0x470 [ 306.745344] kernfs_new_node+0x7b/0xe0 [ 306.749228] kernfs_create_dir_ns+0x3c/0x130 [ 306.753781] internal_create_group+0xea/0x7e0 [ 306.758276] lo_ioctl+0x1108/0x1c00 [ 306.761935] ? loop_clr_fd+0xac0/0xac0 [ 306.765815] blkdev_ioctl+0x91d/0x17c0 04:37:21 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d346c31272800000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(0xffffffffffffffff, 0xc008551b, &(0x7f0000000380)={0x400, 0x8, [0xa165, 0x0]}) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYRESDEC, @ANYRES32=r5, @ANYBLOB="3c4ff1931296fe65bbe48000"/27, @ANYRES32=r5, @ANYBLOB], 0x4c}}, 0x0) [ 306.769693] ? blkpg_ioctl+0x8d0/0x8d0 [ 306.773593] ? trace_hardirqs_on+0x10/0x10 [ 306.777830] block_ioctl+0xd9/0x120 [ 306.781450] ? blkdev_fallocate+0x3a0/0x3a0 [ 306.785798] do_vfs_ioctl+0x75a/0xfe0 [ 306.789616] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 306.795235] ? ioctl_preallocate+0x1a0/0x1a0 [ 306.799655] ? security_file_ioctl+0x76/0xb0 [ 306.804059] ? security_file_ioctl+0x83/0xb0 [ 306.808509] SyS_ioctl+0x7f/0xb0 [ 306.811884] ? do_vfs_ioctl+0xfe0/0xfe0 [ 306.815858] do_syscall_64+0x1d5/0x640 [ 306.819766] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 306.824955] RIP: 0033:0x45c9f7 [ 306.828158] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 306.835869] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045c9f7 [ 306.843135] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 306.850397] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 306.857661] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 306.859153] print_req_error: I/O error, dev loop1, sector 0 [ 306.864942] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 306.916482] print_req_error: I/O error, dev loop1, sector 0 [ 306.922311] Buffer I/O error on dev loop1, logical block 0, async page read [ 306.930007] print_req_error: I/O error, dev loop1, sector 0 [ 306.935753] Buffer I/O error on dev loop1, logical block 0, async page read [ 306.943244] print_req_error: I/O error, dev loop1, sector 0 [ 306.949039] Buffer I/O error on dev loop1, logical block 0, async page read [ 306.956638] print_req_error: I/O error, dev loop1, sector 0 [ 306.962471] Buffer I/O error on dev loop1, logical block 0, async page read [ 306.970235] print_req_error: I/O error, dev loop1, sector 0 [ 306.975985] Buffer I/O error on dev loop1, logical block 0, async page read [ 306.983622] print_req_error: I/O error, dev loop1, sector 0 [ 306.989404] Buffer I/O error on dev loop1, logical block 0, async page read [ 306.996914] print_req_error: I/O error, dev loop1, sector 24 [ 307.003012] Buffer I/O error on dev loop1, logical block 3, async page read 04:37:21 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f0000000380)={0x0, 0xfd3e, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$NBD_SET_SIZE_BLOCKS(0xffffffffffffffff, 0xab07, 0x1) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 04:37:21 executing program 1 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 307.356540] FAULT_INJECTION: forcing a failure. [ 307.356540] name failslab, interval 1, probability 0, space 0, times 0 [ 307.368278] CPU: 0 PID: 23869 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 307.376165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.385513] Call Trace: [ 307.388099] dump_stack+0x1b2/0x283 [ 307.391728] should_fail.cold+0x10a/0x154 [ 307.395877] should_failslab+0xd6/0x130 [ 307.399848] kmem_cache_alloc+0x40/0x3c0 [ 307.403923] radix_tree_node_alloc.constprop.0+0x1b4/0x300 [ 307.409541] ? kernfs_new_node+0x7b/0xe0 [ 307.413600] idr_get_free_cmn+0x591/0x8d0 [ 307.417751] idr_alloc_cmn+0xe8/0x1e0 [ 307.421548] ? __fprop_inc_percpu_max+0x1d0/0x1d0 [ 307.426391] ? fs_reclaim_acquire+0x10/0x10 [ 307.430713] idr_alloc_cyclic+0xc2/0x1d0 [ 307.434773] ? idr_alloc_cmn+0x1e0/0x1e0 [ 307.438828] ? __radix_tree_preload+0x1c3/0x250 [ 307.443496] __kernfs_new_node+0xaf/0x470 [ 307.447643] kernfs_new_node+0x7b/0xe0 [ 307.451529] kernfs_create_dir_ns+0x3c/0x130 [ 307.455935] internal_create_group+0xea/0x7e0 [ 307.460437] lo_ioctl+0x1108/0x1c00 [ 307.464062] ? loop_clr_fd+0xac0/0xac0 [ 307.467948] blkdev_ioctl+0x91d/0x17c0 [ 307.471832] ? blkpg_ioctl+0x8d0/0x8d0 [ 307.475713] ? trace_hardirqs_on+0x10/0x10 [ 307.479953] block_ioctl+0xd9/0x120 [ 307.483573] ? blkdev_fallocate+0x3a0/0x3a0 [ 307.487891] do_vfs_ioctl+0x75a/0xfe0 [ 307.491686] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 307.497302] ? ioctl_preallocate+0x1a0/0x1a0 [ 307.501711] ? security_file_ioctl+0x76/0xb0 [ 307.506125] ? security_file_ioctl+0x83/0xb0 [ 307.510531] SyS_ioctl+0x7f/0xb0 [ 307.513887] ? do_vfs_ioctl+0xfe0/0xfe0 [ 307.517859] do_syscall_64+0x1d5/0x640 [ 307.521751] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 307.526933] RIP: 0033:0x45c9f7 [ 307.530115] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 307.537816] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045c9f7 [ 307.545077] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 307.552340] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 307.559606] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 307.566866] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:22 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f0000000380)={0xfffffff9, 0x0, 0x6001, 0x8, 0x3ff, {0xe, 0x5}}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 04:37:22 executing program 1 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 307.734431] FAULT_INJECTION: forcing a failure. [ 307.734431] name failslab, interval 1, probability 0, space 0, times 0 [ 307.749928] print_req_error: I/O error, dev loop1, sector 0 [ 307.755784] print_req_error: I/O error, dev loop1, sector 0 [ 307.761594] Buffer I/O error on dev loop1, logical block 0, async page read [ 307.774994] Buffer I/O error on dev loop1, logical block 0, async page read [ 307.785675] Buffer I/O error on dev loop1, logical block 0, async page read [ 307.802664] CPU: 0 PID: 23888 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 307.810548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.819896] Call Trace: [ 307.822482] dump_stack+0x1b2/0x283 [ 307.826124] should_fail.cold+0x10a/0x154 [ 307.830297] should_failslab+0xd6/0x130 [ 307.834268] kmem_cache_alloc+0x28e/0x3c0 [ 307.838416] __kernfs_new_node+0x6f/0x470 [ 307.842576] kernfs_new_node+0x7b/0xe0 [ 307.846474] __kernfs_create_file+0x3d/0x320 [ 307.850899] sysfs_add_file_mode_ns+0x1e1/0x450 [ 307.855607] internal_create_group+0x23b/0x7e0 [ 307.860197] lo_ioctl+0x1108/0x1c00 [ 307.863825] ? loop_clr_fd+0xac0/0xac0 [ 307.867712] blkdev_ioctl+0x91d/0x17c0 [ 307.871594] ? blkpg_ioctl+0x8d0/0x8d0 [ 307.875521] ? trace_hardirqs_on+0x10/0x10 [ 307.879788] block_ioctl+0xd9/0x120 [ 307.883437] ? blkdev_fallocate+0x3a0/0x3a0 [ 307.887769] do_vfs_ioctl+0x75a/0xfe0 [ 307.891585] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 307.897209] ? ioctl_preallocate+0x1a0/0x1a0 [ 307.901636] ? security_file_ioctl+0x76/0xb0 [ 307.906040] ? security_file_ioctl+0x83/0xb0 [ 307.910466] SyS_ioctl+0x7f/0xb0 [ 307.913840] ? do_vfs_ioctl+0xfe0/0xfe0 [ 307.917814] do_syscall_64+0x1d5/0x640 [ 307.921706] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 307.926889] RIP: 0033:0x45c9f7 [ 307.930071] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 307.937786] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045c9f7 [ 307.945050] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 307.952316] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 307.959577] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 307.966840] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:22 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000100000000"], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="02002abd7000fbdbdf25010000000800070000e2637e8c9e2d6a37a3224eff73430ea06cf40c6e6cba268c2c4828d480a4c69012bf127402797f18"], 0x24}, 0x1, 0x0, 0x0, 0x8091}, 0x406c801) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0xa57d, 0x20a0c1) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0xfffffffffffffd5c}}, 0x0) 04:37:22 executing program 1 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 308.203021] FAULT_INJECTION: forcing a failure. [ 308.203021] name failslab, interval 1, probability 0, space 0, times 0 [ 308.236902] CPU: 0 PID: 23908 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 308.244796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.254143] Call Trace: [ 308.256751] dump_stack+0x1b2/0x283 [ 308.260410] should_fail.cold+0x10a/0x154 [ 308.264566] should_failslab+0xd6/0x130 [ 308.268535] kmem_cache_alloc+0x28e/0x3c0 [ 308.272682] __kernfs_new_node+0x6f/0x470 [ 308.276824] kernfs_new_node+0x7b/0xe0 [ 308.280706] __kernfs_create_file+0x3d/0x320 [ 308.285109] sysfs_add_file_mode_ns+0x1e1/0x450 [ 308.289781] internal_create_group+0x23b/0x7e0 [ 308.294367] lo_ioctl+0x1108/0x1c00 [ 308.298005] ? loop_clr_fd+0xac0/0xac0 [ 308.301892] blkdev_ioctl+0x91d/0x17c0 [ 308.305772] ? blkpg_ioctl+0x8d0/0x8d0 [ 308.309652] ? trace_hardirqs_on+0x10/0x10 [ 308.313894] block_ioctl+0xd9/0x120 [ 308.317523] ? blkdev_fallocate+0x3a0/0x3a0 [ 308.321847] do_vfs_ioctl+0x75a/0xfe0 [ 308.325649] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 308.331283] ? ioctl_preallocate+0x1a0/0x1a0 [ 308.335726] ? security_file_ioctl+0x76/0xb0 [ 308.340148] ? security_file_ioctl+0x83/0xb0 [ 308.344560] SyS_ioctl+0x7f/0xb0 [ 308.347917] ? do_vfs_ioctl+0xfe0/0xfe0 [ 308.351890] do_syscall_64+0x1d5/0x640 [ 308.355828] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 308.361013] RIP: 0033:0x45c9f7 [ 308.364190] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 308.371889] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045c9f7 [ 308.379148] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 308.386409] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 308.393670] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 308.400938] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:23 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x8, 0x3, 0x4) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@bridge_newneigh={0x48, 0x1c, 0x400, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, 0x0, 0x8, 0x96, 0x8}, [@NDA_LINK_NETNSID={0x8, 0xa, 0x101}, @NDA_DST_IPV4={0x8, 0x1, @private=0xa010101}, @NDA_SRC_VNI={0x8, 0xb, 0xfffff801}, @NDA_LLADDR={0xa}, @NDA_VNI={0x8, 0x7, 0xf0c}]}, 0x48}}, 0x0) 04:37:23 executing program 1 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 308.630312] FAULT_INJECTION: forcing a failure. [ 308.630312] name failslab, interval 1, probability 0, space 0, times 0 [ 308.663203] CPU: 1 PID: 23934 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 308.671089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.680435] Call Trace: [ 308.683020] dump_stack+0x1b2/0x283 [ 308.686647] should_fail.cold+0x10a/0x154 [ 308.690818] should_failslab+0xd6/0x130 [ 308.694789] kmem_cache_alloc+0x28e/0x3c0 [ 308.698933] __kernfs_new_node+0x6f/0x470 [ 308.703089] kernfs_new_node+0x7b/0xe0 [ 308.706973] __kernfs_create_file+0x3d/0x320 [ 308.711412] sysfs_add_file_mode_ns+0x1e1/0x450 [ 308.716111] internal_create_group+0x23b/0x7e0 [ 308.720696] lo_ioctl+0x1108/0x1c00 [ 308.724324] ? loop_clr_fd+0xac0/0xac0 [ 308.728217] blkdev_ioctl+0x91d/0x17c0 [ 308.732100] ? blkpg_ioctl+0x8d0/0x8d0 [ 308.736007] ? trace_hardirqs_on+0x10/0x10 [ 308.740251] block_ioctl+0xd9/0x120 [ 308.743871] ? blkdev_fallocate+0x3a0/0x3a0 [ 308.748207] do_vfs_ioctl+0x75a/0xfe0 [ 308.752022] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 308.757641] ? ioctl_preallocate+0x1a0/0x1a0 [ 308.762065] ? security_file_ioctl+0x76/0xb0 [ 308.766469] ? security_file_ioctl+0x83/0xb0 [ 308.770891] SyS_ioctl+0x7f/0xb0 [ 308.774251] ? do_vfs_ioctl+0xfe0/0xfe0 [ 308.778233] do_syscall_64+0x1d5/0x640 [ 308.782124] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 308.787329] RIP: 0033:0x45c9f7 [ 308.790514] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 308.798234] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045c9f7 [ 308.805497] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 308.812760] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 308.820020] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 308.827300] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:23 executing program 2: setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="0800005106000000297b0bc6bcbef28483725baf921af3768346f60f908e6b3b33c6773271ee609e0a21e14068e19a5d4258b96ddcf390e9b6b315ee4c67b441c570da83f6ff7854a9d2c1e77d5ad7d634f20d8dfd1ca1b56d9448bdd7c10ee7e249901dea980961bad261992b2141f2d6644edc06a27dde951d5e8f6c56bd8d74665902f185f648ce3e6999b1c1363b59fe3d9d1df6d74a75cd874965b7b6eb5175bd96e29d8b2b", @ANYRES16=r1, @ANYBLOB="02002abd7000fbdbdf250100000008000700000400005c000880180000801400040002004e24e00000020000000000000000180000801400040002004e21ffffffff0000000000000000100000800400098008000a0001000000180000801400040002004e20ac1e00010000000000000000"], 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918debe363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9ccbcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x4000020}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x403ab}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_DF={0x5}]}}}, @IFLA_NUM_RX_QUEUES={0x8}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0xffffffffffffffc1}}, 0x0) 04:37:23 executing program 1 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 309.028684] FAULT_INJECTION: forcing a failure. [ 309.028684] name failslab, interval 1, probability 0, space 0, times 0 [ 309.041136] nla_parse: 12 callbacks suppressed [ 309.041142] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 309.068135] CPU: 0 PID: 23950 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 309.076022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.085367] Call Trace: [ 309.087952] dump_stack+0x1b2/0x283 [ 309.091580] should_fail.cold+0x10a/0x154 [ 309.095727] should_failslab+0xd6/0x130 [ 309.099705] kmem_cache_alloc+0x28e/0x3c0 [ 309.103865] __kernfs_new_node+0x6f/0x470 [ 309.108023] kernfs_new_node+0x7b/0xe0 [ 309.111927] __kernfs_create_file+0x3d/0x320 [ 309.116376] sysfs_add_file_mode_ns+0x1e1/0x450 [ 309.121065] internal_create_group+0x23b/0x7e0 [ 309.125648] lo_ioctl+0x1108/0x1c00 [ 309.129278] ? loop_clr_fd+0xac0/0xac0 [ 309.133164] blkdev_ioctl+0x91d/0x17c0 [ 309.137048] ? blkpg_ioctl+0x8d0/0x8d0 [ 309.140930] ? trace_hardirqs_on+0x10/0x10 [ 309.145172] block_ioctl+0xd9/0x120 [ 309.148809] ? blkdev_fallocate+0x3a0/0x3a0 [ 309.153132] do_vfs_ioctl+0x75a/0xfe0 [ 309.156944] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 309.162569] ? ioctl_preallocate+0x1a0/0x1a0 [ 309.166988] ? security_file_ioctl+0x76/0xb0 [ 309.171393] ? security_file_ioctl+0x83/0xb0 [ 309.175800] SyS_ioctl+0x7f/0xb0 [ 309.179179] ? do_vfs_ioctl+0xfe0/0xfe0 [ 309.183161] do_syscall_64+0x1d5/0x640 [ 309.187060] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 309.192244] RIP: 0033:0x45c9f7 [ 309.195429] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 309.203128] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045c9f7 [ 309.210390] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 309.217667] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 309.224942] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 309.232206] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 309.305871] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 04:37:24 executing program 1 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:24 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8091}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0xc001}, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r3, 0x8982, &(0x7f0000000380)={0x3, 'virt_wifi0\x00', {0x3}, 0x7}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 309.442740] FAULT_INJECTION: forcing a failure. [ 309.442740] name failslab, interval 1, probability 0, space 0, times 0 [ 309.473972] CPU: 0 PID: 23972 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 309.481858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.491207] Call Trace: [ 309.493792] dump_stack+0x1b2/0x283 [ 309.497418] should_fail.cold+0x10a/0x154 [ 309.501564] should_failslab+0xd6/0x130 [ 309.505530] kmem_cache_alloc+0x28e/0x3c0 [ 309.509711] __kernfs_new_node+0x6f/0x470 [ 309.513869] kernfs_new_node+0x7b/0xe0 [ 309.517754] __kernfs_create_file+0x3d/0x320 [ 309.522159] sysfs_add_file_mode_ns+0x1e1/0x450 [ 309.526858] internal_create_group+0x23b/0x7e0 [ 309.531456] lo_ioctl+0x1108/0x1c00 [ 309.535081] ? loop_clr_fd+0xac0/0xac0 [ 309.538963] blkdev_ioctl+0x91d/0x17c0 [ 309.542843] ? blkpg_ioctl+0x8d0/0x8d0 [ 309.546725] ? trace_hardirqs_on+0x10/0x10 [ 309.550965] block_ioctl+0xd9/0x120 [ 309.554589] ? blkdev_fallocate+0x3a0/0x3a0 [ 309.558908] do_vfs_ioctl+0x75a/0xfe0 [ 309.562711] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 309.568329] ? ioctl_preallocate+0x1a0/0x1a0 [ 309.572756] ? security_file_ioctl+0x76/0xb0 [ 309.577160] ? security_file_ioctl+0x83/0xb0 [ 309.581567] SyS_ioctl+0x7f/0xb0 [ 309.584942] ? do_vfs_ioctl+0xfe0/0xfe0 [ 309.588917] do_syscall_64+0x1d5/0x640 [ 309.592820] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 309.598001] RIP: 0033:0x45c9f7 [ 309.601204] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 309.608915] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045c9f7 [ 309.616190] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 309.623458] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 309.630721] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 309.637981] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 309.675026] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 309.757992] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 04:37:24 executing program 1 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:24 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000380)='/dev/snd/pcmC#D#c\x00', 0x65d, 0x40) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 309.910607] FAULT_INJECTION: forcing a failure. [ 309.910607] name failslab, interval 1, probability 0, space 0, times 0 [ 309.938628] CPU: 1 PID: 24002 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 309.946528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.950544] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 309.955886] Call Trace: [ 309.955904] dump_stack+0x1b2/0x283 [ 309.955920] should_fail.cold+0x10a/0x154 [ 309.955934] should_failslab+0xd6/0x130 [ 309.978790] kmem_cache_alloc+0x28e/0x3c0 [ 309.982940] __kernfs_new_node+0x6f/0x470 [ 309.987102] kernfs_new_node+0x7b/0xe0 [ 309.990988] __kernfs_create_file+0x3d/0x320 [ 309.995396] sysfs_add_file_mode_ns+0x1e1/0x450 [ 310.000068] internal_create_group+0x23b/0x7e0 [ 310.004658] lo_ioctl+0x1108/0x1c00 [ 310.008285] ? loop_clr_fd+0xac0/0xac0 [ 310.012180] blkdev_ioctl+0x91d/0x17c0 [ 310.016080] ? blkpg_ioctl+0x8d0/0x8d0 [ 310.019975] ? trace_hardirqs_on+0x10/0x10 [ 310.024227] block_ioctl+0xd9/0x120 [ 310.027849] ? blkdev_fallocate+0x3a0/0x3a0 [ 310.032262] do_vfs_ioctl+0x75a/0xfe0 [ 310.036058] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 310.041685] ? ioctl_preallocate+0x1a0/0x1a0 [ 310.046103] ? security_file_ioctl+0x76/0xb0 [ 310.050511] ? security_file_ioctl+0x83/0xb0 [ 310.054930] SyS_ioctl+0x7f/0xb0 [ 310.058289] ? do_vfs_ioctl+0xfe0/0xfe0 [ 310.062262] do_syscall_64+0x1d5/0x640 [ 310.066155] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 310.071341] RIP: 0033:0x45c9f7 [ 310.074552] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 310.082252] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045c9f7 [ 310.089527] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 310.096789] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 310.104049] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 310.111305] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:24 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x111000, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000900)={{0x1, 0xfc}, 'port1\x00', 0xa0, 0x5044c, 0x0, 0x0, 0x7, 0x2, 0x2b9, 0x0, 0x1, 0x7}) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r2, 0xc01064c7, &(0x7f00000000c0)={0x4, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r1, 0xc00464c9, &(0x7f0000000140)={r4}) sendto$inet(r0, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000640)="dd8a59ee44155d31bbc943357379636530cf95a741ea27efae1e515c4e8022042954c0a67801affcd45dfa7638329947a3b6a25a64555f2f74daf16da4cd166301e594df730d7294bdb459ffa543818c0fad7d45275a3947884589b252930026121ef435d303e65fdb340536917de6e0da09b4927606a0442e2c4cdb6c6723cad24312b0b638479ca028e116a1c59876a131fa57dddb5d9a7ed87c0b23a413caa50226d6cbdfbfb1352830b8a482d549164391a3909680a790979e29fa0a613892ddc061393d0199a0aff322c375abec7422d9039461916cf25a2d", 0xfffffffffffffc6d, 0x0, 0x0, 0x0) r5 = syz_genetlink_get_family_id$smc(&(0x7f0000000580)='SMC_PNETID\x00') sendmsg$SMC_PNETID_ADD(r1, &(0x7f0000000780)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000740)={&(0x7f00000005c0)={0x44, r5, 0x1, 0x70bd29, 0x25dfdbff, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz2\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x44}}, 0x20008001) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r7) r8 = syz_genetlink_get_family_id$smc(&(0x7f0000000800)='SMC_PNETID\x00') sendmsg$SMC_PNETID_GET(r7, &(0x7f00000008c0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x2c, r8, 0x4, 0x70bd28, 0x25dfdbfe, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008001}, 0x40) 04:37:24 executing program 1 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 310.224287] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 04:37:25 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000b00737480001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) getsockname$ax25(r3, &(0x7f0000000480)={{0x3, @default}, [@netrom, @netrom, @bcast, @null, @rose, @null, @netrom, @netrom]}, &(0x7f0000000380)=0x48) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 310.329629] net_ratelimit: 2 callbacks suppressed [ 310.329634] ip_tables: iptables: counters copy to user failed while replacing table [ 310.339092] FAULT_INJECTION: forcing a failure. [ 310.339092] name failslab, interval 1, probability 0, space 0, times 0 [ 310.373356] CPU: 1 PID: 24027 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 310.381239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.390586] Call Trace: [ 310.393184] dump_stack+0x1b2/0x283 [ 310.396825] should_fail.cold+0x10a/0x154 [ 310.400977] should_failslab+0xd6/0x130 [ 310.404951] kmem_cache_alloc+0x28e/0x3c0 [ 310.409100] __kernfs_new_node+0x6f/0x470 [ 310.413244] kernfs_new_node+0x7b/0xe0 [ 310.417128] __kernfs_create_file+0x3d/0x320 [ 310.421577] sysfs_add_file_mode_ns+0x1e1/0x450 [ 310.426273] internal_create_group+0x23b/0x7e0 [ 310.430860] lo_ioctl+0x1108/0x1c00 [ 310.434484] ? loop_clr_fd+0xac0/0xac0 [ 310.438370] blkdev_ioctl+0x91d/0x17c0 [ 310.442267] ? blkpg_ioctl+0x8d0/0x8d0 [ 310.446174] ? trace_hardirqs_on+0x10/0x10 [ 310.450413] block_ioctl+0xd9/0x120 [ 310.454037] ? blkdev_fallocate+0x3a0/0x3a0 [ 310.458350] do_vfs_ioctl+0x75a/0xfe0 [ 310.462151] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 310.467799] ? ioctl_preallocate+0x1a0/0x1a0 [ 310.472240] ? security_file_ioctl+0x76/0xb0 [ 310.476656] ? security_file_ioctl+0x83/0xb0 [ 310.481067] SyS_ioctl+0x7f/0xb0 [ 310.484427] ? do_vfs_ioctl+0xfe0/0xfe0 [ 310.488422] do_syscall_64+0x1d5/0x640 [ 310.492309] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 310.497493] RIP: 0033:0x45c9f7 [ 310.500679] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 310.508382] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045c9f7 [ 310.515668] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 310.522946] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 310.530206] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 310.537465] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 310.548445] ip_tables: iptables: counters copy to user failed while replacing table [ 310.572612] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 04:37:25 executing program 1 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 310.704389] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 310.713315] FAULT_INJECTION: forcing a failure. [ 310.713315] name failslab, interval 1, probability 0, space 0, times 0 [ 310.734944] CPU: 1 PID: 24047 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 310.742830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.752177] Call Trace: [ 310.754763] dump_stack+0x1b2/0x283 [ 310.758422] should_fail.cold+0x10a/0x154 [ 310.762571] should_failslab+0xd6/0x130 [ 310.766537] __kmalloc+0x2c1/0x400 [ 310.770084] ? kobject_get_path+0xb0/0x190 [ 310.774314] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 310.779758] kobject_get_path+0xb0/0x190 [ 310.783815] kobject_uevent_env+0x21e/0xc50 [ 310.788177] lo_ioctl+0x1177/0x1c00 [ 310.791806] ? loop_clr_fd+0xac0/0xac0 [ 310.795693] blkdev_ioctl+0x91d/0x17c0 [ 310.799572] ? blkpg_ioctl+0x8d0/0x8d0 [ 310.803457] ? trace_hardirqs_on+0x10/0x10 [ 310.807704] block_ioctl+0xd9/0x120 [ 310.811325] ? blkdev_fallocate+0x3a0/0x3a0 [ 310.815657] do_vfs_ioctl+0x75a/0xfe0 [ 310.819458] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 310.825077] ? ioctl_preallocate+0x1a0/0x1a0 [ 310.829492] ? security_file_ioctl+0x76/0xb0 [ 310.833895] ? security_file_ioctl+0x83/0xb0 [ 310.838297] SyS_ioctl+0x7f/0xb0 [ 310.841678] ? do_vfs_ioctl+0xfe0/0xfe0 [ 310.845670] do_syscall_64+0x1d5/0x640 [ 310.849671] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 310.854868] RIP: 0033:0x45c9f7 [ 310.858048] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 310.865751] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045c9f7 [ 310.873011] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 310.880272] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 310.887535] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 310.894796] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:25 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="02002abd7000fbdbdf250100000008000700000400005c000880180000801400040002004e24e00000020000728bd9df0000180000801400040002004e21ffffffff0000000000000000100000800400098008000a0001010100ae890c15abe382c7ad1a3e51ac4179bb479378a7f471df5bfac5aae090c7aac59086d12dbd312650bb07dff696ecb80f3c00"/151], 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 04:37:25 executing program 1 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 311.090971] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 311.128898] FAULT_INJECTION: forcing a failure. [ 311.128898] name failslab, interval 1, probability 0, space 0, times 0 [ 311.141321] CPU: 0 PID: 24067 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 311.149210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.158558] Call Trace: [ 311.161157] dump_stack+0x1b2/0x283 [ 311.164792] should_fail.cold+0x10a/0x154 [ 311.168942] should_failslab+0xd6/0x130 [ 311.172920] kmem_cache_alloc_node_trace+0x25a/0x400 [ 311.178040] __kmalloc_node_track_caller+0x38/0x70 [ 311.183003] __kmalloc_reserve.isra.0+0x35/0xd0 [ 311.187676] __alloc_skb+0xca/0x4c0 04:37:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000d00200009800000000000000680100009800000000000000380200003802000038020000380200003802000004000000000000000000000010000000e00000020000000000000000626f6e645f736c6176655f310000000000000000000000000000e2ffffff001f00000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a45435400000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc18795000000000000000000000000000000000040000000000000000000000000000000000000010000000000000000000000a800d0000000000000000000000000000000000000000000380074696d650000000000554e8269000000000000000000000000000000000000000000ffffffff4f970000001b000000000000f9000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000ffff000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000380071756f7461000000000000000000000000000000000000000000000000000100000000deffff460d0000000000000000000000000000280052454a45435400000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028000000000000000000000000000000001ec500000000000000000000000000feffffff"], 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r3) setsockopt$inet6_dccp_buf(r3, 0x21, 0x2, &(0x7f0000000080), 0x0) [ 311.191302] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 311.196142] ? netlink_has_listeners+0x1ff/0x310 [ 311.200918] kobject_uevent_env+0x6d1/0xc50 [ 311.205247] lo_ioctl+0x1177/0x1c00 [ 311.208880] ? loop_clr_fd+0xac0/0xac0 [ 311.212778] blkdev_ioctl+0x91d/0x17c0 [ 311.216660] ? blkpg_ioctl+0x8d0/0x8d0 [ 311.220542] ? trace_hardirqs_on+0x10/0x10 [ 311.224785] block_ioctl+0xd9/0x120 [ 311.228405] ? blkdev_fallocate+0x3a0/0x3a0 [ 311.232726] do_vfs_ioctl+0x75a/0xfe0 [ 311.236527] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 311.242169] ? ioctl_preallocate+0x1a0/0x1a0 [ 311.246586] ? security_file_ioctl+0x76/0xb0 [ 311.250989] ? security_file_ioctl+0x83/0xb0 [ 311.255428] SyS_ioctl+0x7f/0xb0 [ 311.258798] ? do_vfs_ioctl+0xfe0/0xfe0 [ 311.262769] do_syscall_64+0x1d5/0x640 [ 311.266692] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 311.271877] RIP: 0033:0x45c9f7 [ 311.275061] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 311.282768] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045c9f7 [ 311.290031] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 311.297298] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 311.304564] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 311.311826] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 311.343460] ip_tables: iptables: counters copy to user failed while replacing table [ 311.352619] ip_tables: iptables: counters copy to user failed while replacing table [ 311.390941] ip_tables: iptables: counters copy to user failed while replacing table [ 311.400112] ip_tables: iptables: counters copy to user failed while replacing table [ 311.472675] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 04:37:26 executing program 1 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000d00200009800000000000000680100009800000000000000380200003802000038020000380200003802000004000000000000000000000010000000e00000020000000000000000626f6e645f736c6176655f310000000000000000000000000000e2ffffff001f00000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a45435400000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc18795000000000000000000000000000000000040000000000000000000000000000000000000010000000000000000000000a800d0000000000000000000000000000000000000000000380074696d650000000000554e8269000000000000000000000000000000000000000000ffffffff4f970000001b000000000000f9000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000ffff000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000380071756f7461000000000000000000000000000000000000000000000000000100000000deffff460d0000000000000000000000000000280052454a45435400000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028000000000000000000000000000000001ec500000000000000000000000000feffffff"], 0x1) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000580)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000540)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f00000005c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x3, {0xa, 0x4e21, 0x0, @local, 0xffffffff}, r4}}, 0x38) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r5) sendmsg$AUDIT_USER(r3, &(0x7f0000000880)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x91ff38eee2f1c09d}, 0xc, &(0x7f0000000840)={&(0x7f0000000740)={0xcc, 0x3ed, 0x200, 0x70bd2a, 0x25dfdbfe, "2032e0f519d5e253fdf48edb9268190d6cd12749e2a490ab75e98731e5548e9665d671c21c5673571081a19d64be221c421a51a58f8e45d258ef90cc55747abc5c02e6c38b54c7be7c15c035fbf173d2c1b92a485ded56aa1980a7b1492cb383613b90aed3f56c13f27b3d4547e741ddfc2113b9109384c5220c257fe402e2b30883f1472d8654e5cbb3099962fdd51f3106341b43719505aa91c23edfad96f926ad1c3bc8b30592c9e833a91fceecddc92be4db6a94f4455a766dd3", ["", "", "", "", "", "", "", "", ""]}, 0xcc}, 0x1, 0x0, 0x0, 0x44004}, 0x20040800) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r6, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r6, &(0x7f0000000640)="dd8a59ee44155d31bbc943357379636530cf95a741ea27efae1e515c4e8022042954c0a67801affcd45dfa7638329947a3b6a25a64555f2f74daf16da4cd166301e594df730d7294bdb459ffa543818c0fad7d45275a3947884589b252930026121ef435d303e65fdb340536917de6e0da09b4927606a0442e2c4cdb6c6723cad24312b0b638479ca028e116a1c59876a131fa57dddb5d9a7ed87c0b23a413caa50226d6cbdfbfb1352830b8a482d549164391a3909680a790979e29fa0a613892ddc061393d0199a0aff322c375abec7422d9039461916cf25a2d", 0xfffffffffffffc6d, 0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYRESHEX=r5, @ANYRESDEC=r6, @ANYRES16, @ANYRESDEC=r3], 0x1) 04:37:26 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000380)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) [ 311.648382] FAULT_INJECTION: forcing a failure. [ 311.648382] name failslab, interval 1, probability 0, space 0, times 0 [ 311.665251] CPU: 0 PID: 24095 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 311.673139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 311.674345] ip_tables: iptables: counters copy to user failed while replacing table [ 311.682483] Call Trace: [ 311.682569] dump_stack+0x1b2/0x283 [ 311.682585] should_fail.cold+0x10a/0x154 [ 311.700702] should_failslab+0xd6/0x130 [ 311.704681] kmem_cache_alloc_node_trace+0x25a/0x400 [ 311.709790] __kmalloc_node_track_caller+0x38/0x70 [ 311.714717] __kmalloc_reserve.isra.0+0x35/0xd0 [ 311.719393] __alloc_skb+0xca/0x4c0 [ 311.723031] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 311.724540] ip_tables: iptables: counters copy to user failed while replacing table [ 311.727868] ? netlink_has_listeners+0x1ff/0x310 [ 311.727883] kobject_uevent_env+0x6d1/0xc50 [ 311.727902] lo_ioctl+0x1177/0x1c00 [ 311.748402] ? loop_clr_fd+0xac0/0xac0 [ 311.752316] blkdev_ioctl+0x91d/0x17c0 [ 311.756202] ? blkpg_ioctl+0x8d0/0x8d0 [ 311.760101] ? trace_hardirqs_on+0x10/0x10 [ 311.764356] block_ioctl+0xd9/0x120 [ 311.767995] ? blkdev_fallocate+0x3a0/0x3a0 [ 311.772332] do_vfs_ioctl+0x75a/0xfe0 [ 311.776130] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 311.781756] ? ioctl_preallocate+0x1a0/0x1a0 [ 311.786171] ? security_file_ioctl+0x76/0xb0 [ 311.790575] ? security_file_ioctl+0x83/0xb0 [ 311.794979] SyS_ioctl+0x7f/0xb0 [ 311.798339] ? do_vfs_ioctl+0xfe0/0xfe0 [ 311.802309] do_syscall_64+0x1d5/0x640 [ 311.806206] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 311.811388] RIP: 0033:0x45c9f7 [ 311.814586] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 311.822303] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045c9f7 [ 311.829568] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 311.836830] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 311.844090] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 311.851350] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:26 executing program 1 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:26 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x44, 0x10, 0x401, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x1031a}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 312.306562] FAULT_INJECTION: forcing a failure. [ 312.306562] name failslab, interval 1, probability 0, space 0, times 0 [ 312.336077] CPU: 0 PID: 24121 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 312.343969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.353318] Call Trace: [ 312.355903] dump_stack+0x1b2/0x283 [ 312.359531] should_fail.cold+0x10a/0x154 [ 312.363692] should_failslab+0xd6/0x130 [ 312.367658] kmem_cache_alloc_node_trace+0x25a/0x400 [ 312.372772] __kmalloc_node_track_caller+0x38/0x70 [ 312.377705] __kmalloc_reserve.isra.0+0x35/0xd0 [ 312.382385] __alloc_skb+0xca/0x4c0 [ 312.386039] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 312.390883] ? netlink_has_listeners+0x1ff/0x310 [ 312.395653] kobject_uevent_env+0x6d1/0xc50 [ 312.399984] lo_ioctl+0x1177/0x1c00 [ 312.403615] ? loop_clr_fd+0xac0/0xac0 [ 312.407500] blkdev_ioctl+0x91d/0x17c0 [ 312.411382] ? blkpg_ioctl+0x8d0/0x8d0 [ 312.415264] ? trace_hardirqs_on+0x10/0x10 [ 312.419507] block_ioctl+0xd9/0x120 [ 312.423129] ? blkdev_fallocate+0x3a0/0x3a0 [ 312.427464] do_vfs_ioctl+0x75a/0xfe0 [ 312.431262] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 312.436883] ? ioctl_preallocate+0x1a0/0x1a0 [ 312.441293] ? security_file_ioctl+0x76/0xb0 [ 312.445698] ? security_file_ioctl+0x83/0xb0 [ 312.450100] SyS_ioctl+0x7f/0xb0 [ 312.453460] ? do_vfs_ioctl+0xfe0/0xfe0 [ 312.457439] do_syscall_64+0x1d5/0x640 [ 312.461332] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 312.465902] ip_tables: iptables: counters copy to user failed while replacing table [ 312.466516] RIP: 0033:0x45c9f7 [ 312.477491] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 312.483883] ip_tables: iptables: counters copy to user failed while replacing table [ 312.485225] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045c9f7 [ 312.485232] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 312.485237] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 312.485243] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 312.485249] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 312.544831] print_req_error: 45 callbacks suppressed [ 312.544837] print_req_error: I/O error, dev loop1, sector 0 04:37:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000d00200009800000000000000680100009800000000000000380200003802000038020000380200003802000004000000000000000000000010000000e00000020000000000000000626f6e645f736c6176655f310000000000000000000000000000e2ffffff001f00000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a45435400000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc18795000000000000000000000000000000000040000000000000000000000000000000000000010000000000000000000000a800d0000000000000000000000000000000000000000000380074696d650000000000554e8269000000000000000000000000000000000000000000ffffffff4f970000001b000000000000f9000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000ffff000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000380071756f7461000000000000000000000000000000000000000000000000000100000000deffff460d0000000000000000000000000000280052454a45435400000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028000000000000000000000000000000001ec500000000000000000000000000feffffff"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r2) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0x20000) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r4) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r4, 0x80045301, &(0x7f0000000040)) 04:37:27 executing program 1 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 312.627608] device geneve3 entered promiscuous mode 04:37:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x40000, 0x2) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r4, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r5, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sysvipc/sem\x00', 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r7) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r8) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x8c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x54, 0x7, 0x0, 0x1, [{0x8}, {0x8, 0x1, r0}, {0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x106}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x20000000000}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3f}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000002c0)="8da4363abd0000000af9fdffff01006501000000000000007a0000000000ff6619bc549748aeb81e1b00b10efd08cacfe0e02f7a852301fffffff60000005f42485266535f4d0000", 0x48, 0x10000}], 0x8000c, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) [ 312.694383] FAULT_INJECTION: forcing a failure. [ 312.694383] name failslab, interval 1, probability 0, space 0, times 0 04:37:27 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r8, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r8, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYRESOCT=r8, @ANYRESOCT=r0, @ANYBLOB="00000400f1ffffff0000000032000100687462001d0002001800020003"], 0x48}}, 0x440c4) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="680000002800310f00"/20, @ANYRES32=r7, @ANYBLOB="040000000000ffff000000000b0001006367726f757000003800020100300000000a0001007065646958397420000004000280040006000c00070000000000000000000c000800000000000000"], 0x68}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=@delchain={0x68, 0x28, 0xf35, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0x2}, {0x4, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x34, 0x1, [@m_mpls={0x30, 0x0, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000000)={@private=0xa010100, @multicast1, r7}, 0xc) [ 312.748024] CPU: 0 PID: 24148 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 312.755919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 312.765261] Call Trace: [ 312.767851] dump_stack+0x1b2/0x283 [ 312.771481] should_fail.cold+0x10a/0x154 [ 312.775634] should_failslab+0xd6/0x130 [ 312.779605] kmem_cache_alloc_node+0x25f/0x400 [ 312.784187] __alloc_skb+0x9a/0x4c0 [ 312.787807] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 312.792650] ? netlink_has_listeners+0x1ff/0x310 [ 312.797404] kobject_uevent_env+0x6d1/0xc50 [ 312.801729] lo_ioctl+0x1177/0x1c00 [ 312.805361] ? loop_clr_fd+0xac0/0xac0 [ 312.809264] blkdev_ioctl+0x91d/0x17c0 [ 312.813159] ? blkpg_ioctl+0x8d0/0x8d0 [ 312.817045] ? trace_hardirqs_on+0x10/0x10 [ 312.821291] block_ioctl+0xd9/0x120 [ 312.824946] ? blkdev_fallocate+0x3a0/0x3a0 [ 312.829262] do_vfs_ioctl+0x75a/0xfe0 [ 312.833062] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 312.838687] ? ioctl_preallocate+0x1a0/0x1a0 [ 312.843101] ? security_file_ioctl+0x76/0xb0 [ 312.847503] ? security_file_ioctl+0x83/0xb0 [ 312.851906] SyS_ioctl+0x7f/0xb0 [ 312.855264] ? do_vfs_ioctl+0xfe0/0xfe0 [ 312.859233] do_syscall_64+0x1d5/0x640 [ 312.863121] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 312.868305] RIP: 0033:0x45c9f7 [ 312.871494] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 312.879224] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045c9f7 [ 312.886504] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 312.893764] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 312.901027] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 312.908289] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 312.946413] device geneve3 entered promiscuous mode 04:37:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="808372b45ab525acc42508403496b7c6f4b5d14d9ff6298e33af80ffe039c3144a42e1b55b7362b707b642df15af0096857437ac6006bf62871d", 0x3a, 0x4}], 0xb68c7c, &(0x7f0000000200)=ANY=[@ANYBLOB="696f636861727365743d69736f383835392d35b7c56d61736b3d3078303030303030303130303030303030302c61707072616973652c6673757569643d36353434393534302d653864662d643732642d623732612d64333433653538622c00"]) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) sched_yield() sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000340)=ANY=[@ANYBLOB="440000000f14040026bd7000ffdbdf250807000000000000080003000200000008000300040000000a00450069706f6962000000080045006d6164000800030000000000"], 0x44}, 0x1, 0x0, 0x0, 0x4000800}, 0x4080) 04:37:27 executing program 1 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:27 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x402, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) 04:37:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) [ 313.058408] BTRFS error (device loop5): superblock checksum mismatch [ 313.078837] FAULT_INJECTION: forcing a failure. [ 313.078837] name failslab, interval 1, probability 0, space 0, times 0 [ 313.122573] CPU: 0 PID: 24187 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 313.130655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.140015] Call Trace: [ 313.142606] dump_stack+0x1b2/0x283 [ 313.146239] should_fail.cold+0x10a/0x154 [ 313.150395] should_failslab+0xd6/0x130 [ 313.154366] kmem_cache_alloc_node+0x25f/0x400 [ 313.158991] __alloc_skb+0x9a/0x4c0 [ 313.162614] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 313.167454] ? netlink_has_listeners+0x1ff/0x310 [ 313.172210] kobject_uevent_env+0x6d1/0xc50 [ 313.176539] lo_ioctl+0x1177/0x1c00 [ 313.180166] ? loop_clr_fd+0xac0/0xac0 [ 313.184051] blkdev_ioctl+0x91d/0x17c0 [ 313.187948] ? blkpg_ioctl+0x8d0/0x8d0 [ 313.191862] ? trace_hardirqs_on+0x10/0x10 [ 313.196104] block_ioctl+0xd9/0x120 [ 313.199757] ? blkdev_fallocate+0x3a0/0x3a0 [ 313.204103] do_vfs_ioctl+0x75a/0xfe0 [ 313.207933] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 313.213566] ? ioctl_preallocate+0x1a0/0x1a0 [ 313.217982] ? security_file_ioctl+0x76/0xb0 [ 313.222419] ? security_file_ioctl+0x83/0xb0 [ 313.226825] SyS_ioctl+0x7f/0xb0 [ 313.230185] ? do_vfs_ioctl+0xfe0/0xfe0 [ 313.234188] do_syscall_64+0x1d5/0x640 [ 313.238080] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 313.243269] RIP: 0033:0x45c9f7 [ 313.246467] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 313.254168] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045c9f7 [ 313.261431] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 04:37:27 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r1 = openat$cgroup_ro(r0, &(0x7f0000000240)='cpuacct.stat\x00', 0x26e1, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x492100, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f00000005c0)=@nat={'nat\x00', 0x1b, 0x5, 0x400, 0x288, 0xd8, 0xffffffff, 0x288, 0xd8, 0x368, 0x368, 0xffffffff, 0x368, 0x368, 0x5, &(0x7f0000000540), {[{{@uncond, 0x0, 0xa0, 0xd8, 0x0, {}, [@common=@ah={{0x30, 'ah\x00'}, {[0x5]}}]}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x4, @loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, @gre_key=0x7, @icmp_id=0x66}}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @empty, 0xffffff00, 0xffffffff, 'vcan0\x00', 'vlan0\x00', {0xff}, {0xff}, 0xff, 0x0, 0xa}, 0x0, 0xc0, 0xf8, 0x0, {}, [@common=@unspec=@addrtype1={{0x28, 'addrtype\x00'}, {0x4, 0x900, 0x4}}, @common=@icmp={{0x28, 'icmp\x00'}, {0xf, "ae5a"}}]}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x1b, @private=0xa010100, @multicast2, @gre_key=0x20, @gre_key}}}}, {{@ip={@remote, @private=0xa010101, 0xff, 0xff, 'gretap0\x00', 'veth1_macvtap\x00', {0xff}, {}, 0x11, 0x1, 0x1}, 0x0, 0x70, 0xb8}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x18, @ipv6=@mcast1, @ipv4=@multicast1, @icmp_id=0x68, @port=0x4e21}}}, {{@ip={@empty, @local, 0x1010000ff, 0xff, 'ip6gre0\x00', 'macvlan1\x00', {}, {0xff}, 0x67, 0x2, 0x2}, 0x0, 0xa0, 0xe0, 0x0, {}, [@common=@addrtype={{0x30, 'addrtype\x00'}, {0x2, 0x8, 0x1}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0xf7, 0x5, {0x1}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) dup2(0xffffffffffffffff, r1) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) r4 = accept4$inet(r3, &(0x7f0000000a40)={0x2, 0x0, @multicast2}, &(0x7f0000000a80)=0x10, 0x800) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r4, 0x8982, &(0x7f0000000ac0)={0x3, 'macvtap0\x00', {}, 0x1}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000040)={0x6, 0x0, 0x0, 'queue1\x00', 0x6}) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000540)=ANY=[], 0x1) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) 04:37:28 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32=r1, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x44040020}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}}, 0x0) [ 313.268692] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 313.275954] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 313.283217] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 313.312678] BTRFS error (device loop5): open_ctree failed 04:37:28 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xd5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$isdn_base(0x22, 0x3, 0x0) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x0, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) read$eventfd(r2, &(0x7f0000000180), 0x8) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) write$P9_RLCREATE(r3, &(0x7f0000000200)={0x18, 0xf, 0x1, {{0x4, 0x1, 0x2}}}, 0x18) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r4, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$TUNSETVNETHDRSZ(r4, 0x400454d8, &(0x7f0000000240)=0x8) 04:37:28 executing program 1 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 313.476458] BTRFS error (device loop5): superblock checksum mismatch [ 313.485817] FAULT_INJECTION: forcing a failure. [ 313.485817] name failslab, interval 1, probability 0, space 0, times 0 [ 313.509014] CPU: 1 PID: 24229 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 313.516898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 313.526242] Call Trace: [ 313.528836] dump_stack+0x1b2/0x283 [ 313.532470] should_fail.cold+0x10a/0x154 [ 313.536620] should_failslab+0xd6/0x130 [ 313.540608] kmem_cache_alloc_node_trace+0x25a/0x400 [ 313.545738] __kmalloc_node_track_caller+0x38/0x70 [ 313.550668] __kmalloc_reserve.isra.0+0x35/0xd0 [ 313.555334] __alloc_skb+0xca/0x4c0 [ 313.558957] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 313.563832] ? netlink_has_listeners+0x1ff/0x310 [ 313.568587] kobject_uevent_env+0x6d1/0xc50 [ 313.572930] lo_ioctl+0x1177/0x1c00 [ 313.576555] ? loop_clr_fd+0xac0/0xac0 [ 313.580438] blkdev_ioctl+0x91d/0x17c0 [ 313.584321] ? blkpg_ioctl+0x8d0/0x8d0 [ 313.588205] ? trace_hardirqs_on+0x10/0x10 [ 313.592447] block_ioctl+0xd9/0x120 [ 313.596071] ? blkdev_fallocate+0x3a0/0x3a0 [ 313.600390] do_vfs_ioctl+0x75a/0xfe0 [ 313.604187] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 313.609840] ? ioctl_preallocate+0x1a0/0x1a0 [ 313.614267] ? security_file_ioctl+0x76/0xb0 [ 313.618669] ? security_file_ioctl+0x83/0xb0 [ 313.623073] SyS_ioctl+0x7f/0xb0 [ 313.626461] ? do_vfs_ioctl+0xfe0/0xfe0 [ 313.630433] do_syscall_64+0x1d5/0x640 [ 313.634321] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 313.639507] RIP: 0033:0x45c9f7 [ 313.642690] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 313.650413] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045c9f7 [ 313.657718] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 313.664996] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a 04:37:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$sock_void(r1, 0x1, 0x24, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r3) ioctl$SIOCGETLINKNAME(r3, 0x89e0, &(0x7f0000000140)={0x2, 0x3}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r4, 0x200, 0x70bd2c, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x2008081}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x1) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) [ 313.672257] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 313.679518] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 313.718829] BTRFS error (device loop5): open_ctree failed 04:37:28 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e23, 0x5, @rand_addr=' \x01\x00', 0x9}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x88, r1, 0x2, 0x70bd28, 0x25dfdbfb}, 0x88}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 04:37:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) 04:37:28 executing program 1 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r2) ioctl$VT_ACTIVATE(r2, 0x5606, 0x81) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) sendto$phonet(r3, &(0x7f0000000000)="5f151f5bf0a326655266351b7831cc22d3cc9d82042eebabcbe42bf7ca60f110bb23c7a16e63cf185fdb67e2f0c2682ff06224ce5e9f335287e56b89238bad12626b571ff729a08abd67432b45424728581fe9655604c26f60997d743e9f78451fe11d0e2e55b392d5673d1c7655f5b0afa429a0dd11163f8d15a05041b3c8b618b0df2c9f74604578b6e8c7f560ae9c3801e2ef1299279b40ed2d70b96718c2085b", 0xa2, 0x4, &(0x7f00000000c0)={0x23, 0xf2, 0x7, 0xff}, 0x10) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x10000, 0x0) [ 313.887030] BTRFS error (device loop5): superblock checksum mismatch [ 313.952907] FAULT_INJECTION: forcing a failure. [ 313.952907] name failslab, interval 1, probability 0, space 0, times 0 [ 313.964406] BTRFS error (device loop5): open_ctree failed [ 313.992140] CPU: 1 PID: 24267 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 314.000024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.009371] Call Trace: [ 314.011961] dump_stack+0x1b2/0x283 [ 314.015607] should_fail.cold+0x10a/0x154 [ 314.019768] should_failslab+0xd6/0x130 [ 314.023740] kmem_cache_alloc_node_trace+0x25a/0x400 [ 314.028843] __kmalloc_node_track_caller+0x38/0x70 [ 314.033776] __kmalloc_reserve.isra.0+0x35/0xd0 [ 314.038451] __alloc_skb+0xca/0x4c0 [ 314.042076] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 314.046949] ? netlink_has_listeners+0x1ff/0x310 [ 314.051720] kobject_uevent_env+0x6d1/0xc50 [ 314.056051] lo_ioctl+0x1177/0x1c00 [ 314.059681] ? loop_clr_fd+0xac0/0xac0 [ 314.063570] blkdev_ioctl+0x91d/0x17c0 [ 314.067454] ? blkpg_ioctl+0x8d0/0x8d0 [ 314.071341] ? trace_hardirqs_on+0x10/0x10 [ 314.075589] block_ioctl+0xd9/0x120 [ 314.079213] ? blkdev_fallocate+0x3a0/0x3a0 [ 314.083529] do_vfs_ioctl+0x75a/0xfe0 [ 314.087429] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 314.093048] ? ioctl_preallocate+0x1a0/0x1a0 [ 314.097487] ? security_file_ioctl+0x76/0xb0 [ 314.101903] ? security_file_ioctl+0x83/0xb0 [ 314.106331] SyS_ioctl+0x7f/0xb0 [ 314.109690] ? do_vfs_ioctl+0xfe0/0xfe0 [ 314.113687] do_syscall_64+0x1d5/0x640 [ 314.117580] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 314.122782] RIP: 0033:0x45c9f7 [ 314.125964] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 314.133668] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045c9f7 [ 314.140932] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 04:37:28 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r3 = dup2(r2, 0xffffffffffffffff) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) [ 314.148195] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 314.155460] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 314.162726] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:28 executing program 4: openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x98300, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000540)=0x3) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$RTC_PIE_OFF(r2, 0x7006) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r1, &(0x7f0000000640)="dd8a59ee44155d31bbc943357379636530cf95a741ea27efae1e515c4e8022042954c0a67801affcd45dfa7638329947a3b6a25a64555f2f74daf16da4cd166301e594df730d7294bdb459ffa543818c0fad7d45275a3947884589b252930026121ef435d303e65fdb340536917de6e0da09b4927606a0442e2c4cdb6c6723cad24312b0b638479ca028e116a1c59876a131fa57dddb5d9a7ed87c0b23a413caa50226d6cbdfbfb1352830b8a482d549164391a3909680a790979e29fa0a613892ddc061393d0199a0aff322c375abec7422d9039461916cf25a2d", 0xdb, 0x0, 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$FICLONE(r1, 0x40049409, r3) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="dd8a59ee44155d31bbc943357379636530cf95a741ea27efae1e515c4e8022042954c0a67801affcd45dfa7638329947a3b6a25a64555f2f74daf16da4cd166301e594df730d7294bdb459ffa543818c0fad7d45275a3947884589b252930026121ef435d303e65fdb340536917de6e0da09b4927606a0442e2c4cdb6c6723cad24312b0b638479ca028e116a1c59876a131fa57dddb5d9a7ed87c0b23a413caa50226d6cbdfbfb1352830b8a482d549164391a3909680a790979e29fa0a613892ddc061393d0199a0aff322c375abec7422d9039461916cf25a2d", 0xfffffffffffffc6d, 0x0, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x20000000000000) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) [ 314.221388] nla_parse: 9 callbacks suppressed [ 314.221395] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 04:37:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000d00200009800000000000000680100009800000000000000380200003802000038020000380200003802000004000000000000000000000010000000e00000020000000000000000626f6e645f736c6176655f310000000000000000000000000000e2ffffff001f00000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a45435400000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc18795000000000000000000000000000000000040000000000000000000000000000000000000010000000000000000000000a800d000fa00000000000000000000000000000000000000380074696d650000000000554e8269000000000000000000000000000000000000000000ffffffff4f970000001b000000000000f9000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000ffff000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000380071756f7461000000000000000000000000000000000000000000000000000100000000deffff460d0000000000000000000000000000280052454a45435400000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028000000000000000000000000000000001ec500000000000000000000000000feffffff"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r2) ioctl$VIDIOC_QUERY_DV_TIMINGS(r2, 0x80845663, &(0x7f0000000000)) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0x23, 0xfc}, 'port0\x00', 0x0, 0x10000, 0x1, 0x0, 0x7, 0x1, 0x7, 0x0, 0x1, 0x7}) recvfrom$rose(r3, &(0x7f00000000c0)=""/136, 0x88, 0xe1c1e6d3ae671760, &(0x7f0000000180)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x40) 04:37:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$DRM_IOCTL_MODE_ADDFB2(r1, 0xc06864b8, &(0x7f0000000140)={0x6, 0xff, 0x5b3, 0x0, 0x3, [0x3, 0xffffffff, 0x3, 0x8], [0x0, 0x1357f0cf, 0x4, 0x9da], [0x401, 0x10001, 0x0, 0xffff7fff], [0x2, 0x7fff, 0x3, 0x2]}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) select(0x40, &(0x7f0000000000)={0x6, 0x4b2b, 0x2222, 0x6, 0x7, 0x0, 0x2, 0x53}, &(0x7f0000000040)={0x6, 0x7, 0x1f, 0x3, 0x3, 0x81, 0x200}, &(0x7f0000000080)={0x7, 0x3ff, 0xfffffffffffffffc, 0x4, 0x100000001, 0x5, 0x1f, 0x8}, &(0x7f0000000100)={r2, r3/1000+10000}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000d00200009800000000000000680100009800000000000000380200003802000038020000380200003802000004000000000000000000000010000000e00000020000000000000000626f6e645f736c6176655f310000000000000000000000000000e2ffffff001f00000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a45435400000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc18795000000000000000000000000000000000040000000000000000000000000000000000000010000000000000000000000a800d0000000000000000000000000000000000000000000380074696d650000000000554e8269000000000000000000000000000000000000000000ffffffff4f970000001b000000000000f9000000280052454a45435400000000000000000000000000000000000000000000b0f4bf65375792da908107000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000ffff000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000380071756f7461000000000000000000000000000000000000000000000000000100000000deffff460d0000000000000000000000000000280052454a45435400000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028000000000000000000000000000000001ec5000000000000"], 0x1) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000540)=0x2, 0x4) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r5, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) write$midi(r5, &(0x7f0000000580)="8705b1be784a0d902b4dfaa7622f8044b202ee185e9e86aa6256fd95a3e404d3cd49292643fe14773511a474144aafe1fb2778e86e21ed133f526589845cb795f5aa098124a585aa000bca96b92a4ff1b82ceaf1c5a0742d26476674d0d01f66db6949b46bd12a3713cb01122632425f2ad5a6021d6143a7c5688a06390d4586e41892aca2ee2238b5428e409e77ffbc4fd1d01e3c81c3ac", 0x98) 04:37:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x5, 0x6, 0x3, 0x0, 0x0, {0xc, 0x0, 0xa}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4c040}, 0x40) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) [ 314.500824] print_req_error: I/O error, dev loop5, sector 0 04:37:29 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r3, 0x84, 0x1c, &(0x7f0000000380), &(0x7f0000000480)=0x4) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 04:37:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r1 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) write$binfmt_aout(r1, &(0x7f0000000540)={{0x108, 0x9, 0x20, 0x92, 0x348, 0x294fb8bf, 0x3bd, 0x7f}, "e2bbb5f0a8641d226b916e27ed8b7ae479a15135075b84daa6894530f986e36781688e3a876cd4b9d393c30bc594a1d998dd26b56a535af283def04aad4128bb4c8d5631cbec5633e6658c7829adc2f409ff9846d364a19ccf40a066494e650463506f5b349634c5fc3e66a99c0000f2ae83d6337c24eefb2da769217089a4e81577377461d4368d7977b86ec440389bb2535aae4dbafa6e8066fb7ba86e10b523734df2735b8f811b1ff8a24aa3684ca654a8d067376ca009bdbd638e903d32188eb31c629335abb5a5811c17db9666cade480553de35618246", [[], [], [], []]}, 0x4fa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r2) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f0000000000)=0x3, 0x4) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) 04:37:29 executing program 1 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 314.593761] BTRFS error (device loop5): superblock checksum mismatch [ 314.653840] BTRFS error (device loop5): open_ctree failed [ 314.660597] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 314.686877] FAULT_INJECTION: forcing a failure. [ 314.686877] name failslab, interval 1, probability 0, space 0, times 0 [ 314.709106] CPU: 1 PID: 24320 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 314.716991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 314.726364] Call Trace: [ 314.728955] dump_stack+0x1b2/0x283 [ 314.732619] should_fail.cold+0x10a/0x154 [ 314.736764] should_failslab+0xd6/0x130 [ 314.740734] kmem_cache_alloc_node_trace+0x25a/0x400 [ 314.745834] __kmalloc_node_track_caller+0x38/0x70 [ 314.750762] __kmalloc_reserve.isra.0+0x35/0xd0 [ 314.755444] __alloc_skb+0xca/0x4c0 [ 314.759074] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 314.763912] ? netlink_has_listeners+0x1ff/0x310 [ 314.768673] kobject_uevent_env+0x6d1/0xc50 [ 314.772999] lo_ioctl+0x1177/0x1c00 [ 314.776639] ? loop_clr_fd+0xac0/0xac0 [ 314.780521] blkdev_ioctl+0x91d/0x17c0 [ 314.784398] ? blkpg_ioctl+0x8d0/0x8d0 [ 314.788279] ? trace_hardirqs_on+0x10/0x10 [ 314.792571] block_ioctl+0xd9/0x120 [ 314.796190] ? blkdev_fallocate+0x3a0/0x3a0 [ 314.800507] do_vfs_ioctl+0x75a/0xfe0 [ 314.804320] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 314.809939] ? ioctl_preallocate+0x1a0/0x1a0 [ 314.814351] ? security_file_ioctl+0x76/0xb0 [ 314.818758] ? security_file_ioctl+0x83/0xb0 [ 314.823163] SyS_ioctl+0x7f/0xb0 [ 314.826523] ? do_vfs_ioctl+0xfe0/0xfe0 [ 314.830507] do_syscall_64+0x1d5/0x640 [ 314.834408] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 314.839606] RIP: 0033:0x45c9f7 [ 314.842788] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 314.850494] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045c9f7 04:37:29 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r3) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001780)=ANY=[@ANYRES16=r3, @ANYBLOB="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"], 0x1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r4, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r4, &(0x7f0000000640)="dd8a59ee44155d31bbc943357379636530cf95a741ea27efae1e515c4e8022042954c0a67801affcd45dfa7638329947a3b6a25a64555f2f74daf16da4cd166301e594df730d7294bdb459ffa543818c0fad7d45275a3947884589b252930026121ef435d303e65fdb340536917de6e0da09b4927606a0442e2c4cdb6c6723cad24312b0b638479ca028e116a1c59876a131fa57dddb5d9a7ed87c0b23a413caa50226d6cbdfbfb1352830b8a482d549164391a3909680a790979e29fa0a613892ddc061393d0199a0aff322c375abec7422d9039461916cf25a2d", 0xfffffffffffffc6d, 0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYRES32=r4, @ANYRESHEX=r4], 0x1) [ 314.857757] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 314.865035] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 314.872312] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 314.879577] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x4, 0xfffffffffffffe5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000009, 0x2fe}, 0x0, 0x0, 0x0, 0x3, 0x4, 0x80, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000024000705000000000000000000001f00", @ANYRES32=r6, @ANYBLOB="00000400f1ffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@delchain={0x68, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {0x4}, {0x0, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x34, 0x1, [@m_pedit={0x30, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=@delchain={0x68, 0x28, 0xf35, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {0x2}, {0x4, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x34, 0x1, [@m_mpls={0x30, 0x0, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'batadv0\x00', r6}) sendmsg$NL80211_CMD_NEW_MPATH(r0, &(0x7f0000000580)={&(0x7f0000000440), 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x54, 0x0, 0x4, 0x70bd25, 0x25dfdbfd, {}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @dev={[], 0x38}}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @multicast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x7, 0x1}}]}, 0x54}, 0x1, 0x0, 0x0, 0x40}, 0x890) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETCONNECTOR(r0, 0xc05064a7, &(0x7f0000000200)={&(0x7f0000000080)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x3, 0x4}) r8 = accept4(r0, &(0x7f0000000340)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x80, 0x80000) accept$nfc_llcp(r8, &(0x7f00000003c0), &(0x7f0000000280)=0x60) [ 315.223839] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 04:37:29 executing program 1 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:30 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="180000e7ff00000010040000015735414c046cfcd47db560d57038b527afb14d9ecc3bf46fbd750f265408edeb54df411576e1ac83b69de6685c5c62c70746e5da1d9f305f034b3af4591fdbad8a80f3ad615896a70ffd22d832b4"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000100100000a0000003da0dd9c0000000075126fd160e2acdf904976d89936a89583abf23e494aa71b5274cef3a79d6be10c718b4a193cb1eaa345e0ea841717b86ce0a50c24b129fbe1ea283f8b38b8b275a94bf559837a27db2ebf8df94d35bf7f68a56fc6b03d37b577f8560e49d600c6771a8fd520df0db182204798d7f4f6922ebf830a75e63996f9f0bf6d76aa29c3d842450a1f1560f7dfa732c47c3cef087aa8b7273322ef4fff4ca6aba39273adb809520dd9ae818377064e527e9ecb"], 0x18}}], 0x2, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x44) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d06fa27a40000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a3387bfb255fb006000000000000a1a794dbc6963fba71fd46977cc84b39789ef65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d51f5220100d18c4175f18fa2e72d599955ca29804a34a4c608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000380), 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) [ 315.313881] BTRFS error (device loop5): superblock checksum mismatch [ 315.343335] FAULT_INJECTION: forcing a failure. [ 315.343335] name failslab, interval 1, probability 0, space 0, times 0 [ 315.358995] CPU: 1 PID: 24355 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 315.366883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.376229] Call Trace: [ 315.378819] dump_stack+0x1b2/0x283 [ 315.382449] should_fail.cold+0x10a/0x154 [ 315.386601] should_failslab+0xd6/0x130 [ 315.390575] kmem_cache_alloc_node+0x25f/0x400 [ 315.395239] __alloc_skb+0x9a/0x4c0 [ 315.398878] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 315.403717] ? netlink_has_listeners+0x1ff/0x310 [ 315.408469] kobject_uevent_env+0x6d1/0xc50 [ 315.412796] lo_ioctl+0x1177/0x1c00 [ 315.416422] ? loop_clr_fd+0xac0/0xac0 [ 315.420307] blkdev_ioctl+0x91d/0x17c0 [ 315.424203] ? blkpg_ioctl+0x8d0/0x8d0 [ 315.428083] ? trace_hardirqs_on+0x10/0x10 [ 315.432334] block_ioctl+0xd9/0x120 [ 315.435956] ? blkdev_fallocate+0x3a0/0x3a0 [ 315.440270] do_vfs_ioctl+0x75a/0xfe0 [ 315.444070] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 315.445849] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 315.449689] ? ioctl_preallocate+0x1a0/0x1a0 04:37:30 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = dup2(0xffffffffffffffff, r0) ioctl$VIDIOC_DBG_G_CHIP_INFO(r0, 0xc0c85666, &(0x7f0000000080)={{0x3, @addr=0x1}, "4c3b9f665ed899d5733a1ca09d1929ed3e14d2f75a7f03359eee2a8f5fcf0b54"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"/812], 0x1) setsockopt$sock_int(r4, 0x1, 0xf, &(0x7f00000004c0)=0xfffffeff, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0xffffffffffffff68) write$RDMA_USER_CM_CMD_BIND_IP(r3, &(0x7f0000000280)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r5}}, 0x30) write$RDMA_USER_CM_CMD_JOIN_MCAST(r1, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000580)={0xffffffffffffffff}, 0x3, r5, 0x30, 0x1, @ib={0x1b, 0x2, 0x1ff, {"3139a5f88c1766744850c2e5c42d1b49"}, 0x6}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000480)={0x11, 0x10, 0xfa00, {&(0x7f0000000200), r6}}, 0x18) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x4149c0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x2) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r9 = dup2(0xffffffffffffffff, r8) ioctl$VIDIOC_S_TUNER(r8, 0x4054561e, &(0x7f0000000340)={0x8, "970a18ec00db13e5bb845a0e57966973d92a15ca29b63b68f046f98685ab154b", 0x2, 0x1000, 0x1, 0xffffff7f, 0x10, 0x1, 0x5, 0x5}) ioctl$PERF_EVENT_IOC_RESET(r9, 0x2403, 0x20) [ 315.449711] ? security_file_ioctl+0x76/0xb0 [ 315.449720] ? security_file_ioctl+0x83/0xb0 [ 315.449732] SyS_ioctl+0x7f/0xb0 [ 315.474803] ? do_vfs_ioctl+0xfe0/0xfe0 [ 315.478795] do_syscall_64+0x1d5/0x640 [ 315.482690] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 315.487872] RIP: 0033:0x45c9f7 [ 315.491049] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 315.498763] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045c9f7 [ 315.506043] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 315.513305] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 315.520569] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 315.527854] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 315.548973] BTRFS error (device loop5): open_ctree failed 04:37:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) [ 315.590798] net_ratelimit: 22 callbacks suppressed [ 315.590803] ip_tables: iptables: counters copy to user failed while replacing table [ 315.614691] HTB: quantum of class FFFF0004 is big. Consider r2q change. [ 315.630149] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 04:37:30 executing program 1 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001640)='/dev/autofs\x00', 0x326c2, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee00) getresuid(&(0x7f0000000100), &(0x7f0000001540)=0x0, &(0x7f0000001580)) syz_mount_image$afs(&(0x7f0000000000)='afs\x00', &(0x7f0000000040)='./file0\x00', 0x4, 0x1, &(0x7f0000000080)=[{&(0x7f0000000540)="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", 0x1000, 0xffff}], 0x8c080, &(0x7f00000015c0)={[{@flock_strict='flock=strict'}, {@flock_strict='flock=strict'}, {@autocell='autocell'}], [{@euid_lt={'euid<', r3}}, {@obj_role={'obj_role', 0x3d, 'port0\x00'}}, {@uid_gt={'uid>', r4}}]}) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r5, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) connect$inet(r5, &(0x7f0000001680)={0x2, 0x4e23, @empty}, 0x10) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) 04:37:30 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x1, 0x0, 0x1, 0x7}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r2) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfa}, 'port0\x00', 0x9, 0x8, 0xfffffffc, 0x8, 0x81, 0x0, 0x2b9, 0x0, 0x4, 0x7}) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f0000000080)={0x0, @reserved}) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) dup2(r3, r4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 315.733071] FAULT_INJECTION: forcing a failure. [ 315.733071] name failslab, interval 1, probability 0, space 0, times 0 [ 315.733288] HTB: quantum of class FFFF0002 is big. Consider r2q change. [ 315.759864] ip_tables: iptables: counters copy to user failed while replacing table [ 315.772163] CPU: 0 PID: 24392 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 315.780048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 315.789391] Call Trace: [ 315.791976] dump_stack+0x1b2/0x283 [ 315.795611] should_fail.cold+0x10a/0x154 [ 315.799763] should_failslab+0xd6/0x130 [ 315.803759] kmem_cache_alloc_node_trace+0x25a/0x400 [ 315.808862] __kmalloc_node_track_caller+0x38/0x70 [ 315.813789] __kmalloc_reserve.isra.0+0x35/0xd0 [ 315.818459] __alloc_skb+0xca/0x4c0 [ 315.822084] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 315.826955] ? netlink_has_listeners+0x1ff/0x310 [ 315.831709] kobject_uevent_env+0x6d1/0xc50 [ 315.836039] lo_ioctl+0x1177/0x1c00 [ 315.839673] ? loop_clr_fd+0xac0/0xac0 [ 315.843560] blkdev_ioctl+0x91d/0x17c0 [ 315.847441] ? blkpg_ioctl+0x8d0/0x8d0 [ 315.851324] ? trace_hardirqs_on+0x10/0x10 [ 315.855570] block_ioctl+0xd9/0x120 [ 315.859193] ? blkdev_fallocate+0x3a0/0x3a0 [ 315.863512] do_vfs_ioctl+0x75a/0xfe0 [ 315.867344] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 315.872966] ? ioctl_preallocate+0x1a0/0x1a0 [ 315.877381] ? security_file_ioctl+0x76/0xb0 [ 315.881784] ? security_file_ioctl+0x83/0xb0 [ 315.886185] SyS_ioctl+0x7f/0xb0 [ 315.889545] ? do_vfs_ioctl+0xfe0/0xfe0 [ 315.893515] do_syscall_64+0x1d5/0x640 [ 315.897508] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 315.902707] RIP: 0033:0x45c9f7 [ 315.903413] ip_tables: iptables: counters copy to user failed while replacing table [ 315.905909] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 315.921409] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045c9f7 [ 315.928677] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 315.935941] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 315.943201] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 315.950475] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 315.981482] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 316.001336] ip_tables: iptables: counters copy to user failed while replacing table [ 316.017704] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 04:37:30 executing program 5: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000080)={0x8, 0x7229}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) 04:37:30 executing program 1 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:30 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000801"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000100100000a000000f3000000000000001324d19851bfff3fc84f482520db02221aac0df7cce1375846094390c5c6730c146d17b1e549d9a7058edf0c97c3240823dfdcf828f943c260a83cb2a40dd45948a60ce8fc59e63b76669f84f42747731231c90a8f293389852ffc01693c4d65963fc2d2b875b74ed57ef18ee625757d6b71a9"], 0x18}}], 0x2, 0x0) r0 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r0, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="4ce3ffff0f0001efffffffffffffff00000000001b4062cb987c37bf68fd4c6662524ca5da04d2d8e3f800e7b959cf5ae3", @ANYRES32=0x0, @ANYBLOB="2b030080008addf0f50012eb09534e659aa78a800600050000000000080005cd1000000000000000", @ANYRES32=r6, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r6, @ANYBLOB], 0x4c}}, 0x0) [ 316.046743] ip_tables: iptables: counters copy to user failed while replacing table [ 316.064220] ip_tables: iptables: counters copy to user failed while replacing table [ 316.086596] ip_tables: iptables: counters copy to user failed while replacing table 04:37:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r1) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000540), &(0x7f0000000580)=0x30) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000d00200009800000000000000680100009800000000000000380200003802000038020000380200003802000004000000000000000000000010000000e00000020000000000000000626f6e645f736c6176655f310000000000000000000000000000e2ffffff001f00000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a45435400000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc18795000000000000000000000000000000000040000000000000000000000000000000000000010000000000000000000000a800d0000000000000000000000000000000000000000000380074696d650000000000554e8269000000000000000000000000000000000000000000ffffffff4f970000001b000000000000f9000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000ffff000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000380071756f7461000000000000000000000000000000000000000000000000000100000000deffff460d0000000000000000000000000000280052454a45435400000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028000000000000000000000000000000001ec500000000000000000000000000feffffff"], 0x1) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) sendmsg$NFNL_MSG_CTHELPER_GET(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x80, 0x1, 0x9, 0x401, 0x0, 0x0, {0x2}, [@NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x9}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x4}, @NFCTH_TUPLE={0x3c, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @private2={0xfc, 0x2, [], 0x1}}}}]}, @NFCTH_NAME={0x9, 0x1, 'syz0\x00'}, @NFCTH_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000880}, 0x40001) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) [ 316.128116] ip_tables: iptables: counters copy to user failed while replacing table [ 316.158742] ip_tables: iptables: counters copy to user failed while replacing table 04:37:30 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x24003, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)={0x1a4, 0x40, 0x20, 0x70bd2c, 0x25dfdbfb, {0xe}, [@generic="e63b80a81af968f3204def0a8cfa6af2f85d02ac0558ab03aa8e8f2881c9a5c640b495cb7122c3a05f778b759142bc360497f6ecf63140d72750e4cc49e58e88278cbc6dcc121c04c02a8fc170f5f732336fc49e0fe08c4da1b1d7e3", @generic="74936e7e6a4289d3fc414f800ca53f5d1cf3a5a5246aa3b9e43b68bdc5f00e9302a678bd0322cb12caa7ad9b848202e5b9d2270bb1b0589ea60d58f5acbbc685795854d5fae1c0c8e8eec968b05b749fdc5ffca1ecb762bbe3f2ccc864961272cb9e0e2cf861461cab587b2b92a284f1d6d4fe0ddea7ddfb3c82e232b696b63d0ae12f014c964db6b8898f27cccc5a56886d29885e7d860e7167ce58d027d605d92cabaf703e52a391ecd86528f4441c841297abde", @nested={0x10, 0x28, 0x0, 0x1, [@typed={0x4, 0x22}, @typed={0x8, 0x1f, 0x0, 0x0, @u32=0x7}]}, @typed={0x8, 0x38, 0x0, 0x0, @pid=r2}, @generic="54cd8b30e55c2047fc3bf3922eb49875a2ad3dba2fef9cdf844d6ce89ca13840ed334bb3df388c6783461b0f52146964d259d36ca204fa2e2b7acb6f9e0a124b46ff0118601ef5cfc75bbc9eb36e14c656da10b77d93458490787caf054653114483b61ffeba"]}, 0x1a4}, 0x1, 0x0, 0x0, 0x8c090}, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x200040, 0x0) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000280)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r3, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x64, r4, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x3}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x3}, @SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x6}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x7}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x2, 0x6d832252, 0xfffffbff]}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xfffffffe}]}, 0x64}, 0x1, 0x0, 0x0, 0x10000}, 0x4001) ioctl$SCSI_IOCTL_SYNC(r1, 0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r0, 0xee00) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0xee00) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) lsetxattr$system_posix_acl(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000200)={{}, {0x1, 0x26f3c43b8e7c23de}, [], {0x4, 0x4}, [], {}, {0x20, 0x1}}, 0x24, 0x438dae1ee3f22db6) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) [ 316.179941] FAULT_INJECTION: forcing a failure. [ 316.179941] name failslab, interval 1, probability 0, space 0, times 0 [ 316.228424] CPU: 1 PID: 24427 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 316.236322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.236985] ip_tables: iptables: counters copy to user failed while replacing table [ 316.245685] Call Trace: [ 316.245704] dump_stack+0x1b2/0x283 [ 316.245721] should_fail.cold+0x10a/0x154 [ 316.245735] should_failslab+0xd6/0x130 [ 316.267801] kmem_cache_alloc_node+0x25f/0x400 [ 316.272383] __alloc_skb+0x9a/0x4c0 [ 316.276013] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 316.280943] ? netlink_has_listeners+0x1ff/0x310 [ 316.285731] kobject_uevent_env+0x6d1/0xc50 [ 316.290082] lo_ioctl+0x1177/0x1c00 [ 316.293727] ? loop_clr_fd+0xac0/0xac0 [ 316.297613] blkdev_ioctl+0x91d/0x17c0 [ 316.301498] ? blkpg_ioctl+0x8d0/0x8d0 [ 316.305381] ? trace_hardirqs_on+0x10/0x10 [ 316.309625] block_ioctl+0xd9/0x120 [ 316.313288] ? blkdev_fallocate+0x3a0/0x3a0 [ 316.317610] do_vfs_ioctl+0x75a/0xfe0 [ 316.321421] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 04:37:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5, &(0x7f0000000400)=[{&(0x7f0000000080)="8da4363ac0ed02000ef9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d26bbd6b5dea0481d63685b45a158738d3fadaf62a406e27dfa3322d48025f91b53b32bc503d169d09e5dd8c4e13e9f6bf4944ee02be7d9a4041008714172d2918faa1f3e1cbb79d5a5b3119269d1cda8789ad5518da258021cbdd53f3a2f0022927214d6bda169", 0xaf, 0x10000}, {&(0x7f0000000200)="228c4a6d06168646f560faee38b9f7347543f67ec38293e527f23e466a9bac937cb22859c366fc7caa7e1bf5826b03d0577d3b4e6609ae71fda7c0aee0ad9ada891aed838b2b0337da4d8733245d81030a020af57c8e849a7efffe62d46365a611c19aa52f327eb858948ebb32fe02c03c48eae057e3c09bae66d9096fcf57e29fed1fac1f14f7693638629ed877050026432e26c8ef61751e5523", 0x9b, 0x3ff}, {&(0x7f0000000140)="cda5c3308c8d5c56e14dacafc43e7d0a6c2611edacaaa9815f06dd428a57ca833fbff1b40525043a23e676c4a420b8046bb5fa72c09c855f1cbda2811fae5b47a02610e4979717fc70a4", 0x4a, 0x9}, {&(0x7f00000002c0)="49c2d597af", 0x5, 0xa57}, {&(0x7f0000000480)="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", 0x19c, 0x6}], 0x200000, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0xee00) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgid(r3) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1000000, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x5000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1400}}], [{@hash='hash'}]}}) [ 316.327079] ? ioctl_preallocate+0x1a0/0x1a0 [ 316.331499] ? security_file_ioctl+0x76/0xb0 [ 316.335929] ? security_file_ioctl+0x83/0xb0 [ 316.340345] SyS_ioctl+0x7f/0xb0 [ 316.343721] ? do_vfs_ioctl+0xfe0/0xfe0 [ 316.347714] do_syscall_64+0x1d5/0x640 [ 316.351631] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 316.356826] RIP: 0033:0x45c9f7 [ 316.360014] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 316.367718] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045c9f7 04:37:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) timer_create(0x5, &(0x7f0000000080)={0x0, 0xd, 0x1, @tid=r0}, &(0x7f00000000c0)) 04:37:31 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x64, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_PEERS={0x48, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x4}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_rose_SIOCADDRT(r3, 0x890b, &(0x7f0000000480)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x1, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 316.374987] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 316.382251] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 316.389519] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 316.396790] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000300)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f0000000340)=0x10) dup2(0xffffffffffffffff, r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r3, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r3, &(0x7f0000000640)="dd8a59ee44155d31bbc943357379636530cf95a741ea27efae1e515c4e8022042954c0a67801affcd45dfa7638329947a3b6a25a64555f2f74daf16da4cd166301e594df730d7294bdb459ffa543818c0fad7d45275a3947884589b252930026121ef435d303e65fdb340536917de6e0da09b4927606a0442e2c4cdb6c6723cad24312b0b638479ca028e116a1c59876a131fa57dddb5d9a7ed87c0b23a413caa50226d6cbdfbfb1352830b8a482d549164391a3909680a790979e29fa0a613892ddc061393d0199a0aff322c375abec7422d9039461916cf25a2d", 0xfffffffffffffc6d, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r3, 0x8982, &(0x7f0000000040)={0x0, 'gretap0\x00', {0x2}, 0x400}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYRES16=r2, @ANYRESOCT=r0], 0x1) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r5, 0x1, 0x70bd25, 0x0, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8}, @BATADV_ATTR_VLANID={0x6}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="4c000000d4d72d42244d88c9c624b99f3487", @ANYRES16=r5, @ANYBLOB="000826bd7000fedbdf2506000000050033000100000005002f000100000008002b0002000000060028000000000005002f000100000008002c00fdffffff0500380001000000"], 0x4c}, 0x1, 0x0, 0x0, 0x4008085}, 0x20000004) 04:37:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="8da4363ac0ed02000af9fdffff01404d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d7337bbce673a3618d37458de450ade91254b3e087b355d3fd2b81273af3ff3ff5818df8fde849d431de57f1a368518318cd3611c37ef3185a8ca796ec37621d0fc", 0x89, 0x10000}], 0x0, 0x0) 04:37:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xdb9, 0x0, &(0x7f0000000040), 0x2000800, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2, 0x0, 0x1, 0x7}) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 316.489200] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 316.557823] print_req_error: I/O error, dev loop1, sector 0 [ 316.579294] print_req_error: I/O error, dev loop1, sector 0 [ 316.585071] buffer_io_error: 39 callbacks suppressed [ 316.585077] Buffer I/O error on dev loop1, logical block 0, async page read [ 316.585945] BTRFS error (device loop5): superblock checksum mismatch [ 316.591136] print_req_error: I/O error, dev loop1, sector 0 [ 316.610766] Buffer I/O error on dev loop1, logical block 0, async page read 04:37:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x40200, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040)='batadv\x00') sendmsg$BATADV_CMD_GET_DAT_CACHE(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000000)={0x14, r3, 0x31905e13403123b7, 0x0, 0x0, {0xb, 0x0, 0xf000}}, 0x14}, 0x1, 0x50000}, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f00000000c0)=0x0) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgid(r6) write$P9_RGETATTR(r0, &(0x7f0000000100)={0xa0, 0x19, 0x2, {0x20, {0x10, 0x0, 0x8}, 0x88, r4, r6, 0x1, 0x4, 0x1, 0xff, 0x7, 0x1, 0x6, 0xfffffffffffffffb, 0x7, 0x8, 0x2, 0xe9b4, 0x0, 0xfffffffffffffffb, 0x7fff}}, 0xa0) [ 316.709526] BTRFS error (device loop5): open_ctree failed [ 316.715511] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 04:37:31 executing program 1 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xa80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x400}, 0x0, 0xf, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) [ 316.828951] FAULT_INJECTION: forcing a failure. [ 316.828951] name failslab, interval 1, probability 0, space 0, times 0 [ 316.860341] CPU: 0 PID: 24494 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 316.868227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 316.877592] Call Trace: [ 316.880183] dump_stack+0x1b2/0x283 [ 316.883823] should_fail.cold+0x10a/0x154 [ 316.887987] should_failslab+0xd6/0x130 [ 316.891959] kmem_cache_alloc_node+0x25f/0x400 [ 316.896589] __alloc_skb+0x9a/0x4c0 [ 316.900215] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 316.905063] ? netlink_has_listeners+0x1ff/0x310 [ 316.909819] kobject_uevent_env+0x6d1/0xc50 [ 316.914150] lo_ioctl+0x1177/0x1c00 [ 316.917778] ? loop_clr_fd+0xac0/0xac0 [ 316.921683] blkdev_ioctl+0x91d/0x17c0 [ 316.925568] ? blkpg_ioctl+0x8d0/0x8d0 [ 316.929456] ? trace_hardirqs_on+0x10/0x10 [ 316.933696] block_ioctl+0xd9/0x120 [ 316.935466] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 316.937322] ? blkdev_fallocate+0x3a0/0x3a0 [ 316.937334] do_vfs_ioctl+0x75a/0xfe0 [ 316.937348] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 316.937358] ? ioctl_preallocate+0x1a0/0x1a0 [ 316.937376] ? security_file_ioctl+0x76/0xb0 [ 316.968407] ? security_file_ioctl+0x83/0xb0 [ 316.972813] SyS_ioctl+0x7f/0xb0 [ 316.976177] ? do_vfs_ioctl+0xfe0/0xfe0 [ 316.980155] do_syscall_64+0x1d5/0x640 [ 316.984043] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 316.989221] RIP: 0033:0x45c9f7 [ 316.992487] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 317.000203] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045c9f7 [ 317.007466] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 317.014728] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 317.021988] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 04:37:31 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000480)) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 04:37:31 executing program 3: syz_genetlink_get_family_id$batadv(&(0x7f0000000080)='batadv\x00') [ 317.029262] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:31 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x48, r1, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x4]}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x1000}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x9}]}, 0x48}, 0x1, 0x0, 0x0, 0x40090}, 0x40000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000040)="02", 0x1, 0xffffffffffffffff) keyctl$search(0xa, r0, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f0000000040)="02", 0x1, 0xffffffffffffffff) keyctl$search(0xa, r1, &(0x7f0000000000)='asymmetric\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0) keyctl$dh_compute(0x17, &(0x7f00000000c0)={r0, 0x0, r1}, &(0x7f0000000100)=""/109, 0x6d, &(0x7f0000000200)={&(0x7f0000000180)={'tgr192-generic\x00'}, &(0x7f0000000340)="8e84d6885610f61af8f29e8ad467e7b09533250a71c497dd21996766294cdc7f968df2d83fb918b3d617b8957ebf95a94e5338e824269be805695ef8b06d347572f7287e1a699853efecc7ef8efdc36b4db4153fd1df4388c3544c2c9f157a248df19a7f049747b5f2dedd91165958d47bef383727f845b212905468000b0bba743c916dc469a8f9309591b713279f9e5bc2546bc66f54985198533f6b1314f52d8be2f10e1018e6beb704b9f9f488ec8f48ed2844a13cb1d057868d89c7f2c20ce3b283383091f0704f1071d0feee21ca4ee57dda801cecea0fd6d8b8af093c0577e9bbbaebbc344a1475c1b4005aaf3eafadc245906900c13a25d3c6", 0xfd}) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x22283, 0x89) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r2) accept4$alg(r2, 0x0, 0x0, 0x800) [ 317.285804] BTRFS error (device loop5): superblock checksum mismatch 04:37:32 executing program 3: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$peeksig(0x4209, r0, &(0x7f0000000100)={0x200, 0x0, 0x3}, &(0x7f0000000340)=[{}, {}, {}]) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000080)=0x401) 04:37:32 executing program 1 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 317.382613] BTRFS error (device loop5): open_ctree failed 04:37:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x21, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x13f, 0x0, 0x2b9, 0x0, 0x1, 0x7}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee00) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000024000705000000000000000000001f00", @ANYRES32=r5, @ANYBLOB="00000400f1ffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@delchain={0x68, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x4}, {0x0, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x34, 0x1, [@m_pedit={0x30, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=@delchain={0x68, 0x28, 0xf35, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x2}, {0x4, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x34, 0x1, [@m_mpls={0x30, 0x0, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) sendmsg$inet(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000200)="9d98a5affd10bff13c0f1e471adfe555725e6a7e29e38d0251e995b2d80241fe6fd1f9776934530e47d46eeaecad7b91698dcf344f8db1db71e774f54bcdc1002a714c05e6c0af1c2a0ed9d64c6c8c146280ce145d6c6c574c5df32a9abb456283d3cec47416dca7c94e9cf683da500dd5002b839770aa602bf6e5bada3dec369d563e8f79a49a00d7d49d972e3551f6274cda0e3b577588117ce0a257e88572a309", 0xa2}, {&(0x7f0000000100)="073df7c3abe052467f12c65b8584af97cf7321535aaa97b35d7a", 0x1a}, {&(0x7f0000000900)="ac7cf77d51c875057208889e1ff75562cf820b0053ea03e3d30323e3af93dfc26aaac8a63ccc35848f65ae384bdd89e94349644ef2ad89fb1f9a9b4f86df333b8fc2e0dd4156169bac79fffb5a36fd0b379dd08bedaf2a7ce7a25e74e0b8b3e9870d8f95425f6300ac27faca93d8f490128da8d32b966dd208ba5870cc48e1fc86283173eb4e09656f9024a044d8c221e647d7474c5c42aec2e1e0dad64c5e968e9bfb807c86ca8f48c17aa358f2a151791ab0d918e7ddcc079e8e9e0570ce93715fed3772b90c9f42bc156273db8a3031bfa9718f52641ea1a7e02a822268868738be888079a80a62d778485029376cb038e49481b1731906656a915649f39c40daefc82cee68f9ce912d810cdd180979bce1a2796ae44726625bab6b0178a2ff11ea4aa92ba933312a2ec3a15136e17ebbf10c62e96ab67b355095023c6cf7a6ac680adc6556b23a96d059f8a7edabbd5e41988b1c8043a4c8fee1ca8e2fd374e2df9380b73f9d6ca7ec917bcc9971fffb58c72f52caac68e88497773115d18550a985bb8928970e578fb0e047f21b56235774578eb2609ad23ed943e17168d1e4589639886b60f5dcc0c53049aac915b87f8983cd6f604121c4bba2c7c39bc9e24e04e760bb4cb6f44b0a2f6efd9dc8c0ed9f13e4a081948d8ad7629d4cd6361780588db9603ef5ee136d3fe4a2379ae4a52bdfccd79c35fc92bdabd3fc0531244fc13c4bff100f893fba9f2c491f1fd74a9a2958e44db4a8ce1ab8a9345799f3607ba2513e81df5598aca2934e52b03a6860d2bba88ad68812b435445b8e4f99c32f0326954a08c2b4625b5ec2f0a63e7cdc2b30bf014aeef34aace3fd9928b4db93610022f24b2c661ed920f0fe5680e2327e849a12a1908b9b255b8f041cc7a1949465d759111621cf74011a591ae99f9c3244854732a9a61690138281dd360099ca6d2a5fda99ce991041eda905a16f4545630553035451a07ee43332d6a44ec2e9e7ce1b873ceb58949657d52872b67a9a5432c3060f651852116b84c5fa34d8ed1c4a1012b92eceb025bf331e0d5fcdb4d067221fd5c8e9b99e7a31d2966521b1aa5b1f5eb0a0ebb04d257620e2fe68a8191707ae9d28442b6dc0ba7e0d0fbd5336f7260ac90a41f642d966174264efcd076fe028bf801ace0a1ad58b6fc3e9d97bc50a614ed063dd6cb10bc7342e44e0773f9baf72540bab4ffa02cb9506a9ca93298d92786f0028c4ed7755095755fd45474854a6d7d21f51c2ef1041cb8c5e28b8cc3dd0532ced5c3d0ebf0dd3047efe1b528f61ab230ce0f8c10683f37b0189f7bfde03029fbd7dbf40df1fcf8bb54bb1ce28d97b98273f14628be535f0fd850171fbefe5cd6d1755322e2e6b7d14b39336040bd36389aa68dd26d2f77103c2ec401b96bf455f452cc1a71d6e8b67a07de4e3519372b0218d911776a4985520315dffdf9bf93364678fea5220e9ef210a9d40226c43b273e8ee596fe6e5c86466cefcfaa758b3290b887b6bac22a1f4b78cb495a16ddf43190f7e979bf2a92e4665cf3b2cbffe7141b5b9319ba2b5b018fb07f30c7b37da72e33016f56a90df874e25ef2df437f56e19da162f2f01aee1dd36609228a95c1c866bb585faa63cc6269eec5379666ea4732979a19e4706b28e544f84897149ea8ca8833dd62a1349241543c40781ced19eff82601fabc18a41aed24eaf82bb17e7f5bab3308bd83dfcfa8ff754b8173d6be26e18b3749898a202868b0b28fd1c71fad0c2ffe3eb0da44c25db4864a40383c7c56e29b6890a1feac1ad5059e2c60af8a8b739f991ff587eb1eaa3b39dca933286bbeafc5b7334b1518019dd66963d33381409d0bd3c92da2b7a00da0a4911600fe9813afb286ddd6113fa691eadd182b044993feb04c945e26351939f77371cdd6550c21051653b9825e55e79a3144b1f534c4d11d076aca8debcc85c5092c52e7e9d84a7e736ec4d335961f8b0ed27e9d48265f9d4eca741a2896a82c233c8d0a55202151defe51e07218480432fe2ed627b1a0d1113dd24b362f62355b1c1d6c81d4d69aff8976a4f70577cd19d33062c2ab3d54f1cb91ed276746f336cf14c0fb175d32192a3d26117a57b074eacaefa77dc2d64d57255b37967650bdc7fced440feff3e9c06f848e7295c650907bb4170b2ad48e822ed606acd1922a529c7336d85aa5f2731f94a11e2c8ff56786877b96ffdcd6f24971eee313299c56c9fb629bd64f3419dae8e04aa42e870e45780ed44273c43049da7733f96e055eef13cab3abcd0e81ad854137221308eadc075bb70f46e5145d6915849c5088d666c08426d58af109818eb9130b14aa901ac144701eb76e33194a5e7826d802c59d30b76761d85898148af82cd849240cb64c24e81487bec2b11de0693c635fd617e90172c32091907eaa0ea3d680685c8b64158fdd5b8d4e8c55e8765c696abb363362ed895b3867d4c467bd290f69e227647b6ee3cf9bf7ff64cc78549ee31c74d4c427e8ebbb825f7de24c252f2b45fbca4ff54472454e0caffcab6fbfa658c67daed313ceef7ba709ce326e4011760ddf8bf45c2a75ab7294d03292033e2c4911cec51079fcff5b0a347eb4da494952f9f9914cb08406679f6f2a8aec6af35528136764e462605b1ed015506a0d8fda62b353c3a154e9a047c08b03db4631569aa7116e42920a2c6f06ebfe0023cc67b76d9ffaaea893b1318c59c7ac2abb9eb2e4f422a585345448e0f05303e03dc9e6d4a627be7cb6be499422144bbae1e30b4855fd3aeb68550f73c7f36da811cb4cadd29fca8b5c1e6a768478dfaccb44754c500e40ba5221b1ec07f16b3bd9488e69c27ad815ac720d6b1fd95c4be6fc7c94acb0b2cdfdd8617d047c879d11e29c966508fa299ddd859d4471704b48a27daf2680340bbbe2f3a574688982e6bb8918ec28059a7158ce710535951f264708e6e9266554a2d1840f27e306edf90bf08f819b5dd1224a9290aadf72924626a709d9953670f38af60204f0db7cd6a77c333e3bf376914661cbb1a78abcaa03113b0e09c624748e4165fd0b0932dcb8c221a6ee3544db7c1b422a159a56fdc7ca4333df3ec8838ca17c30885eaa60239d873767e6d5df1ecb7cea5e5852df41849a707326401a4c0f80c6451d2696f93eb257acd24f48d16a9410188c441ed25f63835d90c40cdad78d7199137fc79c98e56b176c83c39c803a12d00420d90a0fe5db9ad3602a377a2a3358fd6902331164b9346f857f0bb8caa967dc5db4fae41f59859a8aa837dc3963d4e9dcc6acc7fd7c821d828811cb6a01ddc334c92a1e66a247507d6f45c07baa149f87369ac267caa8b25d44079e0c53c6c61352ddc018686d56e020903ceeb5ca0ab89e10769c4e4bda748d9387a161b4a7244354564f470d2b6f1dab04942a01b900ca798f0587388f7197095e83f7f039258bee77974220eb249fd5a08a07046ed3b9e7b16b9fe463352012ebcc071ce341ff983704ec1bca5720edeed0dd445be82d3204e86e11c81ff0620c9a94a19b5e8d31a050209a3edc7ba7d85692104c58abc63fef6e320624854e6721552dc3cf0e7a718d1800aca0d81c8d708d16c031eabfdea60d9a079a2e73dbac3e8f13ef4c0d7b7761e41fd7da7e8f70ce171fee28f1a8b6af1400f6a912ae50a24381a5213be9280bcd3c6fa449fdd36b6d199c8d4793d0e18a5d0cef6ca0d054f6508673b33f7f287d66a025b584a288db63d7f5ef6435116296e4bdb62d81603605436b0bbfad2c725786678148fc09eb478defcc7d42775ca7acc7ec1c19d9cf20ef47d360683bec8d22531b088666feee32217c7df9229ff20d7f32665b697996b4fa50e19af0c66556c02614f0bce299c9f97bcb7540df925b9d82a9a078580105eb3e6d12f234463c9e41d809959de468175f63574e55df0a5886f9f27c2c773a10760973be9cfa89a126caa7a9a3c833f2ac01a8e50ee67bbf939977cee5699f837f4a5f1923ea21e63e04a1e15ba5aae88acfc324443368a935129f994a5b2ec078652c143fe81dc170a02ff9c5c34941ba21543f68410ffc347400a36f8de2a69d2d6f7bc4fa87345996d439526f52b99527f8a39802e5bbee703e1a553918d2ea0ecdcabbed4f1c89ff91664a12dbf033093c2f3a04df9832fb5ad9dd2000b7fe332f89c7ca16e28857b62e6956578a1a4b2b00fe49d139f1175c5d3d12411ff194e6667980129dbc112c25643234c560ed2fe6db4af2fa57c786a55406dd1e4fbb12826c4eaff6a226d3b23158db7f6a43f44b71a5dd35fcc5cff9dec360568ee6a578397a7ee00910f0f6daf02111c1e1996811d22aac9cf2c1c49cf5c7dc39a0edc4bf560769ae6466bc2add96d18867b870e133da93f2d899437cba32dc98eae06d5320af00819ba4bfd592f6e4f057c36e1a646d6c3891f54dcd94d1c3b3473954dc19292c89a501177391789285333af9836f290b0ff5c5534d41ab60251c89dcc36fdd544b6f4e453a33620a7ba0bdd1dba29651caeaa1e4e7ff3417d95b05095ba9b929960656c7e379bd584bdf24a9e6d4b9838368bcac8eefda1ac98963a877ae7f86ce93a037b11518308436b6490d5e3dd8cb4d71623aa7ad30851e09a23e61b2844343d171ece1f6a99b82227f2a09068c12bbf0a2d320a0aeefc27fe0d8a3f8e83e733ccee810e4dcd48809456a36f9b156547a7a9d8ffa72035ce26fdd78a240b18dafa46e66ef33a7aef1cd571ae39a034eeccecd20b8c54e9b59ecb71dd21c7bfc6e2727d4c1823fe029464c6d79360a8407c1271fb37cee74166068a4158426e04ba91601977dc56c2c383b47c8bcb5f173f6811324f7ecd45c5ed3b545670fb1e72108f82a363ff830ce102c191276daf898a058f3da7fa7b4edb9f97406f1fae467a83130fe393d8a7d4a6ba5ed9da6b9c655c6104a85ab4ae9a46e19131a67920f0be1a97f32b22d0bab5d5a6df70cbdf570d9e7f23f41f162364c7ac7c86ca3bb750697d039b13d43a71e09e57fae2dae91fda9e4ecbb1bfa4940fb8ee3c8ea69f93aaacafa0ad36e2aa9edfa0f9ad069e12920e661bafe82c58cd4a5c28289eebcc2556b6f2333bdaad062fa08483303bb4b853eeeba315e0c071195b0e6f12e1798a0231932e6db928453ced23bf64cea983b4068e55862c0cb4d82570b8ad2c15831755e87dc28428340b276e8a4e89eddddc12eb330eb9e42b167212cbdaec417e4bd5fa5554d92be59383fa8f553db3bd4c311206593eebf2c9aae1b9ade2ba74df4323305df521755bc98f748b20c7a04f4357282668663882f92aece2d67ce68958db0a4de58cd792918dfbaef50b751de9bcc9ef07b88b195cd4541f838d2d45392ed13dd04ccae45a26a418bbaa91e712b4eca98ed60379febd66601185f45e5c40164f2def2c47ef7a0757959c34574446db35b0caa20bc8dafd2818ef969a52d18040bd0f355afe333e4b4965a02da7978d5721f5d54b64dd9ba1ff5a1e510c111396b6712932441b189c44eb8479fe58923bf8f9b7c92420f0ade6ddf650fd8622ab299ba7c93d6d1761862cbda34d230e7b990e4d40230268d134f8e017570108097f681dcc4b61deb7adf7ced3348a9820c6b74cac524add02d389cce14a34a66a1f167f5371ea5ecc1edef142c6848a37e7377ab7c9ce4905eb393e7da6061bacdbe5f203e1116954f308cb64579ea1f88839e2488daf000c3d77afd91c6dc9aaf1c849b2870c5ddf2412cbd540b57daddc688c3903096d1e9bceba75", 0x1000}], 0x3, &(0x7f0000000300)=[@ip_ttl={{0x14, 0x0, 0x2, 0xfffffffa}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast1, @local}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast2, @empty}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x20000000}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1000}}], 0xd0}, 0x4801) setreuid(r2, r3) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000040)={0x60, 0x12, 0x4, 0x81, 0x3d, 0x5b, &(0x7f0000000000)="19a2a79ba3a9526ee6d32b2ef839f69897eee5044fe46aeb1edae08a3f0d3f573f708c879d30c2528ab0f5a907ad3e6bd6239b580e028e616a4b2e6ae8"}) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x1) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) 04:37:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000024000705000000000000000000001f00", @ANYRES32=r7, @ANYBLOB="00000400f1ffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@delchain={0x68, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0x4}, {0x0, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x34, 0x1, [@m_pedit={0x30, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=@delchain={0x68, 0x28, 0xf35, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0x2}, {0x4, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x34, 0x1, [@m_mpls={0x30, 0x0, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'veth1_macvtap\x00', r7}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r8) fanotify_mark(r0, 0xb8, 0x0, r8, &(0x7f00000000c0)='./file0\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) 04:37:32 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="48000000105f00fbff31fc125d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) recvfrom$x25(0xffffffffffffffff, &(0x7f0000000480)=""/149, 0x95, 0x20010000, &(0x7f0000000380)={0x9, @null=' \x00'}, 0x12) [ 317.486890] FAULT_INJECTION: forcing a failure. [ 317.486890] name failslab, interval 1, probability 0, space 0, times 0 [ 317.526938] CPU: 0 PID: 24537 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 317.534827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.544175] Call Trace: [ 317.546765] dump_stack+0x1b2/0x283 [ 317.550397] should_fail.cold+0x10a/0x154 [ 317.554546] should_failslab+0xd6/0x130 [ 317.558522] kmem_cache_alloc_node_trace+0x25a/0x400 [ 317.563622] __kmalloc_node_track_caller+0x38/0x70 [ 317.568566] __kmalloc_reserve.isra.0+0x35/0xd0 [ 317.573239] __alloc_skb+0xca/0x4c0 [ 317.576858] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 317.581703] ? netlink_has_listeners+0x1ff/0x310 [ 317.586462] kobject_uevent_env+0x6d1/0xc50 [ 317.590790] lo_ioctl+0x1177/0x1c00 [ 317.594425] ? loop_clr_fd+0xac0/0xac0 [ 317.598312] blkdev_ioctl+0x91d/0x17c0 [ 317.602195] ? blkpg_ioctl+0x8d0/0x8d0 [ 317.606081] ? trace_hardirqs_on+0x10/0x10 [ 317.610323] block_ioctl+0xd9/0x120 [ 317.613949] ? blkdev_fallocate+0x3a0/0x3a0 [ 317.618267] do_vfs_ioctl+0x75a/0xfe0 [ 317.622064] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 317.627693] ? ioctl_preallocate+0x1a0/0x1a0 [ 317.632109] ? security_file_ioctl+0x76/0xb0 [ 317.633763] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=24336 sclass=netlink_route_socket pid=24546 comm=syz-executor.2 [ 317.636511] ? security_file_ioctl+0x83/0xb0 [ 317.636523] SyS_ioctl+0x7f/0xb0 [ 317.636532] ? do_vfs_ioctl+0xfe0/0xfe0 [ 317.636545] do_syscall_64+0x1d5/0x640 [ 317.636561] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 317.669674] RIP: 0033:0x45c9f7 [ 317.672856] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 317.680558] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045c9f7 04:37:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000100)) dup2(0xffffffffffffffff, r0) getsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 317.687826] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 317.695096] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 317.702363] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 317.709630] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:32 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000180)={0xc, 0x8}, 0x10) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x64, 0xd, 0x6, 0x801, 0x0, 0x0, {0x7, 0x0, 0x5}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xc}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}]}, 0x64}}, 0x41) [ 317.751831] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=24336 sclass=netlink_route_socket pid=24554 comm=syz-executor.2 04:37:32 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000014000000000000000a000000f3000000000000001ea713e949d7929cc8957315fdb39e8dc6a07bacc38814098dbbce91ec3c6e644d6dd2fefe83b4490917bb0985e4d9336d5c1020cd4be57732bce05c18181bff2da0471d5e5b5fc8169a4ed01f566d259d9684356a1b5351a168b1f6cab2b454b7f4963ba45b9b9634938c82c305cf34736b"], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="e04244199f2b0fa8e4424c0000ffffff7f04000097e16d84295551d0a145b48a949509f723ddb7beb23c4d1f86054889f8f3a433c9e210b8b3", @ANYRES32=0x0, @ANYBLOB="2b030000000000001c0012800b00010067656e65766500000c000280060005000000000008000500", @ANYRES32=r6, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r6, @ANYBLOB], 0x4c}}, 0x0) 04:37:32 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r2, 0x0, 0x0, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}}, 0x4000114) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='\t\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="200025bd7000fedbdf2501000000000000000b0000000014001462726f6164636173742d6c696e6b0000"], 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x8040) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r3, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r4, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) setsockopt$inet_tcp_int(r4, 0x6, 0x7, &(0x7f0000000300)=0x5, 0x4) sendto$inet(r3, &(0x7f0000000640)="dd8a59ee44155d31bbc943357379636530cf95a741ea27efae1e515c4e8022042954c0a67801affcd45dfa7638329947a3b6a25a64555f2f74daf16da4cd166301e594df730d7294bdb459ffa543818c0fad7d45275a3947884589b252930026121ef435d303e65fdb340536917de6e0da09b4927606a0442e2c4cdb6c6723cad24312b0b638479ca028e116a1c59876a131fa57dddb5d9a7ed87c0b23a413caa50226d6cbdfbfb1352830b8a482d549164391a3909680a790979e29fa0a613892ddc061393d0199a0aff322c375abec7422d9039461916cf25a2d", 0xfffffffffffffc6d, 0x0, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r5) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000180)=ANY=[@ANYRESHEX=r3, @ANYBLOB="71565a039cc399f2fbdc9d05249502ad69405949074bcf7ceb2d1aa040115481478320e7c661456b3b4552663e6c4be9225d655ebdebc1fe3c3d139710071b09b178dcfb6c2dda21c491a7f6ec5063875f901d547622607aff2b18e476b9f390396d6f14e53a5f127f3755153125b728a2be711210d1e03479a860270bb65413a02e501a078a0e7e88d92236861a2e7f7ad422", @ANYRESHEX], 0x1) lsetxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='security.evm\x00', &(0x7f0000000380)=@md5={0x1, "75171a70218be66eea8d6dfe18ba240b"}, 0x11, 0x1) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) 04:37:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000180)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0x1f, 0x2, &(0x7f0000000040)=[{&(0x7f0000000340)="8da4363ac0ed02000af9fdb0010000000000000000000000000028d41b7c6949a75f76bf7a003d60364eae8ae7b808bf0a00000000fff6f2a3299748aeb81e1b00b10efd9a000001000000000001fffffff6001b739a20e3418116a5e9c39f8022d073ca84a8fb3991a15dbc620e6148787bddc6a48e0a8ddcc84b411ecea75b56a13b1e2412c41fb2fb2be5d41fdf43b675db826262e37148425a22a73b64180de6618a84863a75506324b776761d9aa66a1f7716e1fb242000331b2bfb0e352a9f80080f2ae5d79b4f98", 0xcb, 0x10000}, {&(0x7f0000000540)="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", 0x167, 0xffff}], 0x148014, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f00000000c0)={0x0, @bt={0x1, 0x6, 0x1, 0x3, 0x6, 0x6, 0x80000001, 0x8, 0x2, 0x0, 0x3, 0x8001, 0x6, 0xfffffffb, 0x5, 0x2, {0x2, 0x5}, 0x7, 0xb}}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r1) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/autofs\x00', 0x703003, 0x0) fremovexattr(r3, &(0x7f0000000300)=@random={'osx.', '\\(@@{##%-]$\x00'}) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x74, &(0x7f0000000280)={&(0x7f0000000080)={0x50, r4, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}]}]}, 0x50}}, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f00000006c0)={0x13c, r4, 0x1, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x44, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x39}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x590}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x90, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'hsr0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bond\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6erspan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0xf6b}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6_vti0\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_AF={0x6, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2e}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_PROTOCOL={0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000001}]}, 0x13c}, 0x1, 0x0, 0x0, 0x8c0}, 0x20000000) [ 318.052737] HTB: quantum of class FFFF0004 is big. Consider r2q change. [ 318.063872] HTB: quantum of class FFFF0002 is big. Consider r2q change. [ 318.073932] IPVS: Error joining to the multicast group [ 318.083746] HTB: quantum of class FFFF0004 is big. Consider r2q change. 04:37:32 executing program 1 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 318.099337] HTB: quantum of class FFFF0002 is big. Consider r2q change. [ 318.114539] IPVS: Error joining to the multicast group 04:37:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="da5b0087e307c6c0908b8ad792dd3fa24d36d4726e2a7b6045d5ed3529adabada47a3cf7acd157cf101e2279a16a70cd6b11b3d1e382281fb758486f308f3fefda285b4c", @ANYRES16=0x0, @ANYBLOB="02012dbd7000ffdbdf2504000000"], 0x14}, 0x1, 0x0, 0x0, 0x55}, 0x40) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000400)={0x5, &(0x7f0000000240)=[{0x1, 0x6e9a}, {0x8, 0x7}, {0x400}, {0x7, 0x1}, {0x3, 0x93}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000140)={{0x1, 0xf8}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x5, 0x2b9, 0x0, 0x1, 0x7}) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000080)={0x81, 0x81, 0x0, 0x3, 0x3, "fe714f4eb709b1be"}) 04:37:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x2cd40960, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r0) r1 = socket$netlink(0x10, 0x3, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) bind$bt_l2cap(r2, &(0x7f0000000280)={0x1f, 0x1, @any, 0x4, 0x1}, 0xe) r3 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r3, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8}, @BATADV_ATTR_VLANID={0x6}]}, 0x24}}, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x20}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0xffff7fff}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4044000}, 0x24000001) [ 318.189266] FAULT_INJECTION: forcing a failure. [ 318.189266] name failslab, interval 1, probability 0, space 0, times 0 [ 318.216731] CPU: 0 PID: 24600 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 318.224621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.233964] Call Trace: [ 318.236579] dump_stack+0x1b2/0x283 [ 318.240232] should_fail.cold+0x10a/0x154 [ 318.244377] should_failslab+0xd6/0x130 [ 318.248350] kmem_cache_alloc_node_trace+0x25a/0x400 [ 318.253475] __kmalloc_node_track_caller+0x38/0x70 [ 318.258400] __kmalloc_reserve.isra.0+0x35/0xd0 [ 318.263092] __alloc_skb+0xca/0x4c0 [ 318.266714] ? __kmalloc_reserve.isra.0+0xd0/0xd0 [ 318.271553] ? netlink_has_listeners+0x1ff/0x310 [ 318.276306] kobject_uevent_env+0x6d1/0xc50 [ 318.280631] lo_ioctl+0x1177/0x1c00 [ 318.284256] ? loop_clr_fd+0xac0/0xac0 [ 318.288146] blkdev_ioctl+0x91d/0x17c0 [ 318.292029] ? blkpg_ioctl+0x8d0/0x8d0 [ 318.295911] ? trace_hardirqs_on+0x10/0x10 [ 318.300151] block_ioctl+0xd9/0x120 [ 318.303777] ? blkdev_fallocate+0x3a0/0x3a0 [ 318.308092] do_vfs_ioctl+0x75a/0xfe0 [ 318.311905] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 318.317596] ? ioctl_preallocate+0x1a0/0x1a0 [ 318.322054] ? security_file_ioctl+0x76/0xb0 [ 318.326499] ? security_file_ioctl+0x83/0xb0 [ 318.330918] SyS_ioctl+0x7f/0xb0 [ 318.334277] ? do_vfs_ioctl+0xfe0/0xfe0 [ 318.338253] do_syscall_64+0x1d5/0x640 [ 318.342140] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 318.347322] RIP: 0033:0x45c9f7 [ 318.350501] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 318.358199] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045c9f7 [ 318.365462] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 318.372723] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 318.379986] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 318.387245] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:33 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r2, 0x8982, &(0x7f0000000380)={0x1, 'veth0\x00', {}, 0xdf9}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 04:37:33 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000024000705000000000000000000001f00", @ANYRES32, @ANYBLOB="00000400f1ffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@delchain={0x68, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x4}, {0x0, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x34, 0x1, [@m_pedit={0x30, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=@delchain={0x68, 0x28, 0xf35, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x2}, {0x4, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x34, 0x1, [@m_mpls={0x30, 0x0, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f00000000c0)=0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x2, 0xffffffff) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000024000705000000000000000000001f00", @ANYRES32=r7, @ANYBLOB="00000400f1ffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@delchain={0x68, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0x4}, {0x0, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x34, 0x1, [@m_pedit={0x30, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=@delchain={0x68, 0x28, 0xf35, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0x2}, {0x4, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x34, 0x1, [@m_mpls={0x30, 0x0, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x6c, 0x0, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKMODES_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4004}, 0x40000) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000200)="e6cec7e181f4ce3a45cb57175e98f84660d2c261144d498541b148f0cf8e8e1ebe873d0e901e1b1d54b095bfb12cde71c769107c03367d3b31ebb9d9144fd460b2af1de188282057005cb5e7ae93bc32879da8dae6fc28caa5516d6430e8f9771cf6005220b298c496aad75543c33f4da10f55584194d99b1be09d9c671ac75f75171cc0305d7d36655d91db4a777cbb123816619a2caa00793c0640223d7291a357f2a85591f118280c727b31c3f14d9aefb0988102f5815b552e0600abf8e4922ceddfcb6539c9a07c0feda2366a6970e166916094f00141f7c16707c1bd434fc22ee12cc4840da11cacb7f306545813603dcbfca98771d3b070cee6d10b7fe52cf9117093ac57b9be01e9aa92ed0907000000000000003b7904774e558212a3722826e45af7769119b4e1df3ca466704879e622b2af611ebdb2225ad58e22605cb4e17a9173680118d63e84e1cc381adbfa62c6de8f96bca85663cafdaec300000000000000000000000000000000452aaf48939348465607617406fbf75c296fcf5848fb2f53a75cb3146c1d465801a84355290d71152ea4bfa0f9339df9562481345e3c839875a619dd1809aed0bc1b5fb6fdc3007ce446cfe58089241cf46fe48d39e7d48e9edfb755ade465ff6a9da9ad09cea4db6f", 0x1d9, 0x800}, {&(0x7f0000000100)="69632611bdc7d5e6eec853428aef2141fadf14c8f3f248ea00bc8816a05e36df81dcc87fdc4a4f5e1e6f392bc87bc6a699c1c5797e1f7972615dd3c0e6c497c73a798fca849ce0", 0x47, 0x7}], 0x0, 0x0) 04:37:33 executing program 1 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 318.623448] FAULT_INJECTION: forcing a failure. [ 318.623448] name failslab, interval 1, probability 0, space 0, times 0 [ 318.661521] CPU: 0 PID: 24634 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 318.669406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.678771] Call Trace: [ 318.681357] dump_stack+0x1b2/0x283 [ 318.684984] should_fail.cold+0x10a/0x154 [ 318.689134] should_failslab+0xd6/0x130 [ 318.693101] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 318.697802] ? kobject_create_and_add.cold+0x3f/0x3f [ 318.702901] call_usermodehelper_setup+0x73/0x2e0 [ 318.707778] kobject_uevent_env+0xa79/0xc50 [ 318.712108] lo_ioctl+0x1177/0x1c00 [ 318.715741] ? loop_clr_fd+0xac0/0xac0 [ 318.719633] blkdev_ioctl+0x91d/0x17c0 [ 318.723512] ? blkpg_ioctl+0x8d0/0x8d0 [ 318.727393] ? trace_hardirqs_on+0x10/0x10 [ 318.731675] block_ioctl+0xd9/0x120 [ 318.735296] ? blkdev_fallocate+0x3a0/0x3a0 [ 318.739614] do_vfs_ioctl+0x75a/0xfe0 [ 318.743413] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 318.749031] ? ioctl_preallocate+0x1a0/0x1a0 [ 318.753441] ? security_file_ioctl+0x76/0xb0 [ 318.757843] ? security_file_ioctl+0x83/0xb0 [ 318.762247] SyS_ioctl+0x7f/0xb0 [ 318.765603] ? do_vfs_ioctl+0xfe0/0xfe0 [ 318.769590] do_syscall_64+0x1d5/0x640 [ 318.773479] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 318.778660] RIP: 0033:0x45c9f7 [ 318.781840] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 318.789546] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045c9f7 [ 318.796809] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 318.804068] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 318.811346] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 318.818621] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r2) r3 = dup2(r2, r0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r3}, 0x10) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) 04:37:33 executing program 3: syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xfffffffffffffffd, 0x0, &(0x7f0000000040), 0x0, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000040)) 04:37:33 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="78000000eda87b49db98284c9373bcb9f1f95c3641047ce6598543d8fd7e8cfb89922c49ad4acba645421bc0b5726999996de8df58c7222f5c6f88844239cc9d0042077ecdf559c4c0fa9257380206ec46ba50a328", @ANYRES16=r1, @ANYBLOB="02002abd7000fbdbdf250100000008000700000400005c000880180000801400040002004e24e00000020000000000000000180000801400040002004e21ffffffff0000000000000000100000800400098008000a0001000000180000801400040002004e20ac1e00010000000000000000"], 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 04:37:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r3, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r3, &(0x7f0000000640)="dd8a59ee44155d31bbc943357379636530cf95a741ea27efae1e515c4e8022042954c0a67801affcd45dfa7638329947a3b6a25a64555f2f74daf16da4cd166301e594df730d7294bdb459ffa543818c0fad7d45275a3947884589b252930026121ef435d303e65fdb340536917de6e0da09b4927606a0442e2c4cdb6c6723cad24312b0b638479ca028e116a1c59876a131fa57dddb5d9a7ed87c0b23a413caa50226d6cbdfbfb1352830b8a482d549164391a3909680a790979e29fa0a613892ddc061393d0199a0aff322c375abec7422d9039461916cf25a2d", 0xfffffffffffffc6d, 0x0, 0x0, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r6 = dup2(0xffffffffffffffff, r5) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000d00200009800000000000000680100009800000000000000380200003802000038020000380200003802000004000000000000000000000010000000e00000020000000000000000626f6e645f736c6176655f310000000000000000000000000000e2ffffff001f00000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a45435400000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc18795000000000000000000000000000000000040000000000000000000000000000000000000010000000000000000000000a800d0000000000000000000000000000000000000000000380074696d650000000000554e8269000000000000000000000000000000000000000000ffffffff4f970000001b000000000000f9000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000ffff000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000380071756f7461000000000000000000000000000000000000000000000000000100000000deffff460d0000000000000000000000000000280052454a45435400000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028000000000000000000000000000000001ec500000000000000000000000000feffffff"], 0x1) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) prlimit64(0x0, 0xd, &(0x7f0000000000)={0x0, 0x9}, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r8) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYRESOCT=r5, @ANYRESDEC=r7, @ANYBLOB="b40663742806341573f814fe0e6082e18bb542682655cfe49e490fad2b86732521ce325b21a714eac77f6e1bbf3df32ba44a4064307aff07d7b623696d12c25e30147bf19c7a376b1b1d370ac99102cfd6f4e75c9f474b83324f073211627355a20d2b2e", @ANYRESOCT, @ANYRESDEC=r6, @ANYRES16=r8, @ANYRES32=0x0, @ANYRESHEX=r1], 0x1) 04:37:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x40, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f00000000c0)={0xf9a0000, 0x9, 0x7, 0xffffffffffffffff, 0x0, &(0x7f0000000080)={0x990a73, 0xe69, [], @ptr=0x800}}) ioctl$VIDIOC_QUERY_EXT_CTRL(r1, 0xc0e85667, &(0x7f0000000340)={0x80000000, 0x102, "20ced14598572c3bda837295d88718b36546b5f37f0514ed09bc12ca70ca2eaa", 0x5, 0x9, 0x3, 0x9, 0x401, 0x9, 0x7ff, 0x39a, [0x2fe, 0x8001, 0x3f, 0x8]}) prctl$PR_GET_TIMERSLACK(0x1e) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) fcntl$getownex(r2, 0x10, &(0x7f0000000200)) 04:37:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1, 0x803, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@setneightbl={0x28, 0x43, 0x200, 0x70bd2a, 0x25dddbff, {0x2}, [@NDTA_NAME={0xa, 0x1, 'btrfs\x00'}, @NDTA_THRESH2={0x8, 0x3, 0x3}]}, 0x28}}, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000200)={0xb1b3, {{0x2, 0x4e21, @remote}}}, 0x88) 04:37:34 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="578883a6", @ANYRES16=r1, @ANYBLOB="02002abd7000fbdbdf250100000008000700000400005c000880180000801400040002004e24e00000020000000000000000180000801400040002004e21ffffffff0000000000000000100000800400098008000a0001000000180000801400040002004e20ac1e00010000000000000000"], 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0xc433bbc1bf094001}, 0x90) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="2b030000000000001c0012800b00010067656e65766500fe0b000280060005000000000008000500", @ANYRES32=r7, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r7, @ANYBLOB], 0x4c}}, 0x0) 04:37:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r0) r1 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r3}, &(0x7f0000000080)=0x18) r4 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_vs\x00') ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000540)={0x64, 0x0, &(0x7f0000000440)=[@increfs={0x40046304, 0x2}, @decrefs, @reply_sg={0x40486312, {0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000380)={@fda={0x66646185, 0x7, 0x2, 0x14}, @flat=@binder={0x73622a85, 0x1, 0x1}, @fd={0x66642a85, 0x0, r2}}, &(0x7f0000000400)={0x0, 0x20, 0x38}}}, @decrefs={0x40046307, 0x3}], 0x74, 0x0, &(0x7f00000004c0)="76c64722ae6eb628436d8c01742f671a94c5e3abf7a6773704e6c8486237ebbb7820d3b4dfdd20d4d77b823137b51164e01149cab25e3b923c1458bc31c2934957d5de36960f0e03f231f35525dcd4fd887437534dd599b389a26898cbf2a7b6de05da9aa7d0af15f0b1325c8acfe03d14c89ef3"}) ioctl$SNDCTL_DSP_CHANNELS(0xffffffffffffffff, 0xc0045006, &(0x7f0000000280)=0x7) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={r3, 0xfffffffe}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={r3, 0x64, &(0x7f0000000080)=[@in6={0xa, 0x4e21, 0x9, @empty, 0x7}, @in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e23, 0x80000001, @private0, 0x1}, @in6={0xa, 0x4e20, 0x5, @local, 0xfa}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000180)={r5, 0x401, 0x30, 0x1f, 0x5}, &(0x7f0000000200)=0x18) 04:37:34 executing program 1 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 319.397277] print_req_error: I/O error, dev loop1, sector 0 04:37:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffd, 0x3, &(0x7f0000000200)=[{&(0x7f0000000080)="0e0be205ce7cd7d62ee2c7f0b2dfe9dbd820fca8803a1ae29ec17220a654c7867b47473d0299e9dcf07994286fffb81c31c3c2a679d6f2b0eaa8915dba57cf917f192479ac0510b1d10809186815a3638e760f5686ef0b0b0401c2e95ded25229b6a1b3b66bf8fd5068b5dee62d001f6d2b0539c8cf4b4", 0x77, 0xfffffffffffffffe}, {&(0x7f0000000100)="ece5e6fc785e681139126778412b85a74386fcce5ad123c30d26eae0a158cc7556d3cd83f52e27b84d7614e9aa836067cfa12b5271dae6e34f1568d7262c8ce63f9d8b1240d1ade0684f0ea69f0a2ba74bad155381b5a8b75a9a9a19d1e2843067c0e2a45e98d8a01e14907b33c8e0", 0x6f}, {&(0x7f0000000180)="de4858dc081bc6f7df27cfc1db3152373705e940a6b4457e1072897b92f55948adf447f55e16fc41ffa5e97bd95e8c081c007688656e8160cb3ceecbe7178496306471", 0x43, 0x62ab}], 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x7fc0000, 0x60200) [ 319.458428] nla_parse: 11 callbacks suppressed [ 319.465814] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 319.484696] FAULT_INJECTION: forcing a failure. [ 319.484696] name failslab, interval 1, probability 0, space 0, times 0 [ 319.513107] CPU: 0 PID: 24715 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 319.520994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.530353] Call Trace: [ 319.532941] dump_stack+0x1b2/0x283 [ 319.536575] should_fail.cold+0x10a/0x154 [ 319.540728] should_failslab+0xd6/0x130 [ 319.544702] kmem_cache_alloc+0x28e/0x3c0 [ 319.548851] getname_flags+0xc8/0x550 [ 319.552653] SyS_mkdirat+0x83/0x220 [ 319.556281] ? SyS_mknod+0x30/0x30 [ 319.559823] ? fput+0xb/0x140 [ 319.562925] ? do_syscall_64+0x4c/0x640 [ 319.566895] ? SyS_mkdirat+0x220/0x220 [ 319.570783] do_syscall_64+0x1d5/0x640 [ 319.574685] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 319.579872] RIP: 0033:0x45bfa7 [ 319.583057] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 319.590763] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045bfa7 [ 319.598030] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 319.605294] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 319.612561] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 319.619828] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:34 executing program 3: socket$netlink(0x10, 0x3, 0x10) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:34 executing program 1 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 319.726338] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 319.756682] FAULT_INJECTION: forcing a failure. [ 319.756682] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 319.768484] CPU: 1 PID: 24736 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 319.776358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.785704] Call Trace: [ 319.788294] dump_stack+0x1b2/0x283 [ 319.791932] should_fail.cold+0x10a/0x154 [ 319.796085] __alloc_pages_nodemask+0x22b/0x2730 [ 319.800876] ? __mutex_unlock_slowpath+0x75/0x780 [ 319.805720] ? __lock_acquire+0x655/0x42a0 [ 319.809952] ? set_blocksize+0x24b/0x2e0 [ 319.814013] ? lo_ioctl+0x8b5/0x1c00 [ 319.817727] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 319.822566] ? trace_hardirqs_on+0x10/0x10 [ 319.826829] ? blkpg_ioctl+0x8d0/0x8d0 [ 319.830725] ? trace_hardirqs_on+0x10/0x10 [ 319.834976] cache_grow_begin+0x91/0x410 [ 319.839037] cache_alloc_refill+0x28c/0x360 [ 319.843354] kmem_cache_alloc+0x333/0x3c0 [ 319.847496] getname_flags+0xc8/0x550 [ 319.851291] SyS_mkdirat+0x83/0x220 [ 319.854964] ? SyS_mknod+0x30/0x30 [ 319.858510] ? fput+0xb/0x140 [ 319.861608] ? do_syscall_64+0x4c/0x640 [ 319.865577] ? SyS_mkdirat+0x220/0x220 [ 319.869463] do_syscall_64+0x1d5/0x640 [ 319.873355] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 319.878539] RIP: 0033:0x45bfa7 [ 319.881722] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 319.889426] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045bfa7 [ 319.896690] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 319.903954] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 319.911216] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 319.918481] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) bind$llc(r0, &(0x7f0000000080)={0x1a, 0x323, 0xe, 0x50, 0x2, 0x0, @multicast}, 0x10) 04:37:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x3c, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {{}, {}, {0x20, 0x17, {0x1a, 0x51, @l2={'ib', 0x3a, 'bridge_slave_0\x00'}}}}, ["", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x5) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r2, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000440)={&(0x7f00000002c0)={0x174, r3, 0x403, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xef91}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}, @TIPC_NLA_SOCK={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1f}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}]}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}]}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10200000}]}, @TIPC_NLA_MEDIA={0x70, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_BEARER={0x5c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'ip6_vti0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x8, @mcast1, 0x5}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}, @TIPC_NLA_NET={0x18, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}]}]}, 0x174}, 0x1, 0x0, 0x0, 0xc0}, 0x8000) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000000)={0x1, 0x8}) 04:37:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x6}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000100), &(0x7f0000000140)=0x4) 04:37:34 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000640)="dd8a59ee44155d31bbc943357379636530cf95a741ea27efae1e515c4e8022042954c0a67801affcd45dfa7638329947a3b6a25a64555f2f74daf16da4cd166301e594df730d7294bdb459ffa543818c0fad7d45275a3947884589b252930026121ef435d303e65fdb340536917de6e0da09b4927606a0442e2c4cdb6c6723cad24312b0b638479ca028e116a1c59876a131fa57dddb5d9a7ed87c0b23a413caa50226d6cbdfbfb1352830b8a482d549164391a3909680a790979e29fa0a613892ddc061393d0199a0aff322c375abec7422d9039461916cf25a2d", 0xfffffffffffffc6d, 0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001ec0)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f00000015c0)=[{&(0x7f0000000000)="a1c2097cb9b3371324ab56bdf7818db628e8ab2a3dfa7db9adb03eab353092f32ca75194aed2a83b03d9347b110fdf0ff12280cc9ea6eb8eaf2a156b9d155d1aa3176279798d7fd23628f0dfccb64ec720ba8f769c0d6997782655efa0bf35c3a984851882cacde3b07d6ac6d7390557b8", 0x71}, {&(0x7f0000000080)="04490ccb32783a9ff7b86f7a71d4e693bcede210d006caa2e8d2607059ce28fd9a96affdf67a73944031bc5f455c3ef1f4a962e97f051d6c5cb2001bbf8dc2c3283f249b78db2e8e0ece5d6235311f302831d6e2fe53d90c61d6cd9e0111e7eb7f9e6cdb9ce532114d8d70d78133148785ddc50e65ac4b4a84a046b63d9a2de3a6400339ac300ade9cb9872f3230c8a962bc75e524f5722e821e7548a11357e67fea3a4257dd9e96dbfd29c3a467d26c4425ab54457d02", 0xb7}, {&(0x7f0000000140)="3f8ad9bbed174453ccda9168bf0cb7099a09b152e0eaa63549b17fc727f99ed1a1cd173d8c042659732827c6421ca4afb64f0808476c904cdf1284fe41b3e057d42d8e9ff94fa27e9fc218964aa9", 0x4e}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)="d2e9eec1409bc003aebdcd7d2b21f5e7c865ca76269768f2aa850a41c4d7e205dbac3d692d4f90408cdd6b53d6eb2be8a34760c4995969f3caa4bb3381bc38527f0f2953daabddae18bd063b1cc36024f0044fa5278d5e616baefb144b48b7f8b5591d76215e6947", 0x68}], 0x5) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) 04:37:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x2, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000200)={r1, r2, 0x1, 0x62, &(0x7f0000000040)="3944f7f2a0214a1f371a23f26cc097c2d2fb175f6d1325f92b0454b929db00e5c594f0cbbe72f2d5acb13dcb78917e1be5804a36db56cd3108159dac8a372fce9752450803cd3e025693781cfc95e970738c20efe4362dae6194b0dba7a7e710e1c3", 0x4, 0x5, 0x7, 0x4b35, 0xf161, 0x3, 0x7f7, 'syz1\x00'}) 04:37:35 executing program 1 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d0520f7b34e4c831f2b3a0190b4eead10af699b48653599", 0x5f, 0x10000}], 0x800000, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') [ 320.486030] FAULT_INJECTION: forcing a failure. [ 320.486030] name failslab, interval 1, probability 0, space 0, times 0 [ 320.509124] CPU: 0 PID: 24770 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 320.517019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.526365] Call Trace: [ 320.528952] dump_stack+0x1b2/0x283 [ 320.532585] should_fail.cold+0x10a/0x154 04:37:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r1) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x280, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r4, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0xee00) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2002804, &(0x7f0000000300)={'trans=unix,', {[{@dfltuid={'dfltuid', 0x3d, r5}}, {@access_client='access=client'}, {@privport='privport'}, {@cachetag={'cachetag', 0x3d, '$!{'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'cgroup.controllers\x00'}}, {@subj_user={'subj_user', 0x3d, 'cgroup.controllers\x00'}}, {@obj_user={'obj_user', 0x3d, 'port0\x00'}}]}}) sendto$inet(r4, &(0x7f0000000640)="dd8a59ee44155d31bbc943357379636530cf95a741ea27efae1e515c4e8022042954c0a67801affcd45dfa7638329947a3b6a25a64555f2f74daf16da4cd166301e594df730d7294bdb459ffa543818c0fad7d45275a3947884589b252930026121ef435d303e65fdb340536917de6e0da09b4927606a0442e2c4cdb6c6723cad24312b0b638479ca028e116a1c59876a131fa57dddb5d9a7ed87c0b23a413caa50226d6cbdfbfb1352830b8a482d549164391a3909680a790979e29fa0a613892ddc061393d0199a0aff322c375abec7422d9039461916cf25a2d", 0xfffffffffffffc6d, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r6) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000280)=ANY=[@ANYBLOB="c9a1e1d4d2d582b98230159b41c0c54c000cb2b247b502b7228a9f5d8a70c1af54fa9794ef099544a1fe8cf6fe1cce", @ANYRES32=r3, @ANYRESDEC=r4, @ANYRESDEC=r6], 0x1) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) [ 320.536751] should_failslab+0xd6/0x130 [ 320.540723] kmem_cache_alloc+0x28e/0x3c0 [ 320.544869] __d_alloc+0x2a/0x9b0 [ 320.548319] d_alloc+0x46/0x240 [ 320.551612] __lookup_hash+0x51/0x180 [ 320.555407] filename_create+0x156/0x3f0 [ 320.559466] ? kern_path_mountpoint+0x40/0x40 [ 320.563965] SyS_mkdirat+0x95/0x220 [ 320.567588] ? SyS_mknod+0x30/0x30 [ 320.571124] ? do_syscall_64+0x4c/0x640 [ 320.575093] ? SyS_mkdirat+0x220/0x220 [ 320.578977] do_syscall_64+0x1d5/0x640 [ 320.582870] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 320.588053] RIP: 0033:0x45bfa7 [ 320.591235] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 320.598939] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045bfa7 [ 320.606200] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 320.613462] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 320.620724] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 320.627988] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='rdma.current\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r1) r2 = dup2(0xffffffffffffffff, r1) openat(r2, &(0x7f0000000080)='./file0\x00', 0x80000, 0x81) ioctl$KVM_RUN(r1, 0xae80, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x2000) 04:37:35 executing program 1 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r1) ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000140)=""/87) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x500, 0x0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x7, 0x1, 0x801, 0x0, 0x0, {0x0, 0x0, 0x2008}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40802}, 0x4004) [ 320.792084] FAULT_INJECTION: forcing a failure. [ 320.792084] name failslab, interval 1, probability 0, space 0, times 0 [ 320.814486] CPU: 1 PID: 24784 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 320.822386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.831734] Call Trace: [ 320.834321] dump_stack+0x1b2/0x283 [ 320.837968] should_fail.cold+0x10a/0x154 [ 320.842113] should_failslab+0xd6/0x130 [ 320.846083] kmem_cache_alloc+0x28e/0x3c0 [ 320.850241] selinux_inode_alloc_security+0xb1/0x2a0 [ 320.855338] security_inode_alloc+0x8f/0xd0 [ 320.859678] inode_init_always+0x576/0xb10 [ 320.863911] alloc_inode+0x7a/0x170 [ 320.867536] new_inode_pseudo+0x14/0xe0 [ 320.871518] new_inode+0x1b/0x40 [ 320.874882] __ext4_new_inode+0x356/0x4e80 [ 320.879126] ? ext4_free_inode+0x14a0/0x14a0 [ 320.883524] ? avc_has_perm+0x1a4/0x320 [ 320.887504] ? __dquot_initialize+0x3f4/0x980 04:37:35 executing program 3: r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x40a181, 0x0) write$P9_RREAD(r0, &(0x7f0000000040)={0x40, 0x75, 0x1, {0x35, "4cb7c8401384a76ed70a706c4e2f13a1c08dc7c10222979ed99d9232aeb863808ecde2d5d8ca40cf9f54c807e917b0bf56bc2c5eeb"}}, 0x40) [ 320.892021] ? avc_has_perm_noaudit+0x2a0/0x2a0 [ 320.896702] ? inode_get_rsv_space.part.0+0x100/0x100 [ 320.901905] ? security_transition_sid+0xcb/0x120 [ 320.906756] ? security_transition_sid+0x9d/0x120 [ 320.911616] ext4_mkdir+0x2e4/0xb60 [ 320.915241] ? selinux_dentry_init_security+0x220/0x220 [ 320.920602] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 320.925268] ? security_inode_mkdir+0xcc/0x100 [ 320.929861] vfs_mkdir+0x3af/0x620 [ 320.933409] SyS_mkdirat+0x1b5/0x220 [ 320.937119] ? SyS_mknod+0x30/0x30 04:37:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 320.941052] ? do_syscall_64+0x4c/0x640 [ 320.941084] ? SyS_mkdirat+0x220/0x220 [ 320.941096] do_syscall_64+0x1d5/0x640 [ 320.941130] entry_SYSCALL_64_after_hwframe+0x46/0xbb 04:37:35 executing program 1 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 320.941138] RIP: 0033:0x45bfa7 [ 320.941143] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 320.941154] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045bfa7 [ 320.941160] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 320.941165] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 320.941170] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 320.941176] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 321.172144] FAULT_INJECTION: forcing a failure. 04:37:35 executing program 1 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet6(0xa, 0x6, 0x80) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r3) ioctl$KVM_SMI(r3, 0xaeb7) poll(&(0x7f0000000080)=[{r0, 0x8}, {r1, 0x2011}, {r2, 0x20c}], 0x3, 0x1000) [ 321.172144] name failslab, interval 1, probability 0, space 0, times 0 [ 321.172158] CPU: 0 PID: 24800 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 321.172170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.172174] Call Trace: [ 321.172193] dump_stack+0x1b2/0x283 [ 321.172211] should_fail.cold+0x10a/0x154 [ 321.172228] should_failslab+0xd6/0x130 04:37:36 executing program 1 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 321.172241] kmem_cache_alloc+0x28e/0x3c0 [ 321.172260] selinux_inode_alloc_security+0xb1/0x2a0 [ 321.172273] security_inode_alloc+0x8f/0xd0 [ 321.172287] inode_init_always+0x576/0xb10 [ 321.172302] alloc_inode+0x7a/0x170 [ 321.172314] new_inode_pseudo+0x14/0xe0 [ 321.172325] new_inode+0x1b/0x40 [ 321.172336] __ext4_new_inode+0x356/0x4e80 [ 321.172365] ? ext4_free_inode+0x14a0/0x14a0 [ 321.172376] ? avc_has_perm+0x1a4/0x320 [ 321.172389] ? __dquot_initialize+0x3f4/0x980 [ 321.172408] ? avc_has_perm_noaudit+0x2a0/0x2a0 [ 321.172424] ? inode_get_rsv_space.part.0+0x100/0x100 [ 321.172438] ? security_transition_sid+0xcb/0x120 [ 321.172449] ? security_transition_sid+0x9d/0x120 04:37:36 executing program 1 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f00000000c0)={'broute\x00', 0x0, 0x0, 0x0, [], 0x3, &(0x7f0000000080)=[{}, {}], 0x0, [{}, {}, {}]}, 0xa8) [ 321.172469] ext4_mkdir+0x2e4/0xb60 [ 321.172486] ? selinux_dentry_init_security+0x220/0x220 [ 321.172516] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 321.172531] ? security_inode_mkdir+0xcc/0x100 [ 321.172545] vfs_mkdir+0x3af/0x620 [ 321.172561] SyS_mkdirat+0x1b5/0x220 [ 321.172576] ? SyS_mknod+0x30/0x30 [ 321.172589] ? do_syscall_64+0x4c/0x640 [ 321.172602] ? SyS_mkdirat+0x220/0x220 [ 321.172615] do_syscall_64+0x1d5/0x640 04:37:36 executing program 1 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 321.172631] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 321.172640] RIP: 0033:0x45bfa7 [ 321.172645] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 04:37:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0xe83c0f03072bd9c5, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000640)='/dev/vcsa#\x00', 0x0, 0x10001) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000e00)={0x0, 0x0}) dup(r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000e80)={0x0, 0x0}, &(0x7f0000000ec0)=0xc) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgid(r5) sendmsg$unix(r0, &(0x7f0000000f40)={&(0x7f0000000680)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000d40)=[{&(0x7f0000000700)="a2d674387603023574addae4f08ef14a4a4fc1ef61904f", 0x17}, {&(0x7f0000000740)="bff116d60eafb65baaa5bb88de522c6648d8f70af240b9457d42e85ff568aefeb01e2a13834d302e615b50b1df3f5fb37907ddb8856cb1ee74e8a82eee44429cb1fd5500bad23b6e74b59ef33e8769688fdab136892e11d7bf5fa4702b991fe42edd4e308588d79edf249c53034fcea4670111189e1c0c270894e5fc8c1a5f182771a4044adc16b560d66959c1831685a44f98a145acfcba81e4f59e76c4c6476dc7719d4d", 0xa5}, {&(0x7f0000000800)="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", 0xfd}, {&(0x7f0000000900)="8cddfc8ada680afa501cd04ddcbf0c5ea4f39a4e808653a34db67cf45f09026bf32f01454fabd91f6922fd4847d740caf60cd26d4e3f3c56b881353491835a0815c13a8c6647153b179570140b6f383da6321339e21610b2dda2867f85c0237c56abbbd6618d0e0cfa6a2847d0bc67479cfab6508229bd7ff74b4a6114a57e573372a3a98de3812539802daa0425331b", 0x90}, {&(0x7f00000009c0)="ac120216500815fb5c8363bae206c954af6dc83900add13736c4afc06a4efb14730385c401c0760204121751b4e88055214a2f7ee48253ead0e191cd486bcd6a7dd2953a15ee43fba4b76fa932e8c0d096ae928dfb05eeb16f57dffa0738f4d4c1dd2ceea80066b844f0338f9faf0bb538f8f68cdaba25ea088c7b629af0304e2824f94d39d89f4c56d5b45eeb8240469e9d4f2abba45ece1b106b310affd82b8e60afc401910d2747", 0xa9}, {&(0x7f0000000a80)="a0a1606693f064c5e1a651237be18e3edcec0b5fb0502d8f82028933be17ca6ddf9fa054c8fff4fe53a4dc7e271141f54c0d3c7893b79ac9b80ccb755440a67d712903a52f0c3d28b7caeb4e8c293aab4be48cf92a468c567794f368c264d3248fdcd6ad343adf27f9f66699d2d2d61fe86e6bb005ffbc038c057be6a82fd7690b964252bb9f5bebfaaf922d", 0x8c}, {&(0x7f0000000b40)="3d0d349c3083713a9c55f35490c3086b3c7c5725622fcffb5953415aafbc89253dfb8494f82422d45b6da44a6716df003e938b5d1204df1ffa4ed3f7c9193bfa76546cf203b95094a0e8ba97c6c39057a447a5789b366589c96520fa098bd0a741cd0a39b079781e4d3bb48e49fc26a3bb7cb0d17114e0", 0x77}, {&(0x7f0000000bc0)="b81b2b1e684f58f9629bd1f2b83a44399525af8d06bc1fcabae99539195b27df9ed2d6107e232811d23aeed54f53974b0a21d0dd3113ace97b0e82c73f91ba33db0913bd2c8171747dfb70f46e4894e0390020e0108442c10c1e1960725bc76d0d050774319c10cac2f0108f4b4b91059b7ce61e92f55275932a4211920ec9fef62ec3b665971e06054d92d5e55ddbe246f9f342e168cf7080d845be67f360d5d620ff95e93c87195001d27532e64b61693cb63320430844c4d94365ec5cd4083fdc812bc5a06a8d8fa0d1168aa420bac5d6fcdb30", 0xd5}, {&(0x7f0000000cc0)="d4c2134de8cf78233ca567a7555da00f140ff56ecca09fb7a91c9fc0fa7ada298ddbd05e0c0519532a65fea0dc20aaf47084924f41cfffb33c71601b51f8ee080518d3c9e84414fe5f7f2d3c0869560ffb0811ba336694007eeb28acc5dc", 0x5e}], 0x9, &(0x7f0000000f00)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r5}}}], 0x20, 0x804}, 0x4014) 04:37:36 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r1) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000100)={0x7, 0x0, 0x10000, 0x3ff}) ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000000280)={0x61, r2, 0x1, 0x1ff}) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x7) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$DRM_IOCTL_GET_STATS(r3, 0x80f86406, &(0x7f0000000380)=""/243) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r5, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x4}) r6 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SIOCX25GDTEFACILITIES(r1, 0x89ea, &(0x7f0000000000)) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 321.172658] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045bfa7 [ 321.172665] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 321.172672] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 321.172678] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 321.172685] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 321.216276] print_req_error: I/O error, dev loop1, sector 0 [ 321.362261] net_ratelimit: 11 callbacks suppressed [ 321.362266] ip_tables: iptables: counters copy to user failed while replacing table [ 321.364680] FAULT_INJECTION: forcing a failure. [ 321.364680] name failslab, interval 1, probability 0, space 0, times 0 [ 321.364706] CPU: 1 PID: 24808 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 321.364713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.364716] Call Trace: [ 321.364736] dump_stack+0x1b2/0x283 [ 321.364753] should_fail.cold+0x10a/0x154 [ 321.364768] should_failslab+0xd6/0x130 [ 321.364778] __kmalloc+0x6d/0x400 [ 321.364790] ? context_struct_to_string+0x323/0x610 [ 321.364804] context_struct_to_string+0x323/0x610 [ 321.364815] ? dump_masked_av_helper+0x90/0x90 [ 321.364825] ? sidtab_search_core+0x17f/0x2a0 [ 321.364837] security_sid_to_context_core+0x187/0x200 [ 321.364850] selinux_inode_init_security+0x45a/0x680 [ 321.364860] ? ext4_get_acl+0xcb/0x500 [ 321.364870] ? selinux_inode_create+0x30/0x30 [ 321.364881] ? ext4_get_acl+0xd0/0x500 [ 321.364896] security_inode_init_security+0x15f/0x320 [ 321.364905] ? ext4_init_acl+0x190/0x190 [ 321.364932] ? security_kernel_post_read_file+0xd0/0xd0 [ 321.364950] ? insert_inode_locked+0x39e/0x4b0 [ 321.364964] __ext4_new_inode+0x35ed/0x4e80 [ 321.364986] ? ext4_free_inode+0x14a0/0x14a0 [ 321.364994] ? avc_has_perm+0x1a4/0x320 [ 321.365004] ? __dquot_initialize+0x3f4/0x980 [ 321.365013] ? avc_has_perm_noaudit+0x2a0/0x2a0 [ 321.365025] ? inode_get_rsv_space.part.0+0x100/0x100 [ 321.365035] ? security_transition_sid+0xcb/0x120 [ 321.365045] ? security_transition_sid+0x9d/0x120 [ 321.365059] ext4_mkdir+0x2e4/0xb60 [ 321.365072] ? selinux_dentry_init_security+0x220/0x220 [ 321.365085] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 321.365127] ? security_inode_mkdir+0xcc/0x100 [ 321.365138] vfs_mkdir+0x3af/0x620 [ 321.365154] SyS_mkdirat+0x1b5/0x220 [ 321.365191] ? SyS_mknod+0x30/0x30 [ 321.365246] ? do_syscall_64+0x4c/0x640 [ 321.365258] ? SyS_mkdirat+0x220/0x220 [ 321.365272] do_syscall_64+0x1d5/0x640 [ 321.365292] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 321.365301] RIP: 0033:0x45bfa7 [ 321.365308] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 321.365322] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045bfa7 [ 321.365330] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 321.365337] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 321.365344] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 321.365352] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 321.479354] FAULT_INJECTION: forcing a failure. [ 321.479354] name failslab, interval 1, probability 0, space 0, times 0 [ 321.479369] CPU: 1 PID: 24818 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 321.479377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.479381] Call Trace: [ 321.479400] dump_stack+0x1b2/0x283 [ 321.479419] should_fail.cold+0x10a/0x154 [ 321.479438] should_failslab+0xd6/0x130 [ 321.479451] __kmalloc+0x6d/0x400 [ 321.479464] ? context_struct_to_string+0x323/0x610 [ 321.479480] context_struct_to_string+0x323/0x610 [ 321.479493] ? dump_masked_av_helper+0x90/0x90 [ 321.479503] ? sidtab_search_core+0x17f/0x2a0 [ 321.479518] security_sid_to_context_core+0x187/0x200 [ 321.479532] selinux_inode_init_security+0x45a/0x680 [ 321.479542] ? ext4_get_acl+0xcb/0x500 [ 321.479552] ? selinux_inode_create+0x30/0x30 [ 321.479563] ? ext4_get_acl+0xd0/0x500 [ 321.479579] security_inode_init_security+0x15f/0x320 [ 321.479588] ? ext4_init_acl+0x190/0x190 [ 321.479614] ? security_kernel_post_read_file+0xd0/0xd0 [ 321.479631] ? insert_inode_locked+0x39e/0x4b0 [ 321.479645] __ext4_new_inode+0x35ed/0x4e80 [ 321.479673] ? ext4_free_inode+0x14a0/0x14a0 [ 321.479683] ? avc_has_perm+0x1a4/0x320 [ 321.479695] ? __dquot_initialize+0x3f4/0x980 [ 321.479704] ? avc_has_perm_noaudit+0x2a0/0x2a0 [ 321.479719] ? inode_get_rsv_space.part.0+0x100/0x100 [ 321.479731] ? security_transition_sid+0xcb/0x120 [ 321.479740] ? security_transition_sid+0x9d/0x120 [ 321.479755] ext4_mkdir+0x2e4/0xb60 [ 321.479769] ? selinux_dentry_init_security+0x220/0x220 [ 321.479785] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 321.479798] ? security_inode_mkdir+0xcc/0x100 [ 321.479810] vfs_mkdir+0x3af/0x620 [ 321.479823] SyS_mkdirat+0x1b5/0x220 [ 321.479834] ? SyS_mknod+0x30/0x30 [ 321.479845] ? do_syscall_64+0x4c/0x640 [ 321.479854] ? SyS_mkdirat+0x220/0x220 [ 321.479865] do_syscall_64+0x1d5/0x640 [ 321.479881] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 321.479888] RIP: 0033:0x45bfa7 [ 321.479894] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 321.479906] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045bfa7 [ 321.479913] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 321.479919] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 321.479925] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 321.479931] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 321.635707] FAULT_INJECTION: forcing a failure. [ 321.635707] name failslab, interval 1, probability 0, space 0, times 0 [ 321.635774] CPU: 1 PID: 24829 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 321.635781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.635786] Call Trace: [ 321.635803] dump_stack+0x1b2/0x283 [ 321.635822] should_fail.cold+0x10a/0x154 [ 321.635837] should_failslab+0xd6/0x130 [ 321.635848] kmem_cache_alloc+0x40/0x3c0 [ 321.635863] __es_insert_extent+0x241/0xe20 [ 321.635881] ext4_es_insert_extent+0x1b9/0x530 [ 321.635893] ? lock_downgrade+0x6e0/0x6e0 [ 321.635904] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 321.635917] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 321.635929] ? rcu_read_lock_sched_held+0x10a/0x130 [ 321.635940] ? ext4_es_find_delayed_extent_range+0x646/0x930 [ 321.635953] ext4_ext_put_gap_in_cache+0xbb/0xf0 [ 321.635963] ? ext4_zeroout_es+0x160/0x160 [ 321.635974] ? ext4_find_extent+0x66a/0x9f0 [ 321.635989] ext4_ext_map_blocks+0x1bbf/0x4b30 [ 321.636006] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 321.636014] ? ext4_es_lookup_extent+0x321/0xac0 [ 321.636027] ? lock_acquire+0x170/0x3f0 [ 321.636042] ? lock_acquire+0x170/0x3f0 [ 321.636054] ? ext4_map_blocks+0x3c7/0x1600 [ 321.636073] ext4_map_blocks+0xc8f/0x1600 [ 321.636088] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 321.636101] ? ext4_issue_zeroout+0x150/0x150 [ 321.636109] ? __ext4_new_inode+0x278/0x4e80 [ 321.636129] ext4_getblk+0x98/0x3f0 [ 321.636141] ? ext4_iomap_begin+0x7f0/0x7f0 [ 321.636153] ? __dquot_initialize+0x3f4/0x980 [ 321.636178] ext4_bread+0x6c/0x1a0 [ 321.636191] ? ext4_getblk+0x3f0/0x3f0 [ 321.636201] ? inode_get_rsv_space.part.0+0x100/0x100 [ 321.636214] ? security_transition_sid+0xcb/0x120 [ 321.636225] ? security_transition_sid+0x9d/0x120 [ 321.636244] ext4_append+0x143/0x350 [ 321.636257] ext4_mkdir+0x4c9/0xb60 [ 321.636276] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 321.636292] ? security_inode_mkdir+0xcc/0x100 [ 321.636306] vfs_mkdir+0x3af/0x620 [ 321.636320] SyS_mkdirat+0x1b5/0x220 [ 321.636332] ? SyS_mknod+0x30/0x30 [ 321.636344] ? do_syscall_64+0x4c/0x640 [ 321.636355] ? SyS_mkdirat+0x220/0x220 [ 321.636368] do_syscall_64+0x1d5/0x640 [ 321.636386] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 321.636396] RIP: 0033:0x45bfa7 [ 321.636402] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 321.636414] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045bfa7 [ 321.636421] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 321.636427] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 321.636435] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 321.636444] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 321.800699] FAULT_INJECTION: forcing a failure. [ 321.800699] name failslab, interval 1, probability 0, space 0, times 0 [ 321.800713] CPU: 0 PID: 24837 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 321.800720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.800724] Call Trace: [ 321.800742] dump_stack+0x1b2/0x283 [ 321.800776] should_fail.cold+0x10a/0x154 [ 321.800794] should_failslab+0xd6/0x130 [ 321.800806] kmem_cache_alloc+0x40/0x3c0 [ 321.800820] __es_insert_extent+0x241/0xe20 [ 321.800836] ext4_es_insert_extent+0x1b9/0x530 [ 321.800847] ? lock_downgrade+0x6e0/0x6e0 [ 321.800858] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 321.800871] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 321.800882] ? rcu_read_lock_sched_held+0x10a/0x130 [ 321.800892] ? ext4_es_find_delayed_extent_range+0x646/0x930 [ 321.800905] ext4_ext_put_gap_in_cache+0xbb/0xf0 [ 321.800915] ? ext4_zeroout_es+0x160/0x160 [ 321.800926] ? ext4_find_extent+0x66a/0x9f0 [ 321.800942] ext4_ext_map_blocks+0x1bbf/0x4b30 [ 321.800959] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 321.800968] ? ext4_es_lookup_extent+0x321/0xac0 [ 321.800981] ? lock_acquire+0x170/0x3f0 [ 321.800994] ? lock_acquire+0x170/0x3f0 [ 321.801004] ? ext4_map_blocks+0x3c7/0x1600 [ 321.801023] ext4_map_blocks+0xc8f/0x1600 [ 321.801037] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 321.801049] ? ext4_issue_zeroout+0x150/0x150 [ 321.801058] ? __ext4_new_inode+0x278/0x4e80 [ 321.801078] ext4_getblk+0x98/0x3f0 [ 321.801090] ? ext4_iomap_begin+0x7f0/0x7f0 [ 321.801104] ? __dquot_initialize+0x3f4/0x980 [ 321.801117] ext4_bread+0x6c/0x1a0 [ 321.801127] ? ext4_getblk+0x3f0/0x3f0 [ 321.801136] ? inode_get_rsv_space.part.0+0x100/0x100 [ 321.801148] ? security_transition_sid+0xcb/0x120 [ 321.801158] ? security_transition_sid+0x9d/0x120 [ 321.801170] ext4_append+0x143/0x350 [ 321.801185] ext4_mkdir+0x4c9/0xb60 [ 321.801205] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 321.801221] ? security_inode_mkdir+0xcc/0x100 [ 321.801234] vfs_mkdir+0x3af/0x620 [ 321.801248] SyS_mkdirat+0x1b5/0x220 [ 321.801263] ? SyS_mknod+0x30/0x30 [ 321.801278] ? do_syscall_64+0x4c/0x640 [ 321.801289] ? SyS_mkdirat+0x220/0x220 [ 321.801301] do_syscall_64+0x1d5/0x640 [ 321.801319] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 321.801326] RIP: 0033:0x45bfa7 [ 321.801331] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 321.801344] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045bfa7 04:37:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) 04:37:38 executing program 1 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:38 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) sendmsg$NFNL_MSG_ACCT_NEW(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000080}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xb4, 0x0, 0x7, 0x401, 0x0, 0x0, {0xc, 0x0, 0x1}, [@NFACCT_FILTER={0xc, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x4bec}]}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x9}, @NFACCT_NAME={0x9, 0x1, 'syz1\x00'}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}, @NFACCT_PKTS={0xc, 0x2, 0x1, 0x0, 0x8}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}, @NFACCT_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0x336}, @NFACCT_FILTER={0x24, 0x7, 0x0, 0x1, [@NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xffff}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x5}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x7fffffff}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x7fff}]}, @NFACCT_FILTER={0x24, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0xffffffc1}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0xffffffff}, @NFACCT_FILTER_MASK={0x8, 0x1, 0x1, 0x0, 0x9f}, @NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x679}]}]}, 0xb4}}, 0x80) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) setxattr$security_ima(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='security.ima\x00', 0xfffffffffffffffd, 0x0, 0x0) 04:37:38 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:37:38 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r0, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x50, 0x0, 0x20, 0x70bd27, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @mcast2}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'team_slave_0\x00'}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000080}, 0x80) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 321.801350] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 321.801356] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 321.801363] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 321.801369] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 321.933635] input: syz1 as /devices/virtual/input/input519 [ 323.816981] input: syz1 as /devices/virtual/input/input521 [ 323.845567] FAULT_INJECTION: forcing a failure. [ 323.845567] name failslab, interval 1, probability 0, space 0, times 0 [ 323.857137] CPU: 1 PID: 24867 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 323.865014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.874362] Call Trace: [ 323.875577] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 323.876973] dump_stack+0x1b2/0x283 [ 323.889191] should_fail.cold+0x10a/0x154 [ 323.893340] should_failslab+0xd6/0x130 [ 323.897314] kmem_cache_alloc+0x40/0x3c0 [ 323.901379] __sigqueue_alloc+0x1b8/0x3e0 [ 323.905524] __send_signal+0x193/0x1280 [ 323.909499] force_sig_info+0x240/0x340 [ 323.913479] force_sig_info_fault.constprop.0+0x185/0x260 [ 323.919016] ? is_prefetch.isra.0.part.0+0x300/0x300 [ 323.924133] ? is_prefetch.isra.0.part.0+0x1fa/0x300 [ 323.929237] ? bad_area+0x4e/0x80 [ 323.932692] ? pgtable_bad+0x110/0x110 [ 323.936586] ? lock_downgrade+0x6e0/0x6e0 [ 323.940753] __bad_area_nosemaphore+0x1d6/0x2c0 [ 323.945448] ? up_read+0x17/0x30 [ 323.948814] __do_page_fault+0x842/0xb50 [ 323.952874] ? mm_fault_error+0x2c0/0x2c0 [ 323.957025] ? do_page_fault+0x60/0x4f2 [ 323.961021] ? page_fault+0x2f/0x50 [ 323.964646] page_fault+0x45/0x50 [ 323.968106] RIP: 0c27:0x4ce726 04:37:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000080)=0x80000000, 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r1) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x6) 04:37:38 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) prctl$PR_SET_TSC(0x1a, 0x1) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x800, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r3) ioctl$VIDIOC_S_AUDIO(r3, 0x40345622, &(0x7f0000000000)={0x71bc, "5c925d4c9af8134a6efeea7d6bed422762793880462618a8162e72e05c744f3b", 0x3}) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x2) ioctl$SCSI_IOCTL_DOORLOCK(r4, 0x5380) 04:37:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x800, 0x85) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r4}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r4, 0xfffffffe}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r4, 0x5, 0x8000, 0x8, 0xfffffffd, 0x5}, &(0x7f0000000080)=0x14) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000d00200009800000000000000680100009800000000000000380200003802000038020000380200003802000004000000000000000000000010000000e00000020000000000000000626f6e645f736c6176655f310000000000000000000000000000e2ffffff001f00000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a45435400000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc18795000000000000000000000000000000000040000000000000000000000000000000000000010000000000000000000000a800d0000000000000000000000000000000000000000000380074696d650000000000554e8269000000000000000000000000000000000000000000ffffffff4f970000001b000000000000f9000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000ffff000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000380071756f7461000000000000000000000000000000000000000000000000000100000000deffff460d0000000000000000000000000000280052454a45435400000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028000000000000000000000000000000001ec500000000000000000000000000feffffff"], 0x1) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) [ 323.971292] RSP: 50a060:000000000078bf00 EFLAGS: 00000003 [ 324.101635] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 04:37:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000080)={0x3b, @local, 0x4e23, 0x1, 'nq\x00', 0x9, 0xfffffff9, 0x35}, 0x2c) 04:37:38 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d2800faff000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 324.172831] input: syz1 as /devices/virtual/input/input523 [ 324.260642] ip_tables: iptables: counters copy to user failed while replacing table [ 324.276757] ip_tables: iptables: counters copy to user failed while replacing table [ 324.304367] input: syz1 as /devices/virtual/input/input524 [ 324.335352] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 04:37:39 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f0000000000)={@loopback, @multicast2}, 0x8) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:37:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r2) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f0000000000)={0x1, 0x8, 0x5, 0xfa, 0x4, 0x4}) 04:37:39 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000240)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee00) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgid(r5) fstat(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f00000005c0)={{}, {0x1, 0x3}, [{0x2, 0x3}, {0x2, 0x7}, {0x2, 0x1, r1}, {0x2, 0x4, r2}, {0x2, 0x2, r3}, {0x2, 0x4, 0xee01}], {0x4, 0x4}, [{0x8, 0x4, r5}, {0x8, 0x1, r6}], {0x10, 0x7}}, 0x64, 0x3) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r7, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r8, &(0x7f0000000280)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r9}}, 0x30) write$RDMA_USER_CM_CMD_QUERY(r7, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000340), r9, 0x1}}, 0x18) [ 324.373771] ip_tables: iptables: counters copy to user failed while replacing table [ 324.409908] ip_tables: iptables: counters copy to user failed while replacing table [ 324.442879] input: syz1 as /devices/virtual/input/input525 [ 324.474411] ip_tables: iptables: counters copy to user failed while replacing table [ 324.494468] ip_tables: iptables: counters copy to user failed while replacing table [ 324.506114] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 324.526349] ip_tables: iptables: counters copy to user failed while replacing table 04:37:39 executing program 1 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:39 executing program 5: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'bond0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'bond0\x00', 0x800000000008a03}) perf_event_open(&(0x7f000001d000)={0x1, 0x56, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x7f}], 0x5, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000200)='/dev/nvram\x00', 0x20080, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000240)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000340)={r1, 0x2, 0x200}) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) getsockopt$bt_hci(r2, 0x0, 0x3, &(0x7f0000000080)=""/197, &(0x7f0000000180)=0xc5) 04:37:39 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000080)="373ff9570c2ac0b09eec275c0f563960b35c5a09878a7ffa146f7447e900e38f863629") syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="8da4363ac0ed02000af9fdffff01e14c010000000000000000007a0000000000fff6f2a2299748aeb81e1b4e866e4e19fd171cd4ea65d1d5d82000b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x57, 0x10000}], 0x8010, 0x0) [ 324.544001] ip_tables: iptables: counters copy to user failed while replacing table [ 324.550431] input: syz1 as /devices/virtual/input/input526 04:37:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfa}, 'port0\x00', 0x0, 0x1004, 0x0, 0x0, 0x4, 0xffffffff, 0x2b9, 0x0, 0x1, 0x7}) connect$llc(r1, &(0x7f0000000000)={0x1a, 0x101, 0x3f, 0x8, 0x8, 0x5, @multicast}, 0x10) setsockopt$inet_dccp_buf(r1, 0x21, 0xc, &(0x7f0000000200)="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", 0xfc) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r2) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000300)={0x2, "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"}) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) 04:37:39 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="02002abd7000fbdbdf250100000008000700000400005c000880180000801400040002004e24e00000020010000000000000180000801400040002004e21ffffffff0000000000000000100000800400098008000a0001000000180000801400040002004e20ac1e00010000000000000000"], 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 324.647881] FAULT_INJECTION: forcing a failure. [ 324.647881] name failslab, interval 1, probability 0, space 0, times 0 [ 324.690378] CPU: 1 PID: 24972 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 324.698280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.707640] Call Trace: [ 324.710231] dump_stack+0x1b2/0x283 [ 324.713860] should_fail.cold+0x10a/0x154 [ 324.718011] should_failslab+0xd6/0x130 [ 324.722017] __kmalloc+0x2c1/0x400 [ 324.725597] ? ext4_find_extent+0x772/0x9f0 [ 324.729919] ext4_find_extent+0x772/0x9f0 [ 324.734072] ext4_ext_map_blocks+0x16f/0x4b30 [ 324.738573] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 324.743596] ? ext4_es_lookup_extent+0x321/0xac0 [ 324.748352] ? ext4_map_blocks+0x5c6/0x1600 [ 324.752678] ? lock_acquire+0x170/0x3f0 [ 324.756649] ? ext4_map_blocks+0x798/0x1600 [ 324.760998] ext4_map_blocks+0x7ea/0x1600 [ 324.765149] ? ext4_issue_zeroout+0x150/0x150 [ 324.769640] ? __ext4_new_inode+0x278/0x4e80 [ 324.774063] ext4_getblk+0x98/0x3f0 [ 324.777695] ? ext4_iomap_begin+0x7f0/0x7f0 [ 324.782020] ? __dquot_initialize+0x3f4/0x980 [ 324.786515] ext4_bread+0x6c/0x1a0 [ 324.790053] ? ext4_getblk+0x3f0/0x3f0 [ 324.793944] ? inode_get_rsv_space.part.0+0x100/0x100 [ 324.799143] ? security_transition_sid+0xcb/0x120 [ 324.803991] ? security_transition_sid+0x9d/0x120 [ 324.808892] ext4_append+0x143/0x350 [ 324.812609] ext4_mkdir+0x4c9/0xb60 [ 324.816256] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 324.820925] ? security_inode_mkdir+0xcc/0x100 [ 324.825506] vfs_mkdir+0x3af/0x620 [ 324.829050] SyS_mkdirat+0x1b5/0x220 [ 324.832768] ? SyS_mknod+0x30/0x30 [ 324.836310] ? do_syscall_64+0x4c/0x640 [ 324.840352] ? SyS_mkdirat+0x220/0x220 [ 324.844271] do_syscall_64+0x1d5/0x640 [ 324.848162] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 324.853388] RIP: 0033:0x45bfa7 [ 324.856589] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 324.864297] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045bfa7 [ 324.871561] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 324.878827] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a 04:37:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=ANY=[@ANYRESDEC], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) setsockopt$inet_tcp_int(r2, 0x6, 0x10, &(0x7f0000000000)=0x6, 0x4) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) ioctl$USBDEVFS_SETINTERFACE(r2, 0x80085504, &(0x7f0000000040)={0x2, 0x4}) 04:37:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000d00200009800000000000000680100009800000000000000380200003802000038020000380200003802000004000000000000000000000010000000e00000020000000000000000626f6e645f736c6176655f310000000000000000000000000000e2ffffff001f00000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a45435400000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc18795000000000000000000000000000000000040000000000000000000000000000000000000010000000000000000000000a800d0000000000000000000000000000000000000000000380074696d650000000000554e8269000000000000000000000000000000000000000000ffffffff4f970000001b000000000000f9000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000ffff000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000380071756f7461000000000000000000000000000000000000000000000000000100000000deffff460d0000000000000000000000000000280052454a45435400000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028000000000000000000000000000000001ec500000000000000000000000000feffffff"], 0x1) recvfrom$inet(r0, &(0x7f0000000000), 0x0, 0x2000, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r4, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r7}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f0000000040)={r7, 0xfffffffe}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000000)={r7, 0xac5}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r1, 0x5501) 04:37:39 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x121000, 0x0) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000140)={0x10000, 0x0, &(0x7f0000ffd000/0x1000)=nil}) r1 = openat$mice(0xffffffffffffff9c, &(0x7f0000000080)='/dev/input/mice\x00', 0x4001) ioctl$PPPIOCGNPMODE(r1, 0xc008744c, &(0x7f00000000c0)={0x29, 0x1}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 324.886090] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 324.893354] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:39 executing program 1 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r0, 0xee00) ioprio_set$uid(0x3, r0, 0x8) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) [ 324.957577] ip_tables: iptables: counters copy to user failed while replacing table [ 324.984904] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 325.065775] input: syz1 as /devices/virtual/input/input527 [ 325.090316] BTRFS error (device loop5): superblock checksum mismatch [ 325.115505] FAULT_INJECTION: forcing a failure. [ 325.115505] name failslab, interval 1, probability 0, space 0, times 0 [ 325.127263] CPU: 0 PID: 25026 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 325.135141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.144501] Call Trace: [ 325.147094] dump_stack+0x1b2/0x283 [ 325.150725] should_fail.cold+0x10a/0x154 [ 325.154891] should_failslab+0xd6/0x130 [ 325.158873] kmem_cache_alloc+0x40/0x3c0 [ 325.162947] __es_insert_extent+0x241/0xe20 [ 325.167278] ext4_es_insert_extent+0x1b9/0x530 [ 325.171861] ? ext4_es_find_delayed_extent_range+0x930/0x930 [ 325.177679] ext4_map_blocks+0x9f6/0x1600 [ 325.181835] ? ext4_issue_zeroout+0x150/0x150 [ 325.186328] ? __ext4_new_inode+0x278/0x4e80 [ 325.190742] ext4_getblk+0x98/0x3f0 [ 325.194371] ? ext4_iomap_begin+0x7f0/0x7f0 [ 325.198707] ? __dquot_initialize+0x3f4/0x980 [ 325.203210] ext4_bread+0x6c/0x1a0 [ 325.206752] ? ext4_getblk+0x3f0/0x3f0 [ 325.210636] ? inode_get_rsv_space.part.0+0x100/0x100 04:37:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000d00200009800000000000000680100009800000000000000380200003802000038020000380200003802000004000000000000000000000010000000e00000020000000000000000626f6e645f736c6176655f310000000000000000000000000000e2ffffff001f00000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a45435400000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc18795000000000000000000000000000000000040000000000000000000000000000000000000010000000000000000000000a800d0000000000000000000000000000000000000000000380074696d650000000000554e8269000000000000000000000000000000000000000000ffffffff4f970000001b000000000000f9000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000ffff000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000380071756f7461000000000000000000000000000000000000000000000000000100000000deffff460d0000000000000000000000000000280052454a45435400000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028000000000000000000000000000000001ec500000000000000000000000000feffffff"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0xfd, 0xfc}, 'port0\x00', 0xb, 0x7008a, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x3, 0x7}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r5) read$alg(r5, &(0x7f0000000680)=""/170, 0xaa) dup2(0xffffffffffffffff, r4) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000d00200009800000000000000680100009800000000000000380200003802000038020000380200003802000004000000000000000000000010000000e00000020000000000000000626f6e645f736c6176655f310000000000000000000000000000e2ffffff001f00000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a45435400000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc18795000000000000000000000000000000000040000000000000000000000000000000000000010000000000000000000000a800d0000000000000000000000000000000000000000000380074696d650000000000554e8269000000000000000000000000000000000000000000ffffffff4f970000001b000000000000f9000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000ffff000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000380071756f7461000000000000000000000000000000000000000000000000000100000000deffff460d0000000000000000000000000000280052454a45435400000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028000000000000000000000000000000001ec500000000000000000000000000feffffff"], 0x1) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000015c0)=ANY=[@ANYRESHEX=r1, @ANYRESHEX=r6, @ANYRESDEC=r2, @ANYRESHEX, @ANYRES16=r4, @ANYRES16=r2, @ANYRESHEX, @ANYRES16, @ANYBLOB="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"], 0x1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000100)=[{&(0x7f0000000080)="78337910cb4cb117944d37ed70958b82a980854273fbbc930fbb94c77123dde6", 0x20, 0x100}, {&(0x7f0000000540)="7e62452863dc25dd135abf9c564cf6b4b1815df9ad23a914c09ff88524e96e355f915d840f79a479fdb2fb6e8d8b2982c81cdddd5126c60856d07878cb74638ff1c7d8dd4e136687a1e6c3d42bbe388028501a79dd80a044f2c6188be4d19da5146453d14ee514c9dcb07ef0caaba90cfe9394f3c8302e2b5dff22e8f8d3a1cc4cd52863326e2c945ad0672926b4c80bc21afd7edbd8f24a17e99c01148aaf74", 0xa0, 0x6}], 0x440, &(0x7f0000000600)=ANY=[@ANYBLOB='shortname=win95,non5mtail=0,shortname=winnt,nnonumtail=1,shortname=lower,shortname=winnt,dont_measure,dont_appraise,\x00']) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='pids.events\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r7) ioctl$SG_GET_LOW_DMA(r7, 0x227a, &(0x7f0000000740)) [ 325.215823] ? security_transition_sid+0xcb/0x120 [ 325.220680] ? security_transition_sid+0x9d/0x120 [ 325.225576] ext4_append+0x143/0x350 [ 325.229303] ext4_mkdir+0x4c9/0xb60 [ 325.232943] ? ext4_init_dot_dotdot+0x4b0/0x4b0 [ 325.237618] ? security_inode_mkdir+0xcc/0x100 [ 325.242199] vfs_mkdir+0x3af/0x620 [ 325.245746] SyS_mkdirat+0x1b5/0x220 [ 325.249458] ? SyS_mknod+0x30/0x30 [ 325.252997] ? do_syscall_64+0x4c/0x640 [ 325.256976] ? SyS_mkdirat+0x220/0x220 [ 325.260865] do_syscall_64+0x1d5/0x640 [ 325.264784] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 325.269986] RIP: 0033:0x45bfa7 [ 325.273169] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 325.280904] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045bfa7 [ 325.288180] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200001c0 [ 325.295450] RBP: 000000000078bf00 R08: 0000000000000000 R09: 000000000000000a [ 325.296851] FAT-fs (loop4): Unrecognized mount option "non5mtail=0" or missing value [ 325.302713] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000003 [ 325.302720] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:40 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz0\x00', 0x8000}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x1) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r4, 0xc0206416, &(0x7f0000000040)={0x5, 0x2, 0x7f, 0x7, 0x1, 0xd5}) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 325.365160] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 325.373996] BTRFS error (device loop5): open_ctree failed 04:37:40 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r1 = dup(0xffffffffffffffff) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/snd/timer\x00', 0x600001) flock(r2, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r4, 0x1, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000240)={r4, 0xfffffffe}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000080)={r4, @in6={{0xa, 0x4e22, 0x7b2, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x6, 0x7fff, 0xfffff9ff, 0x1, 0x28, 0x7}, &(0x7f0000000140)=0x9c) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000180)={r5, 0x5}, &(0x7f0000000200)=0x8) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x404000, 0x0) read$dsp(r0, &(0x7f00000000c0)=""/142, 0x8e) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x8000, 0x0) syncfs(r2) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000d00200009800000000000000680100009800000000000000380200003802000038020000380200003802000004000000000000000000000010000000e00000020000000000000000626f6e645f736c6176655f310000000000000000000000000000e2ffffff001f00000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a45435400000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc18795000000000000000000000000000000000040000000000000000000000000000000000000010000000000000000000000a800d0000000000000000000000000000000000000000000380074696d650000000000554e8269000000000000000000000000000000000000000000ffffffff4f970000001b000000000000f9000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000ffff000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000380071756f7461000000000000000000000000000000000000000000000000000100000000deffff460d0000000000000000000000000000280052454a45435400000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028000000000000000000000000000000001ec500000000000000000000000000feffffff"], 0x1) tee(r1, r0, 0x1f, 0x5) [ 325.430585] input input529: cannot allocate more than FF_MAX_EFFECTS effects [ 325.450712] input input530: cannot allocate more than FF_MAX_EFFECTS effects 04:37:40 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000380)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 04:37:40 executing program 1 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[], 0x1) 04:37:40 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r4}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r4, 0xfffffffe}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={r4, 0x7a5142f6}, 0x8) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f, {0x4}}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) membarrier(0x20, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 325.586562] BTRFS error (device loop5): superblock checksum mismatch 04:37:40 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r0) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000024000705000000000000000000001f00", @ANYRES32=r6, @ANYBLOB="00000400f1ffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r7) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@delchain={0x24, 0x65, 0x400, 0x70bd2c, 0x25dfdbfd, {0x0, 0x0, 0x0, r6, {0x5, 0xffff}, {0xfff2, 0xa}, {0x7}}}, 0x24}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000680)=@delchain={0x468, 0x28, 0xf35, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {0x2}, {0xf, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x438, 0x2, [@TCA_CGROUP_POLICE={0x434, 0x2, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x40, 0x9, 0xfff, 0x5, 0xf0, 0x200, 0xfffffffd, 0x1, 0x8, 0x3f, 0xffff, 0x7, 0x6, 0x9, 0x2, 0x13, 0xff, 0x7fffffff, 0x1, 0x3f, 0x6f37, 0x8, 0xfffffff8, 0x7f, 0x4, 0x6, 0xa3, 0x6, 0xfffffc01, 0xff, 0x7fff, 0x9, 0x2, 0x9, 0x9, 0x3, 0x7, 0x0, 0x9, 0x1, 0xfffffffd, 0x200, 0x1, 0xffffffff, 0xe77e, 0xfffffff7, 0x4, 0x1000, 0x7, 0x4, 0xffff, 0x8, 0x0, 0x8, 0x8, 0x4, 0x7, 0xfff, 0x6, 0x0, 0x71, 0x33, 0x1f, 0x40, 0x3a032cb2, 0x9, 0x7, 0x2, 0x9, 0x8, 0x6cb, 0x7, 0x1, 0x9, 0x10001, 0xdcf4, 0x5, 0x8000, 0xe1b, 0x3, 0x101548b1, 0x5, 0xffffffff, 0x101, 0x3, 0x645d, 0xa31a, 0x5, 0x3, 0x126, 0x50, 0x7, 0x9, 0x1, 0x9, 0x0, 0x0, 0x200000, 0xd, 0x4, 0x7, 0x3, 0x2, 0x61, 0x6, 0x4, 0x4, 0x7, 0x6, 0x1, 0x401, 0x0, 0x7, 0x1000, 0x7, 0x401, 0x72, 0x10000, 0x0, 0x1, 0x200, 0x0, 0x100, 0x9, 0x3, 0xc675, 0x8, 0x8, 0xec, 0x8, 0x431, 0x4, 0x4, 0x3, 0x7, 0xffffffff, 0x2, 0x59965946, 0x3, 0x4, 0x9, 0x1, 0xfffffffa, 0x2, 0x4, 0x3, 0x6, 0x9, 0x1, 0x228a, 0xfff, 0x200, 0x2, 0x8, 0x1c, 0x5, 0x7f, 0x200, 0x80000000, 0x20, 0x51, 0x401, 0x5, 0x3870, 0x1f, 0x800, 0x2, 0x6, 0x8, 0x2, 0x34b9, 0x7, 0x4, 0x1, 0x776, 0x6, 0x3, 0x7, 0x74, 0x2c84, 0x10000, 0xffffffff, 0x1, 0x7, 0x4, 0x56, 0x7, 0x2, 0x5, 0x2, 0xc8, 0x6, 0xd, 0x4, 0x7ea5, 0x5, 0xb23, 0x7fff, 0xa1, 0x401, 0x185e, 0x0, 0x5, 0x7fff, 0x9, 0x6, 0x5b, 0x10001, 0x5, 0x100, 0x8, 0x8, 0x9, 0x7, 0x4, 0x2, 0x3f, 0xc6, 0x7f, 0x4, 0xff, 0x1, 0x1000, 0x3f, 0x1, 0x5a6, 0x5, 0x7fff, 0x7, 0x4, 0x6, 0x1, 0x1, 0x80000001, 0x80000000, 0xfe5b, 0x7fff, 0x3, 0x974, 0x0, 0x4, 0x400, 0x84a0, 0x1, 0xfff, 0x6, 0x5, 0x2, 0x8, 0x0, 0x1, 0xffffff80, 0x8, 0x6, 0x1a, 0x2]}, @TCA_POLICE_RATE64={0xc, 0x8, 0x100000001}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x7}, @TCA_POLICE_RESULT={0x8, 0x5, 0x9673}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x8000}]}]}}]}, 0x468}}, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 325.642051] FAULT_INJECTION: forcing a failure. [ 325.642051] name failslab, interval 1, probability 0, space 0, times 0 [ 325.646066] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 325.669695] BTRFS error (device loop5): open_ctree failed [ 325.681444] CPU: 0 PID: 25081 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 325.689332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.698690] Call Trace: [ 325.701272] dump_stack+0x1b2/0x283 [ 325.704900] should_fail.cold+0x10a/0x154 [ 325.709079] should_failslab+0xd6/0x130 [ 325.713049] __kmalloc_track_caller+0x2bc/0x400 [ 325.717733] ? strndup_user+0x5b/0xf0 [ 325.721530] memdup_user+0x22/0xa0 [ 325.725084] strndup_user+0x5b/0xf0 [ 325.728710] ? copy_mnt_ns+0x8a0/0x8a0 [ 325.732604] SyS_mount+0x68/0x120 [ 325.736068] ? copy_mnt_ns+0x8a0/0x8a0 [ 325.739956] do_syscall_64+0x1d5/0x640 [ 325.743848] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 325.749034] RIP: 0033:0x45f57a [ 325.752216] RSP: 002b:00007f2401f3da68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 325.753719] input: syz1 as /devices/virtual/input/input531 [ 325.759918] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045f57a [ 325.759925] RDX: 00007f2401f3dae0 RSI: 00000000200001c0 RDI: 00007f2401f3db00 [ 325.759931] RBP: 000000000078bf00 R08: 00007f2401f3db40 R09: 00007f2401f3dae0 04:37:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000000)=0x2, 0x4) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) 04:37:40 executing program 1 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 325.759937] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 325.759943] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 325.817161] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 04:37:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r1) connect$rds(r1, &(0x7f0000000000)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r3) ioctl$VIDIOC_G_PARM(r3, 0xc0cc5615, &(0x7f0000000040)={0xb, @raw_data="ef8e350e347f62a11dd897ca5b045a5b02a9a44672b7050cf4fbb1501ef03489920a6309c3f6b0e67575bbd15d312b5bf28578225d149f9f5528eeca3b444b95a1e108558d5e621f6bde61c8564852d0c01b66fce2a0bca9623b95ed8081a1d4f4643faee9adcd49c839b3f0ac90b24778025d50a93e1beec9b769eb827fc6c0333e12d74848d238273040f46c0c9f13de6a4d5e2a1561c2c1d5df09b88a9b2a17876634aac29579e6dee24e88c89f4a4337ceec7c691436af6ab9bd3897f23fa1bb8ab1daab6a7d"}) [ 325.896486] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=101 sclass=netlink_route_socket pid=25117 comm=syz-executor.3 [ 325.899045] print_req_error: I/O error, dev loop1, sector 0 [ 325.919458] FAULT_INJECTION: forcing a failure. [ 325.919458] name failslab, interval 1, probability 0, space 0, times 0 04:37:40 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) readlinkat(r0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000680)=""/121, 0x79) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x280, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = syz_genetlink_get_family_id$mptcp(&(0x7f00000005c0)='mptcp_pm\x00') sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000700)={&(0x7f0000000600)={0x2c, r5, 0x800, 0x70bd25, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0xe086}, 0x4000086) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r6, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$DRM_IOCTL_MODESET_CTL(r6, 0x40086408, &(0x7f0000000640)={0x780, 0x3ff}) getpeername(r4, &(0x7f0000000340)=@un=@abs, &(0x7f00000003c0)=0x80) setresuid(0x0, r3, 0xee00) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x8061, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00'/15, @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',cache=fscache,fscache,privport,loose,uid<', @ANYRESDEC=r3, @ANYBLOB=',audit,\x00']) r7 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000180)=0x60) fcntl$F_SET_FILE_RW_HINT(r7, 0x40e, &(0x7f0000000280)=0x3) [ 325.953082] CPU: 1 PID: 25115 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 325.961025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.970371] Call Trace: [ 325.972968] dump_stack+0x1b2/0x283 [ 325.976602] should_fail.cold+0x10a/0x154 [ 325.980757] should_failslab+0xd6/0x130 [ 325.984735] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 325.989436] ? _copy_from_user+0x94/0x100 [ 325.993619] ? copy_mnt_ns+0x8a0/0x8a0 [ 325.997503] copy_mount_options+0x59/0x2e0 [ 326.001737] ? copy_mnt_ns+0x8a0/0x8a0 [ 326.005626] SyS_mount+0x84/0x120 [ 326.009075] ? copy_mnt_ns+0x8a0/0x8a0 [ 326.012964] do_syscall_64+0x1d5/0x640 [ 326.016855] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 326.022038] RIP: 0033:0x45f57a [ 326.025237] RSP: 002b:00007f2401f3da68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 326.032945] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045f57a [ 326.040209] RDX: 00007f2401f3dae0 RSI: 00000000200001c0 RDI: 00007f2401f3db00 [ 326.047499] RBP: 000000000078bf00 R08: 00007f2401f3db40 R09: 00007f2401f3dae0 [ 326.054773] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 326.062036] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 326.082904] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.3'. 04:37:40 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) setsockopt(r1, 0x2, 0x9, &(0x7f0000000080)="1846407b8a8c2ec40e907c2ff502fa7acf5ec5e2dc409419c94ae8683d2f08164f5fcbf4ad46e48a7442d962033b8c7c5ea95b2bbe0017c47dae5c6a5b06edd4737f67ffc959d6bc34c6ec4e3c46c124e7136961c9c517e9d27140acc496728386da46b8ac177a84cc618254973c274b2ca9833c8acc84bf166b181f12a7e0", 0x7f) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="b48d411fcb680cf9a3d9a785b68541436ce378629aa7b20b7fbf9c92395ce102a37416969b8a1cce96d141eb3275b3eb917f71be01d0f3ee8394d2675df1c6a9ebbdfb21bfde2abec766847a2dbf7c1259916b8503bf12743608c4b7630265a73f98ec614046a55db870ae1431dc5845944e15a65e3e"], 0x1) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r4, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) shutdown(r4, 0x1) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r5, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r6, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r6, &(0x7f0000000640)="dd8a59ee44155d31bbc943357379636530cf95a741ea27efae1e515c4e8022042954c0a67801affcd45dfa7638329947a3b6a25a64555f2f74daf16da4cd166301e594df730d7294bdb459ffa543818c0fad7d45275a3947884589b252930026121ef435d303e65fdb340536917de6e0da09b4927606a0442e2c4cdb6c6723cad24312b0b638479ca028e116a1c59876a131fa57dddb5d9a7ed87c0b23a413caa50226d6cbdfbfb1352830b8a482d549164391a3909680a790979e29fa0a613892ddc061393d0199a0aff322c375abec7422d9039461916cf25a2d", 0xfffffffffffffc6d, 0x0, 0x0, 0x0) poll(&(0x7f0000000580)=[{}, {0xffffffffffffffff, 0x450}, {0xffffffffffffffff, 0x4400}, {0xffffffffffffffff, 0x9449}, {0xffffffffffffffff, 0x40}, {r5, 0x2}, {r6, 0x4}], 0x7, 0x2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) [ 326.104962] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 326.115163] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=101 sclass=netlink_route_socket pid=25112 comm=syz-executor.3 04:37:40 executing program 3: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000002940)={&(0x7f0000000240)=@newtaction={0x68, 0x30, 0x53b, 0x0, 0x0, {}, [{0x54, 0x1, [@m_simple={0x50, 0x1, 0x0, 0x0, {{0xb, 0x1, 'simple\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0xc}, @TCA_DEF_DATA={0x6, 0x3, '*\x00'}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a229975aaeb81e1b00b10efd9a000001000000000001ffffff020200005f42485266535f4d3133bbcc18c76057b66377ee1875f94738e456ca506f1c47fabec9a077276b50733671b48233fec2403a1c14e0e98a1e43b4c47a89b5c30f2f780938b67943cb7786542e7d3e258af0c20b9a59f0eb81be57f48981cd10ecac80ff18d349ad06f4cb836b517bff84e4731aea1682d31573e64e831747c8dabad8904e87d6cc6858e812e837303f20dbf213858c99e2838041db65d5bf172ae8ac751124c2d4bb935f6e04bfbdd5000000b5000000000000", 0xf9, 0x10000}], 0x0, 0x0) 04:37:40 executing program 1 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:40 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsa\x00', 0x80000, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 326.185886] BTRFS error (device loop5): superblock checksum mismatch 04:37:40 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$UI_SET_MSCBIT(r1, 0x40045568, 0x13) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, r2) r3 = add_key$keyring(&(0x7f0000000200)='keyring\x00', 0x0, 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, 0x0, 0x0, 0x0, r4) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000001440)="02899232fd5d9aca6ac3763489397b1bf9455d23a5b98c284438cc49dd943ea193947d30fdd72cc3f4490e21a7f97da773700a5f5743970aa60613856df0ffe76195ee2b5061f38d1bbdbd678172087486ab6bf9d65a1e56102574893d1a1533ab65b4ee72965086a1f7c9f9b3b1f916ed67f91a8a65efbf3e0fbfa031d9d754244068de", 0x84, r4) keyctl$invalidate(0x15, r5) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000002c0)={{0x0, 0x0, 0x0, 0x9}, 'syz0\x00', 0x1}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup(r6) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000100)={r5, 0x91, 0x1000}, &(0x7f0000001500)=ANY=[@ANYBLOB="656e633d72617720686173683d6469676573745e6e756c6c000000000000000000000000000000006838bcde8a9474ec03e2ac680000000000000000000000000000000000000000000000000000000000000000000000000013094b003411da5bb2096ca486aa2c6f081720ecdca0953abe8931cf19a8b7a0553f734c538eb8869e3b7d8db08b6f097e25c304f19310f964439c1c92aaafa340aac2e14945b2048003e8314674f0e8c316abcdd39500000000000000f635f7e88a75a1e6e8a59757886bacc973b3ac97fd9e7888b4bde651ed"], &(0x7f0000000380)="6eb037b9b22b9f775ce481ac04f99d51477bbbd4af3d3f78106791ddafbc00c2ede51a4cae6c75d8421c31babe0fdd984f965b0a4e6300b51e0f9da5cae62d880f7e746026fd2b37cc5ddd94dd3742f5ae0d6c0eea42b7cb3152b8f24a4135b832c2ba8857ee72a8cfc0d8f22c9837abf8459704faf5b7eba1ca68a49fd6c7b50a9dd72de07591d0474641d61780815ec8", &(0x7f0000000440)=""/4096) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 326.232724] FAULT_INJECTION: forcing a failure. [ 326.232724] name failslab, interval 1, probability 0, space 0, times 0 [ 326.244823] CPU: 1 PID: 25155 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 326.252708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.262060] Call Trace: [ 326.264685] dump_stack+0x1b2/0x283 [ 326.268334] should_fail.cold+0x10a/0x154 [ 326.272488] should_failslab+0xd6/0x130 [ 326.276483] __kmalloc_track_caller+0x2bc/0x400 [ 326.281149] ? kstrdup_const+0x35/0x60 [ 326.285034] ? lock_downgrade+0x6e0/0x6e0 [ 326.289183] kstrdup+0x36/0x70 [ 326.292381] kstrdup_const+0x35/0x60 [ 326.296099] alloc_vfsmnt+0xe0/0x7c0 [ 326.299819] vfs_kern_mount.part.0+0x27/0x3c0 [ 326.301222] input: syz0 as /devices/virtual/input/input532 [ 326.304323] do_mount+0x3c9/0x25e0 [ 326.304339] ? copy_mount_string+0x40/0x40 [ 326.304350] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 326.304359] ? copy_mnt_ns+0x8a0/0x8a0 [ 326.304371] ? copy_mount_options+0x1ec/0x2e0 [ 326.304380] ? copy_mnt_ns+0x8a0/0x8a0 [ 326.304394] SyS_mount+0xa8/0x120 [ 326.338281] ? copy_mnt_ns+0x8a0/0x8a0 [ 326.342171] do_syscall_64+0x1d5/0x640 [ 326.346100] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 326.351298] RIP: 0033:0x45f57a [ 326.354479] RSP: 002b:00007f2401f3da68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 326.362185] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045f57a [ 326.369458] RDX: 00007f2401f3dae0 RSI: 00000000200001c0 RDI: 00007f2401f3db00 [ 326.371942] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 326.376724] RBP: 000000000078bf00 R08: 00007f2401f3db40 R09: 00007f2401f3dae0 [ 326.376730] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 326.376736] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 326.382575] net_ratelimit: 17 callbacks suppressed [ 326.382580] ip_tables: iptables: counters copy to user failed while replacing table 04:37:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = dup2(0xffffffffffffffff, r0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000200)) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000280)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r3}}, 0x30) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0)={0xffffffffffffffff}, 0x3, {0xa, 0x4e24, 0x6, @mcast1, 0x48}, r3}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f0000000080), r4}}, 0x18) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$SNDCTL_DSP_SPEED(r1, 0xc0045002, &(0x7f0000000180)=0x3) [ 326.429152] BTRFS error (device loop5): open_ctree failed 04:37:41 executing program 1 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 326.473563] print_req_error: I/O error, dev loop1, sector 0 [ 326.504417] ip_tables: iptables: counters copy to user failed while replacing table 04:37:41 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r1) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x19833768552e5046, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000080)={0xa1d769ffb29de44, 0x3, 0x2, r2, 0x0, &(0x7f0000000040)={0x9b0903, 0xc772, [], @ptr}}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 326.547049] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 326.561472] BTRFS error (device loop5): superblock checksum mismatch [ 326.614339] input: syz1 as /devices/virtual/input/input534 [ 326.620297] BTRFS error (device loop5): open_ctree failed [ 326.640650] FAULT_INJECTION: forcing a failure. [ 326.640650] name failslab, interval 1, probability 0, space 0, times 0 [ 326.653399] ip_tables: iptables: counters copy to user failed while replacing table 04:37:41 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 04:37:41 executing program 3: rmdir(&(0x7f0000000080)='./file0\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:41 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) r1 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x7, 0x80) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x10) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000240), &(0x7f00000002c0)=0x68) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000040)={&(0x7f0000000380)={0x10c, 0x2, 0x2, 0x3, 0x0, 0x0, {0x3, 0x0, 0x7}, [@CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x4d1}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0x6}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x1}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x3}, @CTA_EXPECT_HELP_NAME={0xe, 0x6, 'irc-20000\x00'}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x4}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x5}, @CTA_EXPECT_TUPLE={0xb0, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0xe}}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @private2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0xf}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x2}]}, 0x10c}, 0x1, 0x0, 0x0, 0x4}, 0x80) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 326.721338] CPU: 1 PID: 25198 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 326.729228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.738575] Call Trace: [ 326.741163] dump_stack+0x1b2/0x283 [ 326.744796] should_fail.cold+0x10a/0x154 [ 326.748951] should_failslab+0xd6/0x130 [ 326.752926] kmem_cache_alloc+0x28e/0x3c0 [ 326.757075] alloc_vfsmnt+0x23/0x7c0 [ 326.760790] vfs_kern_mount.part.0+0x27/0x3c0 [ 326.765302] do_mount+0x3c9/0x25e0 [ 326.768846] ? copy_mount_string+0x40/0x40 [ 326.773090] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 326.777928] ? copy_mnt_ns+0x8a0/0x8a0 [ 326.779102] input: syz1 as /devices/virtual/input/input536 [ 326.781811] ? copy_mount_options+0x1ec/0x2e0 [ 326.781821] ? copy_mnt_ns+0x8a0/0x8a0 [ 326.781833] SyS_mount+0xa8/0x120 [ 326.781847] ? copy_mnt_ns+0x8a0/0x8a0 [ 326.803112] do_syscall_64+0x1d5/0x640 [ 326.807002] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 326.812183] RIP: 0033:0x45f57a [ 326.815376] RSP: 002b:00007f2401f3da68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 326.823078] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045f57a [ 326.830344] RDX: 00007f2401f3dae0 RSI: 00000000200001c0 RDI: 00007f2401f3db00 [ 326.837607] RBP: 000000000078bf00 R08: 00007f2401f3db40 R09: 00007f2401f3dae0 [ 326.844872] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 326.852139] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r0) r1 = eventfd2(0x1, 0x80801) ioctl$FIGETBSZ(r1, 0x2, &(0x7f00000000c0)) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000080)=0x520b, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r2) ioctl$IMDELTIMER(r2, 0x80044941, &(0x7f0000000100)=0x1) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 326.900490] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 04:37:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/net/tun\x00', 0x220081, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) setsockopt$inet_tcp_int(r3, 0x6, 0x10, &(0x7f0000000080)=0x40, 0x4) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"/800], 0x1) recvmsg(r3, &(0x7f0000000580)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000540)=""/22, 0x16}, 0x12100) 04:37:41 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$RTC_WIE_OFF(r0, 0x7010) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0xa) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f0000000380)={"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"}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r5, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r5, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000000040)=0x10) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r1, 0x5501) 04:37:41 executing program 1 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r2}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r2, 0xfffffffe}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000200)=ANY=[@ANYRES32=r2, @ANYBLOB="45cf6f499cca1339206f5e000000003a92d66cfb57a7ed805e6db1f8df7fbf9d4309ed7c0e4597b856e004e786966c000000000000077286f15fd4c860471b75d486da1687e8240955fb449022694f38b13efae803c02b42282aefc49f53759409b128b7ef259940b4fe137582791f446feb8e37dedc1eac59302bb69d18482b6126d27dcfe8c6"], &(0x7f0000000100)=0x4d) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x40, 0x10000}], 0x5, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000340)={{0x4, 0x4}, {0xfa, 0x4a}, 0xffffffff, 0x7, 0x2}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) 04:37:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000640)="dd8a59ee44155d31bbc943357379636530cf95a741ea27efae1e515c4e8022042954c0a67801affcd45dfa7638329947a3b6a25a64555f2f74daf16da4cd166301e594df730d7294bdb459ffa543818c0fad7d45275a3947884589b252930026121ef435d303e65fdb340536917de6e0da09b4927606a0442e2c4cdb6c6723cad24312b0b638479ca028e116a1c59876a131fa57dddb5d9a7ed87c0b23a413caa50226d6cbdfbfb1352830b8a482d549164391a3909680a790979e29fa0a613892ddc061393d0199a0aff322c375abec7422d9039461916cf25a2d", 0xfffffffffffffc6d, 0x0, 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v1={0x1000000, [{0x0, 0x1}]}, 0xc, 0x3) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 326.989759] ip_tables: iptables: counters copy to user failed while replacing table 04:37:41 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="2b030000000000001c0012800b00010067656e65766500000c000280060005000000000008000500", @ANYRES32=r6, @ANYBLOB="7bc33078", @ANYRES32=r6, @ANYBLOB], 0x4c}}, 0x0) [ 327.076332] ip_tables: iptables: counters copy to user failed while replacing table [ 327.098734] input: syz1 as /devices/virtual/input/input538 [ 327.109589] FAULT_INJECTION: forcing a failure. [ 327.109589] name failslab, interval 1, probability 0, space 0, times 0 [ 327.115408] ip_tables: iptables: counters copy to user failed while replacing table [ 327.138086] CPU: 0 PID: 25263 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 327.146089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.149427] ip_tables: iptables: counters copy to user failed while replacing table [ 327.155437] Call Trace: [ 327.155456] dump_stack+0x1b2/0x283 [ 327.155474] should_fail.cold+0x10a/0x154 [ 327.155489] should_failslab+0xd6/0x130 [ 327.155502] kmem_cache_alloc+0x28e/0x3c0 [ 327.181703] alloc_vfsmnt+0x23/0x7c0 [ 327.185424] vfs_kern_mount.part.0+0x27/0x3c0 [ 327.189690] ip_tables: iptables: counters copy to user failed while replacing table [ 327.190033] do_mount+0x3c9/0x25e0 [ 327.201343] ? copy_mount_string+0x40/0x40 [ 327.205575] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 327.210413] ? copy_mnt_ns+0x8a0/0x8a0 [ 327.213727] ip_tables: iptables: counters copy to user failed while replacing table [ 327.214297] ? copy_mount_options+0x1ec/0x2e0 [ 327.214307] ? copy_mnt_ns+0x8a0/0x8a0 [ 327.214326] SyS_mount+0xa8/0x120 [ 327.214336] ? copy_mnt_ns+0x8a0/0x8a0 [ 327.214349] do_syscall_64+0x1d5/0x640 [ 327.214364] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 327.227306] ip_tables: iptables: counters copy to user failed while replacing table [ 327.230482] RIP: 0033:0x45f57a [ 327.230488] RSP: 002b:00007f2401f3da68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 327.230499] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045f57a [ 327.230505] RDX: 00007f2401f3dae0 RSI: 00000000200001c0 RDI: 00007f2401f3db00 [ 327.230512] RBP: 000000000078bf00 R08: 00007f2401f3db40 R09: 00007f2401f3dae0 [ 327.230518] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 327.230524] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:42 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x2, 0x10000) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:37:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x800008, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) 04:37:42 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000580)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfd}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) bind$unix(0xffffffffffffffff, &(0x7f0000000480)=@file={0x0, './file0\x00'}, 0x6e) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="2b030000000000001c001a800b00010067656e65766500000c00028006fb05000000000008a7547e6fbee90f2d32cfb54232000500adaba8731b6d5df02e8ace2d26ab622a59cd6f3900fa65e20120f04e542388c673b00000", @ANYRES32=r6, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r6, @ANYBLOB], 0x4c}}, 0x0) 04:37:42 executing program 1 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 327.434619] input: syz1 as /devices/virtual/input/input540 [ 327.453847] print_req_error: I/O error, dev loop1, sector 0 [ 327.473858] BTRFS error (device loop5): superblock checksum mismatch 04:37:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r1) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000024000705000000000000000000001f00", @ANYRES32, @ANYBLOB="00000400f1ffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000880)=ANY=[@ANYBLOB="680000002800310f00"/20, @ANYRES32=0x0, @ANYBLOB="040000000000ffff000000000b0001006367726f757000003800020034000100300000000a000100706564697400000004000280040006000c000700000000000000000c000800000000000000000015dc02abe15e9828fd48671607f6ac647a96de9ddfb43f0c042ab94b00"], 0x68}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=@delchain={0x44a4, 0x28, 0xf35, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x2}, {0x4, 0xffff}}, [@filter_kind_options=@f_flow={{0x9, 0x1, 'flow\x00'}, {0x4474, 0x2, [@TCA_FLOW_XOR={0x8, 0x7, 0x3}, @TCA_FLOW_RSHIFT={0x8}, @TCA_FLOW_ACT={0x4450, 0x9, 0x0, 0x1, [@m_ife={0x19c, 0xb, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x94, 0x2, 0x0, 0x1, [@TCA_IFE_SMAC={0xa, 0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @TCA_IFE_METALST={0x28, 0x6, [@IFE_META_TCINDEX={0x4, 0x5, @void}, @IFE_META_SKBMARK={0x8, 0x1, @val=0xc09c}, @IFE_META_PRIO={0x4, 0x3, @void}, @IFE_META_TCINDEX={0x6, 0x5, @val=0x4}, @IFE_META_PRIO={0x4, 0x3, @void}, @IFE_META_SKBMARK={0x4, 0x1, @void}, @IFE_META_SKBMARK={0x4, 0x1, @void}]}, @TCA_IFE_PARMS={0x1c, 0x1, {{0x6, 0x1, 0x8, 0x6, 0x7}, 0x1}}, @TCA_IFE_PARMS={0x1c, 0x1, {{0xffffffff, 0xb02, 0x6, 0x200, 0x3}}}, @TCA_IFE_METALST={0x18, 0x6, [@IFE_META_PRIO={0x4, 0x3, @void}, @IFE_META_TCINDEX={0x6, 0x5, @val=0x81}, @IFE_META_PRIO={0x4, 0x3, @void}, @IFE_META_SKBMARK={0x4, 0x1, @void}]}, @TCA_IFE_DMAC={0xa, 0x3, @multicast}]}, {0xe3, 0x6, "b0c76b8452a0f43bd94184baae2c516ce2b1207e492d78bc67d372e83602630dd0b9d4b925af8bca6cee5ae35b37a465ce0b3d0e023fdb8754e861789f761b36811cbd03540680f56f99525d6a1324ca858c8d18eaab15613971b7dad4ef747f70ce8318ad4e237f05aa29057258d16f2e756c5ff9a4ba70528a786cee7ea3578b553de0397c2ba47af7fb95be9eedccf3ebca9cedce1be4fb1be73744dc23084b4700756b863403e5ed8cdb8de01d2af18e4743d95925c26ac43903c8181ca5b841e205b9f9ded2dab93ba4865284936ca3c595b302e6dbecf2b85e0d2673"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_connmark={0xfc, 0x17, 0x0, 0x0, {{0xd, 0x1, 'connmark\x00'}, {0xc8, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x8, 0xfffffffe, 0x8, 0x6, 0x3f2}, 0x81}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x1ff, 0xff, 0x20000000, 0x8, 0x28a83302}, 0x2}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x768, 0x6097, 0x6, 0xda, 0x9}, 0x4}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x7fffffff, 0x4, 0x6, 0xd6f, 0xfff}, 0x8}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x200, 0x9, 0x8, 0x4, 0x3f0195e9}, 0xd876}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x5, 0x8, 0x1, 0x5, 0x2}, 0x5}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x5, 0x7, 0x6, 0x8a, 0x3f}, 0x3f}}]}, {0x6, 0x6, "eab0"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}, @m_connmark={0x174, 0xa, 0x0, 0x0, {{0xd, 0x1, 'connmark\x00'}, {0xe4, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x0, 0xbac, 0x3, 0x7, 0x5}, 0x1}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x4, 0x7f, 0x0, 0x2198, 0x100}, 0x6}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x5904bc36, 0x3, 0x5, 0xeab7, 0xc80b}, 0x2}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xfffffbff, 0x1000, 0x4, 0x4, 0x2}, 0x6}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x10000, 0x0, 0x4, 0xfff, 0x17}, 0x7}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x6, 0x5, 0x0, 0x28aa7444, 0x8}, 0x8001}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x6, 0x6, 0x10000000, 0x6, 0xfff}, 0x3f}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x4, 0x1000, 0x1, 0x2, 0xad0}, 0x3ff}}]}, {0x62, 0x6, "38aaaf92815a2328f86033eb8c1a5c4e04aa9176c1f240e05eb930bfb0a1b63b253ad6a26e155512d9d8f07bacc07780a08a33f7306f1b5671ce9920c30896ad0b83ca1dedcd01ed28e9ad94a9892c4511bbfa807c46fb342cd1766260f6"}, {0xc}, {0xc, 0x8, {0x3, 0x2}}}}, @m_gact={0x18c, 0x8, 0x0, 0x0, {{0x9, 0x1, 'gact\x00'}, {0x7c, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x0, 0x1916, 0x6}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x14f1}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x1828}}, @TCA_GACT_PARMS={0x18, 0x2, {0x2, 0x223, 0x1, 0x2, 0x9}}, @TCA_GACT_PARMS={0x18, 0x2, {0xa0, 0x0, 0x20000000, 0x7, 0x100}}, @TCA_GACT_PARMS={0x18, 0x2, {0x40, 0xffff, 0x6, 0x3, 0xffffffff}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x1c0, 0x7}}]}, {0xe5, 0x6, "6c6c445d6628bf12e5fcfcf8243cc9e71c24a4878cdc9aea988f7579faabc95290a3deb637a63d3b3e28c31a13754589c62e4b49649317c5dcf577fcd6c7552bdc4b592838d2727c833d847b68c2748c72ae4e38db8628c2c5df6715b84bf9bc24ab05b5d5ecd022d34071572174eb926e49a6949959c64d7551f10250a3012bc787f79be3e7b9963cff103a87a6843da76a3d3db419925800d4148c5885bd6ff2d47f80bea21a200c361b855c8f742ab5719f67cd2dd264fce7c02cffdda7b70537a63c2633f9334b6d31eaadb2b1766e1a273eb436e564b2444e1dce2755e5ef"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_skbedit={0x144, 0x1e, 0x0, 0x0, {{0xc, 0x1, 'skbedit\x00'}, {0x34, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0x5, 0x5, 0x8, 0x800, 0x6}}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0xfffffffc, 0x1, 0x1, 0x5}}]}, {0xe8, 0x6, "bc465cad11ec78cb33870cfcd6f0daa8b2fbbb63ef0d0d5429b7be98e410e88ebebb1215aed1365a29983f979fba5887e7c44ff07591097efb3e4902d9918868a1d97458aa7e44f9cc291058ad4dbe5b6476b61c4c1646a02d6578a36fe68eeb47e2756fb327f0858a31154022206af3c56bbe34063e5f8f859665cf33736cbdd09d14d356190dfe2879d8d8f1fed321f35c93a6f79d183b9950ca4655921c4fb399ee055e0f3cdccf652fe985c4a27722ef084579a71ce7ea33b94727a33cd1ebe945730b383c862d824c66f061f8ce5e30acd4243e196cf6f5765ea19d3f4a857c86e9"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_ife={0x164, 0x11, 0x0, 0x0, {{0x8, 0x1, 'ife\x00'}, {0x74, 0x2, 0x0, 0x1, [@TCA_IFE_METALST={0x24, 0x6, [@IFE_META_TCINDEX={0x4, 0x5, @void}, @IFE_META_SKBMARK={0x4, 0x1, @void}, @IFE_META_SKBMARK={0x4, 0x1, @void}, @IFE_META_SKBMARK={0x4, 0x1, @void}, @IFE_META_TCINDEX={0x6, 0x5, @val=0x20}, @IFE_META_SKBMARK={0x8}]}, @TCA_IFE_TYPE={0x6, 0x5, 0x2}, @TCA_IFE_METALST={0x1c, 0x6, [@IFE_META_SKBMARK={0x8, 0x1, @val=0x2}, @IFE_META_SKBMARK={0x4, 0x1, @void}, @IFE_META_TCINDEX={0x6, 0x5, @val=0x9}, @IFE_META_TCINDEX={0x4, 0x5, @void}]}, @TCA_IFE_PARMS={0x1c, 0x1, {{0x8, 0x152, 0x0, 0x88f, 0x3}, 0x8d89}}, @TCA_IFE_SMAC={0xa}]}, {0xca, 0x6, "421376a2561d7ef7ede454d9b6f82a1d8a0212716d7d0d07ef163907149a611e2b89473e9a340e065022f1ed257c5ae1df0dfb45463dc1155449db8371d7d30877c9dc9b9158c7bcd1a90acc6faf7a9f375beb44873bebe8bb3a709ab59cc370580f339c73bf9644873ec4997931625dc159c291a9b66f8c3dfa674e86f3285310155d7fc106619ece99a91cd0141527c20fb5e5805e47077c7df0bebe0d9d4858828422dc4620e61094a4b600181c6f6df0b0ceb5d72025228c5739bde59e8bd26ca86dde23"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_police={0x1e5c, 0x12, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0x1d8c, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x100000001}, @TCA_POLICE_TBF={0x3c, 0x1, {0xffffff04, 0x4, 0x9, 0x7, 0x3, {0x1, 0x0, 0x20, 0xfcc, 0x9, 0x7ff}, {0x8, 0x0, 0x1000, 0x3, 0x7, 0x6}, 0x7, 0xd7f, 0x7ff}}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x4}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x6}, @TCA_POLICE_RESULT={0x8, 0x5, 0x7ff}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x20, 0x2, 0x40, 0x7fffffff, 0x8, 0x3, 0x0, 0x101, 0x40, 0x6, 0x1400, 0xd272, 0x6, 0xffffffff, 0x6, 0x2, 0x1, 0x8, 0x8001, 0x2, 0x1f, 0x9, 0x642, 0x3ff, 0x4, 0x9, 0x0, 0x10000, 0x4, 0x5, 0x400, 0x0, 0x9b56, 0x2, 0xfffffffc, 0x17, 0x10000, 0x3, 0x10001, 0x7, 0x51b, 0x8, 0xffff, 0x6, 0x8, 0x4, 0x7, 0x8001, 0x2, 0x1000, 0x9, 0x7b, 0x3, 0x7fffffff, 0x9, 0x5, 0x7, 0x7, 0x34, 0x3f, 0x7, 0x8, 0x1000, 0x3, 0xffffffff, 0xca, 0x8, 0xffffffff, 0x10000, 0xba7, 0x6, 0x1, 0xd3d2, 0xc3, 0x29ce, 0x8, 0x4, 0x3e, 0x8, 0x9, 0x1, 0x100, 0x0, 0xfffffffd, 0x5, 0x3, 0xca, 0x2, 0x3, 0x1, 0x7ff, 0x8, 0x81, 0x7, 0x1, 0x0, 0x8, 0x2, 0x11, 0xffffffff, 0x7623, 0x0, 0x0, 0x1, 0x5, 0x8, 0x200, 0x8000, 0x87c, 0x3, 0x9, 0x7fff, 0x4, 0x4, 0x8000, 0x1a, 0x9, 0x4, 0xfff, 0x80000001, 0x100, 0x80000001, 0x4, 0x7, 0x200, 0x5, 0x2ebee92e, 0x800, 0x7fff, 0x7, 0x5, 0x7f, 0x439, 0xfea, 0x4, 0xfffffff8, 0x0, 0x3, 0xfc5, 0x4, 0xf0, 0x100, 0xf10d, 0x1, 0x1ff, 0x0, 0x67, 0x7, 0x9, 0x3, 0x8000, 0x1d, 0x49, 0x3, 0x3f, 0x40, 0x8, 0x7, 0x7, 0x0, 0x7fffffff, 0x8, 0x51, 0x4, 0xfffffffd, 0x5, 0xc6d, 0xef, 0x1f, 0x7ff, 0x0, 0x7, 0x4, 0x9, 0x7, 0x8, 0xfff, 0x2, 0x1000, 0x5, 0x4, 0x47, 0x3, 0x2, 0x9, 0xfffff001, 0xb36e, 0xffff0001, 0xfffffffd, 0x8, 0x20, 0x6, 0x8ab4, 0x0, 0x9, 0x6, 0xffff, 0x1, 0x21f76a2a, 0x9, 0xfffffff7, 0x0, 0x0, 0x10000, 0x6ba04de3, 0x2, 0x5, 0x59e2, 0x6, 0x4, 0x1000, 0x81, 0x3, 0x129, 0x8000, 0x0, 0xc40b, 0x5, 0x875, 0x2, 0x8, 0x0, 0xfffffffa, 0x1, 0x0, 0x379, 0x2, 0x90, 0xfffffffc, 0x6, 0x0, 0x541, 0x0, 0xbe6, 0xffffff7f, 0xffffff81, 0x6, 0x8001, 0x5, 0x5, 0x2, 0x9, 0x8001, 0x26, 0x0, 0x0, 0x7, 0x3, 0x38dbd1bb, 0x200, 0xffffffff, 0xfffffffd, 0xbb, 0xfecd, 0x100, 0xa9]}, @TCA_POLICE_RESULT={0x8, 0x5, 0x4d2}, @TCA_POLICE_RATE={0x404, 0x2, [0x1, 0x8, 0x0, 0xcdd2, 0xff, 0x0, 0x81, 0xfffffffe, 0x42, 0x5, 0xff, 0x6, 0x5, 0x10001, 0x1, 0xfff, 0x5, 0x7ff, 0x7d, 0x6, 0xa90, 0x4, 0xc2e, 0x2, 0x90, 0x9, 0x7, 0x7, 0x7, 0x8, 0x5a0, 0x8, 0x5, 0x9, 0x1, 0x80000000, 0x6, 0xea52, 0xffffffff, 0xffffde4c, 0x0, 0x3, 0x2, 0xfffffc01, 0x7f, 0x3, 0x1, 0x7f, 0x0, 0x0, 0x9, 0x9, 0x8, 0x4, 0x80, 0x7f, 0x2, 0x5, 0x8, 0x9, 0x7, 0x9, 0x5, 0x40, 0x5, 0x80000001, 0x7, 0x1, 0x7fff, 0x4, 0x8, 0x10001, 0x20, 0x245d, 0x0, 0xfff, 0x10000, 0x401, 0x9a3, 0x101, 0x1, 0x74, 0x63, 0x30, 0x4, 0x6, 0x95, 0xb2, 0xf, 0x9, 0x7, 0x5f, 0xfffffffc, 0x5, 0xfffffff9, 0xffff, 0x10, 0xfbf, 0x9, 0xfff, 0x9, 0x8, 0x8, 0x101, 0x5, 0xffffe051, 0x40, 0x5, 0x3, 0x8, 0x80000001, 0x20, 0x8f83, 0x2, 0x4, 0xbf8, 0x0, 0x0, 0x10000, 0x2, 0x7fffffff, 0x100, 0x800, 0x9c, 0x3, 0x5, 0x0, 0xef83, 0x10000, 0x1, 0x3, 0xfffeffff, 0x1c, 0x3f, 0x6, 0x200, 0x3ff, 0xffff5c95, 0x10001, 0x6, 0x2, 0x4, 0x2, 0xfffffffb, 0xb9, 0x9, 0x6, 0x9, 0x10000, 0x8, 0x80000001, 0x72c99463, 0x10000, 0x9d, 0x8001, 0x40, 0x8001, 0x6, 0x4, 0xffffff45, 0x4, 0x7, 0x101, 0x6, 0x1, 0xaaa, 0xfffffffd, 0xf8, 0xff, 0x26, 0x7, 0x7, 0x100, 0xffffffff, 0x35, 0x1f, 0xcac, 0x10000, 0x0, 0x8, 0x3, 0x6, 0x2, 0x4, 0x6, 0x1, 0x1, 0x200, 0x7, 0xfb60, 0x1, 0x100, 0x800, 0x5, 0x7, 0x9, 0xfffffc00, 0x6, 0xef3b, 0x334, 0x7ff, 0x4, 0x9, 0x81, 0x81, 0xfffffe01, 0x2, 0x7, 0x0, 0x5, 0x7, 0x6, 0x400, 0x0, 0x6, 0x4, 0xf0000000, 0x200000, 0x3, 0x0, 0x500, 0x3, 0x4, 0x6, 0x9, 0x3, 0x100, 0x89, 0x0, 0x8, 0x1000, 0x4, 0xa12e, 0x2, 0xfb6, 0x730c, 0x5, 0x81, 0x7fff, 0x0, 0x9, 0x1, 0x4, 0x1, 0x5, 0x8, 0xfffffffc, 0x3, 0x0, 0xb658, 0x7, 0x0, 0x1ff, 0x7, 0x10000, 0x5]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x200, 0x6, 0x4, 0x2, 0x5, 0x6, 0xfffffe01, 0x0, 0x1000, 0x9ed, 0x6, 0xffff, 0xbd, 0x3, 0x7ff, 0x26, 0x8, 0x7, 0x1, 0x1f, 0x3, 0x8000, 0x6, 0x4, 0x5, 0x3, 0x4, 0x7, 0xc186, 0x6, 0xffff, 0x200, 0xffff, 0x8, 0x9, 0x3, 0x101, 0x20, 0x8, 0x7fffffff, 0x10001, 0x1000, 0x101, 0x37b33245, 0xee, 0x8, 0x2, 0x5, 0x6, 0x5, 0xa11, 0x0, 0xb3, 0x7, 0xffff, 0x4, 0x80, 0x4, 0x6, 0x40, 0x4, 0x2, 0x8001, 0x4, 0x294, 0x9, 0x0, 0x3, 0x2, 0x1, 0x8, 0x1, 0xffff8bf5, 0x7, 0xa43, 0xffff7577, 0x3, 0x6, 0x1, 0x2, 0xfffff001, 0x8001, 0xfffffff8, 0x2, 0x9c, 0x5, 0x0, 0x400, 0x3, 0x20, 0x400, 0x4, 0x5, 0x1000, 0x4, 0x3, 0x1, 0x5, 0x8, 0x2, 0x54, 0x71c29f81, 0xffffff04, 0x7, 0xff, 0x5, 0xa0000000, 0x7fff, 0x9, 0x7, 0x3a2, 0x5d25, 0x2, 0xc8c2, 0x80000001, 0x400, 0x562, 0x40, 0x8, 0x7fff, 0x80000000, 0x2, 0x6, 0x3f, 0x9, 0xffff, 0x10001, 0x401, 0x10000, 0x1, 0x19fa, 0x80000000, 0x0, 0x4, 0xc87, 0x1, 0x0, 0x4, 0x4, 0x5, 0xfffffff7, 0x9, 0x4, 0xffff4dd6, 0xff, 0x8001, 0xb8, 0x28, 0x1, 0x8, 0xffff8000, 0x5a, 0x200, 0xffff, 0x0, 0x7, 0x27, 0x3b50, 0x9, 0x7, 0xc, 0x0, 0x1abc3bce, 0x8, 0x233, 0x7, 0x1a, 0x9, 0x10001, 0x1, 0xc1, 0x4, 0x4, 0x0, 0xb6, 0x3ff, 0x7, 0x6, 0x3, 0x7ff, 0x40, 0x342, 0x0, 0x3ff, 0x0, 0x1, 0x5, 0xc424, 0x2, 0xa8e5, 0x1f, 0x5a17, 0x3, 0x5, 0x80, 0x9, 0x7f, 0x100, 0x9, 0x800, 0x5, 0x2, 0x0, 0x2, 0x4, 0x1, 0x6, 0x0, 0x0, 0x4, 0x2, 0x143a, 0xffffffd4, 0x9, 0x8000, 0x20, 0x76c, 0x6a1, 0x5, 0x100, 0x5, 0x200, 0x40, 0x1, 0x0, 0x4f8a, 0x1, 0x74d, 0x9, 0x8, 0x4, 0x5, 0x1a7, 0x0, 0xffffefdd, 0xfffffffa, 0x8, 0x8, 0x3, 0x3, 0x8, 0x7ff, 0x86, 0xffffff94, 0x9, 0x8, 0x0, 0x6, 0xffff, 0x2, 0x2, 0x10001, 0x9, 0x84c8, 0x1f, 0x9]}], [@TCA_POLICE_RATE={0x404, 0x2, [0x6, 0x10001, 0x2, 0x9, 0x6, 0x80, 0x0, 0x1ff, 0x3, 0xb7c, 0xf7, 0x5, 0x9f49, 0x9, 0x3, 0x800, 0x5871, 0x8cd0, 0x4c160b27, 0x1, 0x2, 0xa47, 0xfffffffb, 0x8000, 0xfffffffd, 0x5, 0x1, 0x2, 0x9b, 0x1ff, 0x5, 0x3ff, 0x0, 0x1f, 0x5, 0x8b, 0x0, 0x8, 0x20, 0x2, 0x4, 0x200, 0xfffffffd, 0x17d7, 0xc6a, 0x7, 0x8, 0x2, 0x4, 0x81, 0x1000, 0x7, 0x3ff800, 0x8c, 0x7fffffff, 0x5, 0x689, 0x3ff, 0x8000, 0x3, 0x1, 0x6, 0x5e10, 0x3, 0x7, 0x22f6, 0x3, 0x81, 0x2, 0x4, 0x3, 0x2, 0x101, 0x2, 0x0, 0x6, 0x0, 0x7, 0xe0f5, 0x400, 0x3, 0x80, 0x101, 0xf3, 0x4, 0x3ff, 0x7, 0x101, 0x6, 0x7, 0x1, 0xffff8001, 0x9, 0x7f, 0x7, 0x1ff, 0x200, 0xb2, 0x8, 0xfffffffc, 0x20, 0xfff, 0x11, 0x836, 0x64a, 0x0, 0xfc0, 0x9, 0x1, 0x8000, 0xe33, 0x7, 0x20, 0x6, 0x3f, 0x1, 0x7, 0x6, 0x0, 0xffffca70, 0x0, 0x6, 0x610, 0x1ff, 0xff, 0x6, 0x4, 0x2, 0x6, 0x0, 0xfffffff9, 0x7ff, 0x9000000, 0x20, 0xda9, 0x8, 0xffffff1e, 0xfffffffb, 0x800, 0x1, 0x0, 0xf46e, 0x8, 0x9, 0xe41, 0x7fffffff, 0x3f, 0x100, 0x2, 0x0, 0xf1, 0x7, 0x7, 0x86df, 0x9, 0x1, 0x167e, 0x3804, 0x0, 0x7, 0x0, 0x4, 0xc5, 0x1, 0x5, 0x2, 0x9, 0x51, 0x5, 0xb0dc, 0x4, 0x10001, 0x9, 0x5, 0x3, 0x1ff, 0xa2, 0x2, 0x61419494, 0x5, 0x100, 0x5, 0x8627, 0xffffffff, 0x8, 0x2, 0x3, 0x8001, 0x1f, 0x2, 0x1, 0x9, 0x0, 0x4, 0x2, 0x6, 0x63ae8a42, 0xa98, 0x8, 0x8, 0x80000001, 0x0, 0x5, 0x7, 0x432, 0xb763, 0x8, 0xabe, 0x3, 0xd605, 0x0, 0x9, 0x40, 0x10000, 0x6, 0x5, 0xfffffffd, 0x7, 0xec1, 0x6, 0x7c3a, 0xd, 0x6, 0xfffeffff, 0x7, 0x9, 0x3, 0x7fff, 0x8, 0x6, 0x2, 0x1, 0x7, 0x40, 0x43f7, 0x8, 0xf1a, 0x9, 0x2, 0x3c51, 0x7, 0x8, 0x3ff, 0x6, 0x3f, 0x3f, 0x9, 0x0, 0x8, 0x5baa, 0x0, 0xffff, 0x5, 0x5, 0x5, 0x2be0]}, @TCA_POLICE_RATE={0x404, 0x2, [0x101, 0x100, 0xffffffff, 0x4, 0x403, 0x6, 0x1f, 0x0, 0x8000, 0x0, 0x7ff, 0x8, 0x400, 0x7, 0x9, 0xef82, 0x7, 0x0, 0x0, 0x5, 0x9b, 0x0, 0x41, 0xec43, 0x9, 0x1f, 0x2, 0x100, 0x9, 0x5, 0x5, 0x1, 0xb5f, 0x270000, 0x6, 0x20, 0x8, 0x3, 0x2, 0x3, 0x5, 0x1, 0xf4e, 0x9, 0x0, 0x765a, 0x4, 0x40, 0x6, 0x3f, 0x1, 0x0, 0x1f, 0xbbd, 0x7, 0x9, 0x200, 0x7fff, 0x1000, 0x3, 0xffff, 0x6, 0xfd, 0x9, 0x8, 0x4, 0xc8000000, 0x3, 0x50000000, 0x40, 0x100, 0x2, 0x81, 0xba6e, 0x3, 0x4, 0x9, 0xff, 0x9, 0x2f, 0x5, 0x8, 0x10000, 0x101, 0xea, 0x7fffffff, 0x9, 0x5e, 0x0, 0x5, 0x8001, 0x3, 0x9, 0xffffffe0, 0x2, 0x1f, 0x3ff, 0x6, 0xef119400, 0x80000001, 0x8000, 0x20, 0xfb, 0x90, 0x3, 0x80, 0x4901, 0x7fffffff, 0x3ff, 0x418e51f, 0x1f, 0x2, 0x3, 0x8, 0x0, 0x0, 0x100, 0x0, 0x7f, 0x6, 0x0, 0xfc, 0xfff, 0xfffffff8, 0x1ff, 0x3, 0x8001, 0x0, 0x10000, 0x2, 0x5, 0x3, 0x7, 0xcf8, 0x80000001, 0x9, 0x6, 0x122d, 0xfffffff8, 0x7f, 0x5c9b, 0x8001, 0x8, 0x6, 0x4, 0x80000001, 0xb4, 0x24, 0x9, 0xd055, 0x1, 0x8, 0x3, 0x4, 0x40, 0x9, 0x10000, 0x40, 0xad, 0x0, 0xbc, 0x5, 0x5d78, 0x10001, 0x80, 0x3, 0x20, 0x7, 0x100, 0x0, 0x1, 0x7, 0xa1, 0x20, 0xfffff4d1, 0xfffffeff, 0x4, 0x7ec, 0x7fff, 0x4, 0xfffffffc, 0xfff, 0x9, 0x5, 0x5, 0x8, 0xffffff7f, 0x5, 0x8, 0x8, 0x6, 0x100, 0x80000001, 0x0, 0x3, 0x7da2, 0x3, 0x1000, 0x5, 0x0, 0x4, 0x3, 0x4, 0x1ff, 0x1acb21e1, 0x1, 0x9, 0xe59, 0xfffffff7, 0xdcd, 0x3cd, 0x1, 0x77c1, 0x2b15, 0xf72, 0x6, 0x400, 0x9, 0x1d, 0xd7, 0x43, 0x7, 0x8000, 0x3f, 0x7fff, 0x6, 0x8, 0x4, 0xf2b, 0x5, 0x8, 0x1, 0x0, 0x6, 0xfff, 0x88, 0x401, 0x6, 0x8, 0x6, 0x5, 0x8, 0x20, 0x4, 0x40, 0xffff6a4c, 0x7f, 0x4c8, 0xffffffff, 0x4, 0x7f, 0x40, 0x4, 0x7, 0x40, 0x3]}], [@TCA_POLICE_AVRATE={0x8, 0x4, 0x1}, @TCA_POLICE_AVRATE={0x8}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x7fffffff}, @TCA_POLICE_TBF={0x3c, 0x1, {0x3, 0x1, 0x4ef, 0x9, 0x7, {0x80, 0x0, 0x7, 0x7, 0x1, 0xb63}, {0x20, 0x3, 0x8, 0x1f, 0x1000, 0x5}, 0x8, 0x9, 0xffffffc0}}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x6}, @TCA_POLICE_TBF={0x3c, 0x1, {0x6, 0x0, 0x3, 0x0, 0x7f, {0x9d, 0x2, 0x1ff, 0x0, 0x1000, 0x814f}, {0x7, 0x1, 0x7, 0xff, 0xffff, 0x401}, 0x5, 0x0, 0x800}}], [@TCA_POLICE_TBF={0x3c, 0x1, {0xff, 0x10000000, 0x1f, 0xfff, 0x2, {0x0, 0x1, 0x20, 0xde, 0x200}, {0x87, 0x2, 0x81, 0x1ff, 0x6, 0x4}, 0x7, 0x0, 0xf0}}], [@TCA_POLICE_RATE64={0xc, 0x8, 0x100000001}, @TCA_POLICE_RATE={0x404, 0x2, [0x8, 0x400, 0x7f, 0x9, 0x8803, 0x0, 0xcc0, 0x509, 0x5, 0x20, 0x101, 0x8cf, 0x80000001, 0x0, 0x80000000, 0x1, 0x980a, 0x3, 0x4, 0xffff, 0x7, 0x5f8a, 0x0, 0x8ce4, 0x82, 0x3981, 0x6, 0x2, 0x6, 0x7, 0x1, 0x3, 0x1, 0x10000, 0x2d, 0x5, 0xffff, 0x0, 0xd9, 0x8, 0x9, 0xfffffffe, 0xfffffffe, 0x1, 0x9, 0x74685fcb, 0x4, 0x7, 0x100, 0x7, 0x6, 0x5, 0xf2, 0x4, 0xffff, 0x80000001, 0x9, 0x1, 0x7, 0x9, 0x800, 0x3, 0x6, 0x5, 0x1, 0x7, 0x1, 0x40, 0xffffc497, 0xf2, 0x40, 0x66, 0x400, 0x8001, 0xb7, 0x80, 0xbbf01f3, 0x800, 0x1, 0x9, 0x97f, 0x8, 0xfffffc00, 0x161, 0xca9d, 0x1, 0xca, 0x7, 0x9, 0x3f, 0x4, 0xb14, 0x65, 0x1, 0x400, 0x5, 0x9, 0x1, 0x2, 0x7fff, 0x9, 0x80000001, 0x6, 0x1, 0x5, 0x8, 0x1000, 0x8, 0x5, 0x7, 0x8, 0x5, 0xfffffffa, 0x200, 0xb796, 0x9, 0x20, 0x0, 0x89e, 0x40, 0x0, 0xfffff4f6, 0xffffa1a4, 0x5, 0x3, 0x8, 0x3ff, 0x100, 0x1, 0x1, 0x0, 0x0, 0x9, 0x8, 0x100, 0x6, 0xff, 0x6, 0xfffff000, 0x6, 0x2, 0x0, 0x7, 0x4, 0xfa5, 0x1, 0x2, 0x0, 0x8, 0x5, 0x7, 0x100, 0x10001, 0x40, 0x10001, 0x8, 0x1, 0x8, 0x80000001, 0x8001, 0x8, 0x1, 0x8, 0x9bde, 0x95, 0x3, 0x8, 0x5, 0x81, 0x100, 0x5, 0x7fffffff, 0x100, 0x9, 0xfffffc01, 0x0, 0x1, 0x6, 0x4, 0x40, 0xfffeffff, 0x3, 0x200, 0x2, 0x3, 0x3, 0x8, 0x3, 0x3, 0x8, 0x40, 0x7d9, 0x8001, 0x3, 0x1, 0x7, 0x0, 0x4, 0x800, 0x0, 0x800, 0x3, 0x2, 0x8, 0x6, 0xa0c6, 0x8, 0x3, 0x5, 0x1f, 0x2, 0xfffffff9, 0x8, 0x1, 0xffff, 0x3ff, 0x1ff, 0x7fc00000, 0x7, 0x6, 0x0, 0x8, 0x6, 0x0, 0x9, 0xb707, 0x2, 0x5, 0xffffffff, 0x9, 0x3, 0x1, 0x1, 0x3, 0x7, 0x2, 0x3, 0x7fff, 0x76d, 0x7, 0x92df, 0x4, 0x10000, 0x6, 0x3ff, 0x7, 0x5, 0x2, 0x2, 0xfffffffd, 0x14000, 0x5, 0x6f98, 0x6041, 0x5, 0x200]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x81}, @TCA_POLICE_RESULT={0x8, 0x5, 0x4}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x1, 0x80000001, 0x8000, 0xfffffffc, 0x4, 0x6, 0x10001, 0xff, 0x8, 0xc8, 0x631, 0x1, 0x9, 0x0, 0x28e, 0x9, 0xfffffffd, 0x3ff, 0x0, 0x5, 0x5, 0x3, 0x8, 0x6, 0x3, 0xae, 0x5, 0x3, 0x1ff, 0x3a22, 0x4, 0x8e4, 0x3, 0xfab1, 0xdb8e, 0x81, 0xe4, 0xffffb140, 0x0, 0x2, 0x8, 0xec, 0xffff7fff, 0x8, 0x8, 0x9, 0x8, 0x0, 0x2, 0x98a6, 0x200, 0x4, 0x80000000, 0x0, 0x7, 0x7, 0x400, 0xc8, 0x7, 0x75, 0x800, 0xffffffff, 0x4, 0x1000, 0x3f, 0x8000, 0x7f, 0x9, 0x8, 0x7fff, 0xc4b, 0xffc00000, 0x3, 0xffff0001, 0xfff, 0xb4d, 0x7, 0xa41, 0x4, 0x3, 0x583b, 0x800, 0x2, 0x0, 0x9, 0x45a, 0x8, 0xa54, 0x9, 0x5, 0x7, 0x101, 0xffffffff, 0xfffffff7, 0x2, 0xbc, 0x2, 0x3ff, 0x5, 0x0, 0xfffffffd, 0x6, 0xffff0000, 0x6, 0xffffab8f, 0x3, 0x200, 0xff, 0x7, 0x9, 0x0, 0xfffffffa, 0x0, 0xffffffff, 0x5, 0x7ff, 0x9, 0x6, 0x4cd, 0x3, 0xffffffff, 0x6, 0x10001, 0x4, 0x620d, 0x8, 0x42df, 0x5, 0x2, 0x20, 0x1, 0x4, 0x3, 0x8, 0x16c4, 0x3, 0x9, 0x1ff, 0x73, 0x7, 0x80000001, 0xfffff870, 0x8000, 0x6, 0xfffffffb, 0x400, 0x1, 0x515adb71, 0x7a, 0x7, 0x9, 0x400, 0xb40000, 0x200, 0x101, 0x5, 0xf3, 0x3e, 0xfffffffa, 0x3, 0x7, 0xc000, 0x7fff, 0x7, 0x5, 0x400, 0x20, 0x6, 0x101, 0x1, 0x62, 0x1, 0x7d, 0x7a, 0x7ff, 0x53, 0x5, 0x10001, 0x35, 0x8f, 0x12, 0x3f, 0x4, 0xff, 0x7, 0x3ff, 0xffffffc0, 0x5, 0x7fffffff, 0x1, 0x8, 0x7, 0x5a0, 0x8, 0x0, 0x54, 0x38000, 0x1f, 0x9, 0x4, 0x3, 0x0, 0x7fff, 0x4, 0xd2c1, 0x0, 0x88c, 0x6, 0x6, 0x400, 0x84, 0x4, 0xa14, 0x9, 0x7, 0x22, 0x6, 0x70, 0x10000, 0x7ff, 0xfff, 0x8, 0xfffffffa, 0xe2b, 0x6c, 0x86, 0x6, 0x8, 0x6, 0x4, 0x1, 0x98, 0x3, 0x8, 0x10001, 0x8001, 0x9, 0x8, 0xffffffff, 0x3f, 0x3ff, 0x5, 0x4, 0x80, 0x9f, 0x5f, 0xfffffffb, 0x5, 0xea, 0x6, 0x3f, 0x0, 0xca1a, 0x8, 0xfffffffe, 0xfffffff9]}], [@TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x800}]]}, {0xa8, 0x6, "570c95530bae46bfdbb118da92a9df33d58476c6e261fee1fa1977708d0f375aab97f7e96fda85b2ac983dc46fa5bda910eeff8ab6de926daf083a4f65aba1305867fd7e5f589853a6c2490bb15ab2710f1ad085f57b85337b7c2481025c30cfa68038f2f164434c9103ba06145e1424e9806b817074d7a332f0153d08e3fc925568311c0cc0ce78c95b960d338028227c16909eeba568efcd26d39eedc07662231178db"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_police={0x1db0, 0x15, 0x0, 0x0, {{0xb, 0x1, 'police\x00'}, {0x1d24, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x3}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x9de3}], [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x3, 0x401, 0x2, 0x9, 0x2, 0x27, 0xc3, 0x8, 0x653e, 0xffff, 0x7, 0x7, 0x6, 0xfb5f, 0x3, 0xffffffff, 0x1000, 0xf2ae, 0x1, 0x7fff, 0xffff0001, 0x57c6e66a, 0x2400, 0x2f8, 0x2, 0x100, 0x4, 0x10000, 0x6, 0xfffffffd, 0x8, 0x9, 0x2, 0xffffff44, 0xffff, 0x1, 0x63c, 0x800, 0x4, 0xfff, 0x5a223ff9, 0x1, 0x5, 0x3, 0xff, 0x2000, 0x635, 0x800, 0x0, 0x1, 0xeb0f, 0x1, 0x401, 0x7fff, 0x0, 0x3, 0x1, 0x7, 0x4, 0x3c, 0x80, 0x7f, 0x10000, 0x1, 0x85e8, 0x7, 0x8001, 0x3, 0xedc, 0x7, 0x8451, 0x1ff, 0x3, 0xff, 0x4, 0xb71d, 0x6, 0x8, 0x0, 0x21, 0x401, 0x3ff, 0x3, 0x4, 0x0, 0x80000001, 0x80000000, 0x100, 0x7, 0x4ea5, 0x6, 0x6, 0x8001, 0x8, 0x5, 0x5, 0x1, 0x8, 0x1000, 0xfffffffb, 0x2, 0x100, 0xff, 0x40, 0xe02, 0x80, 0x80, 0xfffffffa, 0x6, 0x0, 0x3, 0x20, 0x5, 0x6, 0xd4eb, 0x5, 0x1, 0xdc, 0x60, 0x2, 0x2a, 0x1, 0x6, 0xffffff7f, 0x3, 0x400, 0x100, 0x100, 0x8, 0x80000001, 0x720, 0x5, 0x5, 0x40, 0x80000001, 0x5, 0x1, 0x1, 0x2, 0x3, 0xfffffffe, 0xffff, 0x5, 0x1, 0x2, 0x2, 0x4, 0x10001, 0x3, 0x8, 0x562f, 0x1, 0x800, 0x20, 0x8, 0x5, 0x4, 0x77, 0x0, 0x4, 0x4, 0x3, 0xa2, 0x8001, 0x3, 0x7, 0x8, 0x15, 0x1c000, 0x0, 0x7, 0x4d, 0x3, 0x65, 0x1, 0x3, 0x7ff, 0x1, 0xe54f, 0x3, 0x61a8, 0x3, 0x9, 0x0, 0x7, 0x5, 0x8f1b, 0x3, 0x0, 0x3f, 0x5, 0x9, 0x8000, 0x6, 0x1f, 0x20, 0x34b, 0x2, 0x80000001, 0x0, 0x80000000, 0x3, 0x0, 0x6, 0x98f, 0x4, 0x4, 0x80, 0xea, 0x1f, 0x4, 0x1f, 0x80, 0x2, 0x347, 0x1, 0xd4a, 0x8, 0xfffffbff, 0x8c, 0x7, 0x10000, 0xfff, 0x9, 0x2, 0x8, 0x9, 0x3, 0x5, 0x3, 0xffffff56, 0x7ff, 0x1, 0x6, 0x6, 0x0, 0xfffffffd, 0x81, 0x101, 0x8, 0xc49, 0xed, 0x800, 0x6, 0x10000, 0x6, 0xffff, 0x100, 0x80000000, 0x1, 0x9, 0x4, 0x2ffa1e80, 0xb5a, 0x2, 0x4]}, @TCA_POLICE_RATE={0x404, 0x2, [0x1, 0x6, 0x7, 0x81, 0x200, 0x2, 0x9, 0xff, 0x4, 0x7f, 0x6, 0x100, 0x200, 0xc717, 0xfffffff8, 0x5, 0x400, 0x8, 0x2, 0x0, 0x101, 0x7, 0x10000, 0x0, 0x0, 0x10000, 0x400, 0x8, 0x7, 0x9, 0x100, 0x3, 0x8001, 0x401, 0xffff8001, 0x7, 0x0, 0x3d, 0x2, 0x2, 0x3, 0x7, 0x3ff, 0x1, 0x2, 0x1000, 0x4, 0x7908, 0x5, 0x0, 0x8, 0x7f, 0x7fffffff, 0x10000, 0x80000001, 0x8, 0x101, 0x0, 0x3, 0xffffffff, 0xffffff22, 0x7fffffff, 0xffffffff, 0x10000, 0x4241, 0x7, 0x6, 0x9ed, 0x7, 0x8, 0x9, 0x5b2, 0x3f, 0xfffffffa, 0x400, 0x96, 0x0, 0x7, 0x9, 0x1ff, 0xda6, 0x1ff, 0x6, 0x6162, 0x3, 0x200, 0x40, 0x2, 0x8, 0x0, 0x5, 0x7, 0x1, 0x10000, 0x3f, 0x8000, 0x2, 0x3, 0x200, 0x8, 0xfff, 0x9, 0xc7d1, 0x7cb3, 0x5, 0x100, 0x9, 0x4, 0x9, 0x3, 0x6, 0x401, 0x3, 0x7, 0x80, 0x6, 0x81, 0x3, 0x1, 0x9, 0x8001, 0xf81, 0x0, 0x7fffffff, 0x1, 0x8, 0x6, 0x2, 0x7fffffff, 0x401, 0x0, 0xff, 0xfffffff7, 0x8000, 0x7, 0x1, 0x2, 0x81, 0x6, 0x7, 0x0, 0x3, 0x7ff, 0x9000, 0x6, 0xfff, 0x9, 0x7, 0x9, 0x4, 0xfffffff9, 0x0, 0x1, 0xfffffffc, 0x4, 0x5, 0x5, 0x9, 0xbcea, 0xb4, 0x0, 0x1, 0x9, 0x0, 0xff, 0x2, 0x8, 0x6, 0xfff, 0x6d87, 0x7fff, 0xfff, 0x7, 0xe78, 0x40, 0x9, 0x6, 0x27, 0x9c, 0x20, 0x1f, 0x7, 0x5, 0x2, 0x4, 0x0, 0x1, 0x4, 0x8c3, 0x80, 0xf24, 0xffffffff, 0x2, 0xfb, 0x3, 0x9, 0x4, 0x5e, 0x400, 0xa0, 0x1, 0x8001, 0x400, 0x10001, 0x7, 0x8, 0xffffffff, 0x8, 0x8, 0x3, 0x3f, 0x7fffffff, 0x10000, 0x4, 0xfffffffc, 0x0, 0x800, 0xffffffff, 0x0, 0x1, 0xdc, 0x8, 0x80, 0x8, 0x6, 0x8, 0x0, 0x4, 0x3ff, 0x65, 0x80000000, 0x6, 0x56, 0x5, 0x8, 0x7, 0x31b3ab2f, 0x9, 0x401, 0x40, 0x1, 0x0, 0x9, 0x6, 0x81, 0xfffffff9, 0x100, 0x9b80, 0x4, 0x9, 0x8, 0x1, 0x8, 0x38, 0xaf]}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x6}, @TCA_POLICE_RATE={0x404, 0x2, [0xfffffff7, 0x101, 0xfff, 0x1, 0x7, 0x8, 0x8000, 0x0, 0x6ef99360, 0x10001, 0x7, 0x80000001, 0x7, 0x4bdc2325, 0x3, 0xa2ee, 0x2, 0x2, 0x0, 0x3ff, 0xb4, 0xf72, 0x4, 0x3, 0x7f, 0x3f, 0x80000001, 0x4, 0x3c3, 0x9, 0x100, 0x80000000, 0x800, 0x6, 0x2, 0x4, 0x8, 0x4, 0x0, 0x1, 0x7ff, 0x7f, 0x6, 0x9, 0x80000001, 0x5, 0x401, 0x8, 0xffff0001, 0x401, 0x8, 0x0, 0x7978, 0x0, 0x3ff, 0x83, 0x3, 0x2, 0x448, 0xfffffff9, 0x1, 0x8, 0x4, 0x1, 0x5, 0x6, 0x8001, 0x2, 0x0, 0x10001, 0x0, 0x81, 0x5, 0x7fffffff, 0x0, 0x6, 0x7ff, 0x95, 0xe1a, 0xfffff801, 0x9, 0x14, 0x2, 0x4, 0x5e8a4f4f, 0xda, 0x80000001, 0x4, 0xfffff771, 0xfffffffa, 0x3f, 0x2, 0xffff0000, 0x2, 0x3, 0x1, 0x0, 0xffffffff, 0x7, 0xfffffff8, 0xbffa, 0x0, 0x9, 0x5, 0x1000, 0x2, 0x8135, 0x0, 0xb18, 0xff, 0x4, 0x7fff, 0x8001, 0x469, 0x8, 0x1, 0x8, 0x10001, 0x8, 0x9, 0x3, 0x4, 0xb52700, 0x81, 0x80000001, 0x5, 0x7d58, 0x80000000, 0x0, 0x7, 0x26d3, 0x7, 0x6, 0x128, 0x3a3, 0x200, 0x1, 0x4, 0xb7, 0x2, 0x49ed, 0x76c6734f, 0x800, 0x1, 0x6, 0xc8a2, 0xa2f, 0x5, 0x9, 0x7, 0xff, 0x8, 0x8, 0xfffffffa, 0x5, 0x20, 0x5, 0x8000, 0x5c, 0x9, 0x0, 0x9, 0x100, 0x0, 0x80000000, 0x0, 0x5, 0x80000001, 0x7, 0x1, 0x3f, 0xfffffffb, 0x1, 0x2, 0xfffffffc, 0x8, 0x4, 0x700000, 0x1000, 0x5, 0x0, 0x1, 0x4, 0x23, 0xf6f, 0x6, 0x7ff, 0x9, 0xfffffff9, 0x4, 0xfffffa0b, 0x101, 0x8, 0x7, 0xa6, 0x0, 0x2, 0x6, 0xffff, 0x8, 0xfff, 0x3, 0x20, 0x2, 0x9, 0x2, 0x6, 0x0, 0x1, 0x8000, 0x77, 0x0, 0x276b, 0xe6ec, 0x9, 0x5, 0x0, 0x2, 0x11, 0x0, 0x7, 0x2, 0x1, 0x10001, 0x0, 0x100, 0x1, 0xffffffff, 0x0, 0xa1c, 0x80, 0x5, 0x1, 0x4, 0x0, 0x100, 0x1f, 0x0, 0xfffffff7, 0x7fffffff, 0x3, 0x0, 0x3, 0x4, 0x20, 0x5, 0x9, 0x5, 0x7, 0x6, 0x0, 0x1, 0x6, 0x7ff, 0x2, 0xffffffe0]}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x533}, @TCA_POLICE_RATE64={0xc}, @TCA_POLICE_RATE64={0xc, 0x8, 0x400}, @TCA_POLICE_RATE={0x404, 0x2, [0x6, 0x5, 0x8, 0x6, 0x3, 0x7fffffff, 0x0, 0x9, 0xdc, 0x0, 0x0, 0xfffffffa, 0x314, 0x5, 0x0, 0x2, 0x1000, 0x7, 0x10000, 0x7fff, 0x4, 0x9, 0x4, 0x7, 0x7fff, 0x1000, 0x10000, 0x5, 0x0, 0x2, 0x4, 0x9, 0x3, 0x1, 0x3, 0x7, 0x5, 0x0, 0x7f, 0x3, 0x2, 0xfa9, 0x3, 0x0, 0x9, 0x100, 0x0, 0x20, 0x9102, 0x80000000, 0x1ff, 0x1, 0x1000, 0x80, 0xfff, 0x2, 0x8c9, 0x101, 0x7, 0x8, 0x101, 0x8, 0x737, 0x2be6, 0x74cda159, 0x287, 0x80000001, 0xfffffffe, 0x4, 0x3, 0x0, 0x2, 0x0, 0x400, 0x3584, 0x830, 0x6, 0x2, 0x1, 0x9, 0x7, 0xb11, 0x3, 0x200, 0x6, 0x9, 0x3ff, 0x5, 0x20, 0x1, 0xffffff01, 0x1, 0x5, 0x741e5181, 0xffffffff, 0x8, 0x2, 0x4, 0x5, 0x8001, 0x6, 0x1, 0x2, 0x3de, 0x5, 0x3c, 0x800, 0xfffffff9, 0x1400000, 0x0, 0x80, 0x1, 0x6a, 0x8, 0x7fff, 0x8, 0x5, 0x2b5, 0x7, 0x5, 0x4, 0x0, 0x0, 0x5, 0x9, 0x0, 0x1, 0xffff, 0xfff, 0x80000001, 0x9, 0xffff8000, 0xfffffffd, 0x200, 0x400, 0x1, 0x0, 0x5, 0xff, 0xfff, 0x10000, 0x0, 0x101, 0x2, 0x1, 0x4, 0x4, 0x3, 0x8001, 0x3, 0x2, 0x4, 0x1, 0x0, 0xa6, 0x8, 0x10000, 0x7, 0x1, 0x3, 0x6, 0x6, 0x80000000, 0x4, 0x396, 0x7fffffff, 0x80000000, 0x1, 0x7fff, 0x6, 0x0, 0x80, 0x1, 0x4cb, 0xcb2b, 0x5, 0xbf6c, 0x7ff, 0x8000, 0x3, 0x200, 0x1, 0xff, 0x5, 0x3, 0x101, 0x6, 0x6ac, 0x9, 0xcc30, 0x81, 0x7fff, 0xfffffffb, 0xcf78, 0x2, 0xf02, 0x0, 0x6, 0x7ff, 0xed, 0x20, 0x1, 0xde, 0xbfd, 0x0, 0xf334, 0x4, 0x4, 0x4, 0x4, 0xf8f, 0x7fffffff, 0x0, 0x1, 0x6, 0x40, 0x9, 0x3c5, 0xb900, 0xfffff4cf, 0x0, 0x2, 0x5, 0x6, 0x10001, 0x40, 0xbe16, 0x81, 0x5, 0x6, 0x81, 0x7fff, 0xea, 0xfffffff9, 0x8, 0x7, 0x6, 0x1, 0xff, 0x0, 0x2, 0x5, 0x8, 0x6, 0xffffff00, 0x0, 0xb8, 0x9, 0x8, 0x5, 0x2, 0x8, 0x200, 0x7, 0x8, 0x3]}, @TCA_POLICE_RATE64={0xc, 0x8, 0x8}, @TCA_POLICE_RATE={0x404, 0x2, [0x6c0a, 0x0, 0x8000, 0x400, 0x7ff, 0x80000001, 0x5, 0x8001, 0xbc, 0x2, 0x1, 0x4, 0x36882049, 0x0, 0x401, 0x4, 0x2, 0x4, 0x2, 0x2, 0xa, 0x8001, 0x200, 0xf15, 0x3, 0x40, 0x3, 0x6, 0x2ef8, 0x3, 0x20, 0x1ff, 0xfffffa15, 0x3, 0xc3, 0x9, 0x7ff, 0x81, 0x6ca, 0x3, 0x50, 0x5, 0x2, 0xfffffffc, 0x9, 0x7, 0x7f, 0x3ff, 0xffffffff, 0x6, 0xfffff801, 0x9a71, 0x80000000, 0x3, 0x2, 0x0, 0x100, 0x7fffffff, 0x3, 0x2, 0x9, 0x3, 0x8001, 0x0, 0x0, 0x8, 0xb2, 0x1, 0x7, 0x1, 0x5, 0x3, 0x2, 0x73, 0x8000, 0x4, 0x3, 0xfffffffd, 0x0, 0x5, 0x2, 0xfffffffd, 0x7fffffff, 0x2, 0x1, 0xe1d, 0x10000, 0x67f7, 0x8, 0x8, 0x6, 0x8, 0x80, 0x2f9, 0x0, 0x4, 0x7, 0x10001, 0x0, 0x5, 0x40, 0x7fff, 0x6, 0x9, 0xff, 0x7, 0x1, 0x1, 0x80, 0x3, 0x1, 0x4, 0x80, 0x800, 0x1000, 0x3ff, 0x9, 0x100, 0x10001, 0x8, 0x401, 0xfffff168, 0x7fffffff, 0x1, 0x15d, 0x6, 0x40, 0xfe, 0x1, 0x80000000, 0x7e6c, 0x3, 0x7358, 0x81, 0x4, 0x800, 0x6, 0x10001, 0x8, 0x1, 0x800, 0x2, 0x0, 0x3, 0x39, 0x80, 0x7f, 0xfffffffb, 0x7a7cdadd, 0x9, 0x0, 0xfff, 0x140, 0x5, 0x200, 0x7, 0x9, 0x34, 0x4, 0x800, 0x10000, 0x400, 0x4, 0x7ff, 0x1, 0x1, 0x47, 0xc, 0xcfb6, 0x10000, 0x6, 0x2, 0xfffffffb, 0x4, 0x0, 0x20, 0xc8, 0x3ff, 0x7, 0x1, 0x3, 0x1, 0x2, 0xfffffe00, 0x1, 0x40, 0x7fffffff, 0x7ff, 0xe88, 0x5, 0x2, 0x4162, 0x3, 0x4, 0xca, 0x2, 0x1, 0xfffffffc, 0x1, 0x0, 0x478, 0x8, 0x5, 0x1c2, 0x1, 0x1a, 0xfffffff9, 0x80, 0x5, 0x83b, 0xb2ac0000, 0x7f, 0xfffffffe, 0xd5, 0x6, 0x6, 0x4, 0x94, 0x3, 0x4, 0x9, 0x200, 0x9, 0x8, 0x3f, 0x10000, 0x7fffffff, 0x86d, 0x5f11, 0x8001, 0x10001, 0x0, 0x6, 0x7f, 0x0, 0x5, 0x1, 0x7f, 0x6, 0x7fffffff, 0x10001, 0x8000, 0x7d0, 0x0, 0x9, 0x97c, 0x5, 0x5, 0x20, 0x8df5, 0xe79, 0x363, 0x2, 0xdd, 0x2, 0x80]}], [@TCA_POLICE_AVRATE={0x8, 0x4, 0x9}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x6, 0x1, 0x77, 0x51fa1573, 0x900000, 0x6, 0x1a72, 0x5, 0x41d, 0x40, 0x3, 0x9, 0x3, 0x44, 0x80000000, 0x3, 0x100, 0x97, 0x2, 0x81, 0x9, 0x4, 0x6, 0x1f, 0x9c, 0xfffffffc, 0x6, 0x9b4, 0x101, 0x1000, 0x8, 0x3, 0xc9, 0x5, 0x1, 0x2e3, 0xc9c, 0x4, 0x1, 0x9, 0xffffffe0, 0x411, 0xff, 0x80, 0xf5, 0x9, 0x4, 0x6, 0x4, 0x80000000, 0x8, 0x9, 0x401, 0x8, 0x1, 0x2, 0x1, 0x1, 0x1, 0x466, 0x40, 0x80000001, 0x9, 0xffffff25, 0x0, 0x2, 0x182, 0x7f, 0x9, 0x1, 0x7a, 0x1, 0x1, 0x2, 0x7f, 0x7ff, 0x4, 0x2, 0x8, 0x1, 0x1000, 0xf0b, 0x1, 0x6, 0x1000, 0x874, 0xffffff51, 0x8, 0xffff1238, 0x0, 0x0, 0x7fffffff, 0x7a8, 0x8, 0x5, 0xf63, 0x0, 0x401, 0x6, 0x1, 0x2, 0x86, 0x8, 0x0, 0x400, 0x1ff, 0xb103a11, 0x7, 0x1, 0x9b2, 0x4, 0x401, 0x6, 0x5, 0xfffffc00, 0x2, 0x5, 0x2, 0x3, 0x40, 0x15, 0x800, 0x1, 0x9, 0x1, 0x40, 0x5, 0x6, 0x80000001, 0x17, 0x5, 0x3, 0xbdfa, 0x7, 0x5, 0xca65, 0xffffffff, 0x1, 0x7, 0x9000, 0x4, 0x0, 0x625, 0x40, 0x5, 0x7, 0x8, 0x81, 0x8, 0x38c, 0x8000, 0x7, 0x200, 0x10000, 0x8, 0x4, 0x7, 0x0, 0x9, 0x6, 0x1000, 0x7fff, 0xd2ea, 0xffffffff, 0x30c3, 0x9, 0x7, 0x7, 0x9a, 0x4, 0x3, 0x0, 0x8, 0x6, 0x9, 0x3, 0xffff, 0x8, 0x372, 0x9, 0x2, 0x6, 0x4, 0xfffffff7, 0x2, 0x605, 0xa8c2, 0xffffb619, 0x7, 0xfb, 0x80000000, 0x1000, 0x4, 0x3, 0x2, 0x800, 0x4, 0x8, 0x7, 0x0, 0x81, 0x2, 0x80000000, 0x57, 0xfffffffd, 0x400, 0x3ff, 0x6, 0x7, 0x9, 0x8, 0x4ad7, 0x4, 0x4, 0xd47f, 0x7, 0x1af0f74e, 0x6, 0xead8, 0x1000, 0x1, 0x3, 0xfff, 0x4, 0xffff4bd1, 0x10001, 0x8, 0x1, 0x9, 0x9, 0x7, 0x1, 0x8, 0x3ff, 0x6, 0x5, 0x3, 0x8, 0x5, 0x80, 0x7, 0x63, 0x7, 0x4, 0x7, 0x200, 0x7fffffff, 0x7, 0x4, 0x1, 0x4e, 0xfffffffa, 0x1, 0x218, 0xffffffff, 0xfffff001]}, @TCA_POLICE_RESULT={0x8, 0x5, 0x6}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x7f}, @TCA_POLICE_AVRATE={0x8, 0x4, 0xdec8}, @TCA_POLICE_RESULT={0x8, 0x5, 0x7}, @TCA_POLICE_TBF={0x3c, 0x1, {0x3f, 0x3, 0x6, 0xfffffff7, 0xc93, {0x9, 0x1, 0x5, 0x5, 0x80, 0x5}, {0x6, 0x2, 0x7, 0x4, 0x7, 0xfff}, 0x9, 0x5, 0x9}}, @TCA_POLICE_RESULT={0x8, 0x5, 0x1}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x8, 0x7, 0xfffffffa, 0x9, 0xfffffffd, 0x8, 0x101, 0x6, 0x1, 0xffffffff, 0x2, 0x5, 0x6, 0x1f, 0x8, 0x8, 0x80000000, 0x3, 0x6, 0x401, 0x8, 0x3f, 0x4, 0x7, 0x5, 0x3, 0x6a38, 0x8, 0x3, 0x7ff, 0x79, 0x8000, 0x8, 0x8, 0x7, 0x2, 0x0, 0xfffffffc, 0x4f2, 0x3, 0x8, 0x7f, 0x2, 0xfffffffc, 0xfffffff8, 0x1, 0x3, 0x1, 0x0, 0x848, 0x8, 0x2, 0x81, 0x4, 0x1000, 0x2, 0x6, 0x6, 0x4, 0x100, 0x80000000, 0x0, 0x0, 0x9, 0x16, 0x1, 0x3, 0x2, 0x2, 0x10000, 0x7ff, 0x3ff, 0x1df9, 0x8, 0x4, 0x1, 0xd92, 0x9, 0x2, 0x8, 0x800, 0x8, 0xa0, 0x1, 0x4, 0x8000, 0x20, 0x6, 0x300, 0x1, 0xffff, 0x4, 0x7fffffff, 0x4d2, 0x0, 0x100, 0xf1, 0x9, 0x0, 0x1, 0x8, 0x9, 0x4, 0x2, 0x1, 0x3, 0xf725, 0x78e, 0x1000, 0x80000000, 0x8001, 0x5, 0x79, 0x1, 0x2, 0x4, 0x0, 0x0, 0x5, 0x3, 0x7, 0x2, 0x6, 0x401, 0x5, 0x9, 0xffff, 0x6, 0x1, 0x7, 0x7, 0x10000, 0x4, 0xfffff43f, 0x10001, 0x6, 0x6350f652, 0x2, 0x8, 0x2, 0x1000, 0x5, 0x1, 0x1fc4, 0x3, 0x101, 0x8000, 0x0, 0x598, 0x1, 0x8, 0xcac, 0x3f, 0x0, 0x5, 0x41c1, 0x8, 0x1, 0x1, 0x401, 0x7, 0x401, 0x5, 0xbf, 0x7, 0x1, 0x8, 0xfffffc01, 0xffffffe3, 0x800, 0x3, 0x3, 0x1, 0x6, 0x1f, 0x0, 0xfffffffd, 0xfffffb49, 0x5, 0x3, 0x20, 0x100, 0x80000001, 0xb4c, 0x9, 0x2, 0x5, 0x5, 0x0, 0x8000, 0x8, 0x8000, 0x4, 0x8000, 0x43b3d344, 0x3, 0x1, 0x6, 0x0, 0x2, 0x8d, 0x0, 0x22ec57f0, 0x0, 0x10000, 0x5, 0xf8, 0x7fa, 0x3, 0x3, 0x1, 0x6, 0x8, 0x9, 0x370, 0x1ff, 0x7, 0x2, 0xff, 0x8, 0xd6, 0x7, 0x0, 0x5, 0x4, 0x3, 0x1, 0x4, 0xbfe, 0x1, 0x7fffffff, 0x401, 0x42, 0x623, 0x81, 0x660, 0x8001, 0x88cb, 0x7, 0x80000001, 0x20, 0x3, 0x9, 0x3, 0x5, 0x7, 0x5, 0x1, 0x7, 0x7, 0x4, 0x1, 0x5, 0x6, 0x1000]}], [@TCA_POLICE_RESULT={0x8, 0x5, 0xcf50}, @TCA_POLICE_TBF={0x3c, 0x1, {0x3ff, 0x4c668ca6fa9e0c84, 0x1, 0x0, 0x9, {0x3, 0x2, 0xec7, 0x20}, {0x8, 0x2, 0x0, 0x20, 0x9, 0xffffffff}, 0x0, 0x9, 0x1}}]]}, {0x62, 0x6, "2ceff93e3f93ae494d324134a85051e987331a69e7e6ea4a277eff8e771b76687395361fceef6b1a23b41f0ecde8b6af273a4ba4e05ac28524aa2b08470f2c227c0c0f86a7580a498d85d06e853abe22be525a3c4f53f697663585e9e75f"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2}}}}]}, @TCA_FLOW_DIVISOR={0x8, 0x8, 0x2}, @TCA_FLOW_XOR={0x8}]}}]}, 0x44a4}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee00) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000540)=@delpolicy={0x31c, 0x14, 0x100, 0x70bd26, 0x25dfdbfc, {{@in6=@dev={0xfe, 0x80, [], 0x3c}, @in=@rand_addr=0x64010101, 0x4e24, 0x0, 0x4e24, 0x1, 0xa, 0x80, 0x80, 0x16, 0x0, r3}, 0x6e6bbd}, [@coaddr={0x14, 0xe, @in6=@private0}, @tfcpad={0x8, 0x16, 0x7ff}, @srcaddr={0x14, 0xd, @in=@remote}, @replay_esn_val={0x24, 0x17, {0x2, 0x70bd29, 0x70bd2a, 0x70bd27, 0x70bd2d, 0x1, [0x6, 0x2e]}}, @replay_val={0x10, 0xa, {0x70bd2b, 0x70bd26, 0x40}}, @lifetime_val={0x24, 0x9, {0x8000, 0x805f, 0x7, 0xa0}}, @algo_auth={0xca, 0x1, {{'blake2s-224-x86\x00'}, 0x410, "d6fa585bc141e283f48405cbe31e6d43a0ab8def46d099a2eb60d15719b4a1215b821aaa7ece27a1f87e6efaf9358c0a11a66f238cefc2231c5af4a24f6ce0d952940b9149d01deb7778b918cbc518399e1a2ae4191299bbe8e2daa4818c4081a34def21f0789408b2cd0fcad4c5bfa3f407cc3d90d96db3b77fecf24cd2829f95ed"}}, @algo_auth={0xc2, 0x1, {{'blake2s-224-generic\x00'}, 0x3d0, "e129bdb6afb91b1eeef34b351ce15fbd117ac3fd6a857d5b8843a0fab38327a81453298e434fe4601c1c6f5c6ea76e7ed5b04df2f1447c17d7d454ea7e20421fb4b010c9a62b43208e07daef8d9563ede7754d00effbd4eb2c4710809f9ea00d7f4a4b4125ad55db243e5e0a3b7345026446111e9934297aad23"}}, @algo_auth={0xb4, 0x1, {{'sha3-256\x00'}, 0x360, "a0a0a2cc9658f2fb00bff695948c7a4642f3632f86825364651718f60242d418d9855be355b51f1000d7010a6214ae5fcf6de761d0e11703c2ba54250f3ee1a31186b2f6b439eb9495b76d8fa65731c37ca3534254141d628766275114e14e0643d8ae788d5be02e300a6836"}}]}, 0x31c}, 0x1, 0x0, 0x0, 0x5}, 0x48890) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r5}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r5, 0xfffffffe}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000000)={r5, @in={{0x2, 0x4e24, @multicast2}}, 0x787, 0x3, 0x3, 0x613, 0x0, 0x1d2400, 0x1f}, 0x9c) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000004e00)=ANY=[@ANYBLOB="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"], 0x1) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) 04:37:42 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$VIDIOC_STREAMOFF(r1, 0x40045613, &(0x7f0000000000)=0x400) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00', 0x30}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCGIFMTU(r4, 0x8921, &(0x7f0000000080)) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 327.538608] BTRFS error (device loop5): open_ctree failed [ 327.547631] FAULT_INJECTION: forcing a failure. [ 327.547631] name failslab, interval 1, probability 0, space 0, times 0 [ 327.583313] CPU: 0 PID: 25324 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 327.591203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.593242] input: syz1 as /devices/virtual/input/input542 [ 327.600571] Call Trace: [ 327.600589] dump_stack+0x1b2/0x283 [ 327.600606] should_fail.cold+0x10a/0x154 [ 327.600620] should_failslab+0xd6/0x130 [ 327.600632] __kmalloc_track_caller+0x2bc/0x400 [ 327.600642] ? kstrdup_const+0x35/0x60 [ 327.600651] ? lock_downgrade+0x6e0/0x6e0 [ 327.600677] kstrdup+0x36/0x70 [ 327.636429] kstrdup_const+0x35/0x60 [ 327.640139] alloc_vfsmnt+0xe0/0x7c0 [ 327.643859] vfs_kern_mount.part.0+0x27/0x3c0 [ 327.648353] do_mount+0x3c9/0x25e0 [ 327.651910] ? copy_mount_string+0x40/0x40 [ 327.656151] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 327.661019] ? copy_mnt_ns+0x8a0/0x8a0 [ 327.664907] ? copy_mount_options+0x1ec/0x2e0 [ 327.669398] ? copy_mnt_ns+0x8a0/0x8a0 [ 327.673284] SyS_mount+0xa8/0x120 [ 327.676762] ? copy_mnt_ns+0x8a0/0x8a0 [ 327.680649] do_syscall_64+0x1d5/0x640 [ 327.684549] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 327.689747] RIP: 0033:0x45f57a [ 327.692931] RSP: 002b:00007f2401f3da68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 327.700639] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045f57a [ 327.707915] RDX: 00007f2401f3dae0 RSI: 00000000200001c0 RDI: 00007f2401f3db00 [ 327.715189] RBP: 000000000078bf00 R08: 00007f2401f3db40 R09: 00007f2401f3dae0 [ 327.722453] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 04:37:42 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) [ 327.729719] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 327.763502] print_req_error: I/O error, dev loop5, sector 0 04:37:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000080)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) 04:37:42 executing program 1 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 327.828061] input: syz1 as /devices/virtual/input/input543 04:37:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x480400, 0x0) 04:37:42 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) syz_genetlink_get_family_id$smc(&(0x7f0000000000)='SMC_PNETID\x00') ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{0x0, 0x9, 0x0, 0x1}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:37:42 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') getsockopt$inet_int(0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000380), &(0x7f0000000480)=0x4) socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x2, @broadcast}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x30, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800008eff0000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[{0x18, 0x110, 0xa, "f3"}, {0x0, 0x11, 0xf82, "299356374efabf67e17d7e40b58bc8c73ece653bbcb937bd970be6c3a0e82f12ec2e21c3e52938e628b1f5b348466d43b6a82836afb40b565c62b7d810211bc91ba002f6f7a7698179c58c0b02d9015ba0855e5b9223a9eb73f8ed808539205a7bb9d7ac6d265cde186f0fa64175f159db"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 327.981501] FAULT_INJECTION: forcing a failure. [ 327.981501] name failslab, interval 1, probability 0, space 0, times 0 [ 327.994911] input: syz1 as /devices/virtual/input/input544 [ 328.014520] BTRFS error (device loop5): superblock checksum mismatch [ 328.027273] CPU: 0 PID: 25373 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 328.035158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.044510] Call Trace: [ 328.047097] dump_stack+0x1b2/0x283 [ 328.050722] should_fail.cold+0x10a/0x154 [ 328.054882] should_failslab+0xd6/0x130 [ 328.058857] __kmalloc_track_caller+0x2bc/0x400 [ 328.063534] ? btrfs_parse_early_options+0xa3/0x310 [ 328.068567] kstrdup+0x36/0x70 [ 328.071752] btrfs_parse_early_options+0xa3/0x310 [ 328.076590] ? __lock_acquire+0x655/0x42a0 [ 328.080822] ? btrfs_kill_super+0x540/0x540 [ 328.085136] ? lock_acquire+0x170/0x3f0 [ 328.089110] ? pcpu_alloc+0x86f/0xf70 [ 328.092909] ? trace_hardirqs_on+0x10/0x10 [ 328.097131] ? pcpu_alloc+0x86f/0xf70 [ 328.100925] ? __mutex_lock+0x2cb/0x1430 [ 328.104985] ? kstrdup_const+0x35/0x60 [ 328.108869] btrfs_mount+0x119/0x2838 [ 328.112671] ? lock_downgrade+0x6e0/0x6e0 [ 328.116814] ? _find_next_bit+0xdb/0x100 [ 328.120885] ? pcpu_alloc+0x37d/0xf70 [ 328.124683] ? btrfs_remount+0x10c0/0x10c0 [ 328.128919] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 328.134367] ? rcu_read_lock_sched_held+0x10a/0x130 [ 328.139389] ? pcpu_alloc+0xe1/0xf70 [ 328.143118] ? pcpu_find_block_fit+0x380/0x380 [ 328.147699] ? __lockdep_init_map+0x100/0x560 [ 328.152206] ? __lockdep_init_map+0x100/0x560 [ 328.156699] mount_fs+0x92/0x2a0 [ 328.160064] vfs_kern_mount.part.0+0x5b/0x3c0 [ 328.164559] do_mount+0x3c9/0x25e0 [ 328.168098] ? copy_mount_string+0x40/0x40 [ 328.172326] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 328.177159] ? copy_mnt_ns+0x8a0/0x8a0 [ 328.181048] ? copy_mount_options+0x1ec/0x2e0 [ 328.185525] ? copy_mnt_ns+0x8a0/0x8a0 [ 328.189400] SyS_mount+0xa8/0x120 [ 328.192837] ? copy_mnt_ns+0x8a0/0x8a0 [ 328.196740] do_syscall_64+0x1d5/0x640 [ 328.200620] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 328.205792] RIP: 0033:0x45f57a [ 328.208963] RSP: 002b:00007f2401f3da68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 328.216653] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045f57a [ 328.223910] RDX: 00007f2401f3dae0 RSI: 00000000200001c0 RDI: 00007f2401f3db00 [ 328.231161] RBP: 000000000078bf00 R08: 00007f2401f3db40 R09: 00007f2401f3dae0 [ 328.238464] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 328.245733] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:43 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x40200, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup2(r2, r1) ioctl$VIDIOC_S_AUDOUT(r1, 0x40345632, &(0x7f00000000c0)={0x4, "efdde9072e5bc4162e68b51511e8d2728a23c681ad857ed35b428073996873c3", 0x1, 0x1}) [ 328.343131] input: syz1 as /devices/virtual/input/input545 04:37:43 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) fdatasync(0xffffffffffffffff) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 328.460857] BTRFS error (device loop5): open_ctree failed 04:37:43 executing program 1 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:43 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$SIOCAX25OPTRT(r2, 0x89e7, &(0x7f0000000080)={@default, @default, 0x2, 0x44}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r3, 0x40605346, &(0x7f0000000240)={0x8000, 0x0, {0x0, 0x0, 0x5, 0x1, 0xfd}, 0x6}) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r4, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r5, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000040)={0x4}, 0x1) ioctl$UI_BEGIN_FF_ERASE(r4, 0xc00c55ca, &(0x7f0000000000)={0xd, 0x80000000, 0x57}) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='net/llc/core\x00') ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0xfff) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:37:43 executing program 3: write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x1, 0x0, {0x2cc}}, 0x18) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 328.557705] BTRFS error (device loop5): superblock checksum mismatch [ 328.593441] input: syz1 as /devices/virtual/input/input546 [ 328.611956] FAULT_INJECTION: forcing a failure. [ 328.611956] name failslab, interval 1, probability 0, space 0, times 0 [ 328.616623] BTRFS error (device loop5): open_ctree failed [ 328.645611] CPU: 0 PID: 25436 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 328.653504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.662853] Call Trace: [ 328.665439] dump_stack+0x1b2/0x283 [ 328.669065] should_fail.cold+0x10a/0x154 [ 328.673209] should_failslab+0xd6/0x130 [ 328.677193] __kmalloc_track_caller+0x2bc/0x400 [ 328.681875] ? kstrdup_const+0x35/0x60 [ 328.685780] ? lock_downgrade+0x6e0/0x6e0 [ 328.689922] kstrdup+0x36/0x70 [ 328.693108] kstrdup_const+0x35/0x60 [ 328.696836] alloc_vfsmnt+0xe0/0x7c0 [ 328.700548] vfs_kern_mount.part.0+0x27/0x3c0 [ 328.705038] vfs_kern_mount+0x3c/0x60 [ 328.708836] btrfs_mount+0x2a0/0x2838 [ 328.712657] ? _find_next_bit+0xdb/0x100 [ 328.716730] ? pcpu_alloc+0x37d/0xf70 [ 328.720525] ? btrfs_remount+0x10c0/0x10c0 [ 328.724760] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 328.730208] ? rcu_read_lock_sched_held+0x10a/0x130 [ 328.735219] ? pcpu_alloc+0xe1/0xf70 [ 328.738943] ? pcpu_find_block_fit+0x380/0x380 [ 328.743519] ? __lockdep_init_map+0x100/0x560 [ 328.748015] ? __lockdep_init_map+0x100/0x560 [ 328.752510] mount_fs+0x92/0x2a0 [ 328.755874] vfs_kern_mount.part.0+0x5b/0x3c0 [ 328.760365] do_mount+0x3c9/0x25e0 [ 328.763952] ? copy_mount_string+0x40/0x40 [ 328.768229] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 328.773064] ? copy_mnt_ns+0x8a0/0x8a0 [ 328.776946] ? copy_mount_options+0x1ec/0x2e0 [ 328.781432] ? copy_mnt_ns+0x8a0/0x8a0 [ 328.785314] SyS_mount+0xa8/0x120 [ 328.788763] ? copy_mnt_ns+0x8a0/0x8a0 [ 328.792652] do_syscall_64+0x1d5/0x640 [ 328.796569] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 328.801765] RIP: 0033:0x45f57a [ 328.804952] RSP: 002b:00007f2401f3da68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 04:37:43 executing program 3: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r2}, &(0x7f0000000080)=0x18) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r3) r4 = socket$netlink(0x10, 0x3, 0xc) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r5, 0x200, 0x70bd25, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0xc4) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000002740)=ANY=[@ANYBLOB="00120000", @ANYRES16=r5, @ANYBLOB="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"], 0x1200}}, 0x4000) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r6) getsockopt$PNPIPE_IFINDEX(r6, 0x113, 0x2, &(0x7f0000000200)=0x0, &(0x7f0000000240)=0x4) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f00000004c0)={&(0x7f0000000180), 0xc, &(0x7f0000000480)={&(0x7f0000000280)={0x98, r5, 0x10, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x8}, @ETHTOOL_A_LINKMODES_SPEED={0x8, 0x5, 0x9}, @ETHTOOL_A_LINKMODES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_LINKMODES_DUPLEX={0x5, 0x6, 0x43}, @ETHTOOL_A_LINKMODES_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x40005}, 0x400c084) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r2, 0xfffffffe}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000080)={r2, @in={{0x2, 0x4e23, @rand_addr=0x64010102}}, 0x10001, 0x2, 0x9b1d, 0x401, 0x568}, &(0x7f0000000140)=0x98) accept$alg(r3, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000340)="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", 0x11d, 0x10000}], 0x40400, 0x0) [ 328.812656] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045f57a [ 328.819918] RDX: 00007f2401f3dae0 RSI: 00000000200001c0 RDI: 00007f2401f3db00 [ 328.827185] RBP: 000000000078bf00 R08: 00007f2401f3db40 R09: 00007f2401f3dae0 [ 328.834446] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 328.841708] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000940)='/dev/btrfs-control\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000980)='vegas\x00', 0x6) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r1) ioctl$SNDCTL_DSP_SETTRIGGER(r1, 0x40045010, &(0x7f0000000080)=0x8001) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) [ 328.882227] input: syz1 as /devices/virtual/input/input547 04:37:43 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6653070000053c0531d37627057964f667e107f0bd874494451055d67b5bf758112fd6f5227f8c1a40c6bc124249793bc0114fd21a1cf9e8dedca0bb17d6", 0x3e}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3d) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{0x0, 0xfffc}, 'syz1\x00', 0x40}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) connect$vsock_dgram(r3, &(0x7f0000000000)={0x28, 0x0, 0x0, @host}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 329.042215] BTRFS error (device loop5): superblock checksum mismatch [ 329.062703] input: syz1 as /devices/virtual/input/input548 [ 329.119476] BTRFS error (device loop5): open_ctree failed 04:37:43 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="00020000000000000010000000914bafb21f238aa6d229c94621174f1fc6794a71206c7329458d898ffe0bc3a8af352787c7eb0b0f657b65eaa67736ffc2bd50975b326086e81b9e51c2e41e98084ce112f46cc1eec42859050cd6097be42c7ebbf81f299bc5ad804be07a0619e65fbe355a92460a65fc5888cae2ed15051a84f107e54fe363649a62b076f721bd26d91f72e367e58846805f4027b626026f48d9cb863a6ff527eb65a32c82d9340a1f463942660c7d1d5429b5d55c696e629259"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x14, r1, 0x2, 0x70bd2a, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x20048091}, 0x4048800) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000380)="bbfad20b609fd36c0a40") r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x25, 0x803, 0x3) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x10004080}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="48000000007e91000000000000000000000000006521c2fc552628783ef92d9a37501578b468ffe1eb0c1674cb4a9783691fbb7576314aa685ec7ea00fc8c096d8ce067418b84b8a0f62f6430652373466e99814336cb3f021b56162f134029b0448b97aad31f77d57d9afb5acd38ef4ad7cfc699e8045db70cec993c14c664bfecf8317290098e36be0f84b2aebb2", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) sendmsg(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000240)=@nfc_llcp={0x27, 0x1, 0x2, 0x1, 0x1, 0x81, "7df81d228a0f62968f1b55f487fb4aa618e45f1200a2a134fa284d5b89857d0ed3079d8001687cb07b53748e2e98a6db5d27af15558323f8a2f014221b0005", 0x34}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000340)="148e6d83274ab8ba68acac56fb2f291cf84c52a686ffda3177ae137056402c60301eaa1a24d0d784234ce8731c225575cb63796932b69f9f085924", 0x3b}], 0x1}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000740)=ANY=[@ANYRESHEX, @ANYRES32=0x0, @ANYBLOB="2b03000040010200080025000100000008000500", @ANYRES32=r6, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r6, @ANYBLOB="9c001a800400070004001c0068000a80140007000d01000000000000000000000000000005000800a700000014000700fe8000000000000000000000000000bb0500080004000000050008007f00000014000700fe8000000000000000000000000000bb05000800400000000500080045000000080002800400018004000a80100002800c000180080002000900000004001c000400070004001c00"], 0xd4}, 0x1, 0x0, 0x0, 0x40}, 0x0) 04:37:43 executing program 3: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f00000001c0)='\x00', 0x1, r0) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r0) r2 = request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000200)='btrfs\x00', 0xfffffffffffffffe) keyctl$instantiate(0xc, r1, &(0x7f0000000100)=@encrypted_update={'update ', 'default', 0x20, 'trusted:', 'btrfs\x00'}, 0x1e, r2) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 329.162837] print_req_error: I/O error, dev loop5, sector 0 [ 329.187189] BTRFS error (device loop5): superblock checksum mismatch 04:37:44 executing program 1 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:44 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r1) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13d, 0x1b}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r2}}, 0xc) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 329.276491] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=32256 sclass=netlink_route_socket pid=25499 comm=syz-executor.2 [ 329.299244] BTRFS error (device loop5): open_ctree failed [ 329.303082] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=32256 sclass=netlink_route_socket pid=25505 comm=syz-executor.2 04:37:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="8da4363ac0ed020000007a444492902c79e70000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000097fffffff60000005f42485266535f4d", 0x3f, 0x10004}], 0x144005, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) 04:37:44 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0x1f, 0x10400) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 329.437608] FAULT_INJECTION: forcing a failure. [ 329.437608] name failslab, interval 1, probability 0, space 0, times 0 [ 329.490595] print_req_error: I/O error, dev loop5, sector 0 [ 329.500791] CPU: 1 PID: 25515 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 329.508678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.518023] Call Trace: [ 329.520603] dump_stack+0x1b2/0x283 [ 329.524225] should_fail.cold+0x10a/0x154 [ 329.528366] should_failslab+0xd6/0x130 [ 329.532330] __kmalloc_track_caller+0x2bc/0x400 [ 329.536988] ? btrfs_parse_early_options+0xa3/0x310 [ 329.541995] kstrdup+0x36/0x70 [ 329.545174] btrfs_parse_early_options+0xa3/0x310 [ 329.550007] ? __lock_acquire+0x655/0x42a0 [ 329.554230] ? btrfs_kill_super+0x540/0x540 [ 329.558535] ? lock_acquire+0x170/0x3f0 [ 329.562491] ? pcpu_alloc+0x86f/0xf70 [ 329.566278] ? trace_hardirqs_on+0x10/0x10 [ 329.570494] ? pcpu_alloc+0x86f/0xf70 [ 329.574278] ? __mutex_lock+0x2cb/0x1430 [ 329.578324] ? kstrdup_const+0x35/0x60 [ 329.582200] btrfs_mount+0x119/0x2838 [ 329.586020] ? lock_downgrade+0x6e0/0x6e0 [ 329.590150] ? _find_next_bit+0xdb/0x100 [ 329.594193] ? pcpu_alloc+0x37d/0xf70 [ 329.597982] ? btrfs_remount+0x10c0/0x10c0 [ 329.602227] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 329.607660] ? rcu_read_lock_sched_held+0x10a/0x130 [ 329.612656] ? pcpu_alloc+0xe1/0xf70 [ 329.616359] ? pcpu_find_block_fit+0x380/0x380 [ 329.620923] ? __lockdep_init_map+0x100/0x560 [ 329.625403] ? __lockdep_init_map+0x100/0x560 [ 329.629916] mount_fs+0x92/0x2a0 [ 329.633272] vfs_kern_mount.part.0+0x5b/0x3c0 [ 329.637767] vfs_kern_mount+0x3c/0x60 [ 329.641557] btrfs_mount+0x2a0/0x2838 [ 329.645359] ? _find_next_bit+0xdb/0x100 [ 329.649401] ? pcpu_alloc+0x37d/0xf70 [ 329.653208] ? btrfs_remount+0x10c0/0x10c0 [ 329.657434] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 329.662869] ? rcu_read_lock_sched_held+0x10a/0x130 [ 329.667870] ? pcpu_alloc+0xe1/0xf70 [ 329.671575] ? pcpu_find_block_fit+0x380/0x380 [ 329.676139] ? __lockdep_init_map+0x100/0x560 [ 329.680647] ? __lockdep_init_map+0x100/0x560 [ 329.685143] mount_fs+0x92/0x2a0 [ 329.688497] vfs_kern_mount.part.0+0x5b/0x3c0 [ 329.692996] do_mount+0x3c9/0x25e0 [ 329.696524] ? copy_mount_string+0x40/0x40 [ 329.700742] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 329.705576] ? copy_mnt_ns+0x8a0/0x8a0 [ 329.709450] ? copy_mount_options+0x1ec/0x2e0 [ 329.713928] ? copy_mnt_ns+0x8a0/0x8a0 [ 329.717798] SyS_mount+0xa8/0x120 [ 329.721245] ? copy_mnt_ns+0x8a0/0x8a0 [ 329.725118] do_syscall_64+0x1d5/0x640 [ 329.728998] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 329.734170] RIP: 0033:0x45f57a 04:37:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0xb80, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0xcc, 0x8, 0x0, 0x4, 0x7, 0x4, 0x2b9, 0x0, 0x3, 0x7}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xfa3b) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) statfs(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/102) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0xc0305302, &(0x7f0000000080)={0x101, 0x0, 0x1, 0x7fff, 0x10000, 0x9}) [ 329.737341] RSP: 002b:00007f2401f3da68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 329.745034] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045f57a [ 329.752288] RDX: 00007f2401f3dae0 RSI: 00000000200001c0 RDI: 00007f2401f3db00 [ 329.759540] RBP: 000000000078bf00 R08: 00007f2401f3db40 R09: 00007f2401f3dae0 [ 329.766793] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 329.774046] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 329.828191] nla_parse: 13 callbacks suppressed [ 329.828196] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 04:37:44 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0xf}, 0x60, 0x0, 0x36b, 0x8, 0x81}, 0x0, 0x0, r0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r2 = syz_open_dev$audion(0x0, 0xffffffffffff0000, 0x482000) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000080)={0x3}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) 04:37:44 executing program 1 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:44 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000200)='/dev/dri/card#\x00', 0x4, 0xc0000) ioctl$DRM_IOCTL_MODE_GET_LEASE(r0, 0xc01064c8, &(0x7f0000000340)={0x2, 0x0, &(0x7f0000000280)=[0x0, 0x0]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000380), 0x80, &(0x7f0000000600)=[{&(0x7f0000000400)=""/47, 0x2f}, {&(0x7f0000000440)=""/184, 0xb8}, {&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000580)=""/114, 0x72}], 0x4}, 0x2002) dup2(0xffffffffffffffff, r1) pwrite64(r0, &(0x7f0000000680)="8cdf2b21b3dac6813ea9750fb6acc319b0aaa6b3b5511d05eef82c4c648a159952ef4718735a4e64746e3da4ea9fdfb9d373f431958f190837a30c8e8d7c2b33a4a305bf4afa73781aaaca85d5e7c2d8a1173f2ea3c292c943e5994e1500a821601b7bc96fbe65ecdab5eb011e8dfd3a5b65a260e1d68ea1456e391621c491a11e5108e643d56eeff1624359588483b8a39ccb275e275e2a2793d5cbe36f894416880ec96c1c54e2ecd1d820666b2b4f4b89c646d18e63beb2a648e6a49c721ea21b71e769cefb6591376d145f4fdeb32aa1", 0xd2, 0x0) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f00000000c0)={0x8, @raw_data="e49d6335643442bb4584a5aa7a6cf50ffe96d588833d502f27ddb716d7147c302d4bb90cfc132e59de05f7b682664dd61cb696c5940bc14a8ad1a9f8852f9f6400c11dadcbc225b7eee5a21e96c9fe94d4df0ecd8d564fbf6ca5f992e34f01b87ad66efc328e7315fd520e4f80e419fff16c9b7937849762eb74e14ab94f6822166f8b8773436d6676482341413a78af9514b5c111ca3df474e534418bc4cdc803ecbc2d59f5620c2a26fe0e175669f88856a668481d59213b4ff006ca086d68ae09b86d14707dca"}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x844002, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$DRM_IOCTL_MODE_ADDFB(r2, 0xc01c64ae, &(0x7f0000000780)={0x19ea, 0xfffffffa, 0x9, 0x3, 0x1, 0x7, 0xe581}) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) getpriority(0x1, r3) unlinkat(r1, &(0x7f00000001c0)='./file0\x00', 0x200) [ 329.982340] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 330.004546] BTRFS error (device loop5): superblock checksum mismatch [ 330.078695] BTRFS error (device loop5): open_ctree failed 04:37:44 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000000000010898ea15b0000058f56d1be8cba26ef74d73da8ec17f345"], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x101101, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="4c0000001000010400007e6c35a9c8698b00400000000000000000", @ANYRES32=0x0, @ANYBLOB="2b030000000000001c0012800b00010067656e65766500000c000280060005000000000008000500", @ANYRES32=r6, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r6, @ANYBLOB], 0x4c}}, 0x0) [ 330.123187] FAULT_INJECTION: forcing a failure. [ 330.123187] name failslab, interval 1, probability 0, space 0, times 0 [ 330.166389] CPU: 1 PID: 25559 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 330.174334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.183693] Call Trace: [ 330.186280] dump_stack+0x1b2/0x283 [ 330.189907] should_fail.cold+0x10a/0x154 [ 330.194057] should_failslab+0xd6/0x130 [ 330.198028] kmem_cache_alloc+0x28e/0x3c0 [ 330.202185] alloc_vfsmnt+0x23/0x7c0 [ 330.205900] vfs_kern_mount.part.0+0x27/0x3c0 [ 330.210399] vfs_kern_mount+0x3c/0x60 [ 330.210919] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 330.214204] btrfs_mount+0x2a0/0x2838 [ 330.214221] ? _find_next_bit+0xdb/0x100 [ 330.214235] ? pcpu_alloc+0x37d/0xf70 [ 330.234467] ? btrfs_remount+0x10c0/0x10c0 [ 330.238709] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 330.244222] ? rcu_read_lock_sched_held+0x10a/0x130 [ 330.249239] ? pcpu_alloc+0xe1/0xf70 [ 330.252958] ? pcpu_find_block_fit+0x380/0x380 [ 330.257537] ? __lockdep_init_map+0x100/0x560 [ 330.262031] ? __lockdep_init_map+0x100/0x560 [ 330.266527] mount_fs+0x92/0x2a0 [ 330.269897] vfs_kern_mount.part.0+0x5b/0x3c0 [ 330.274406] do_mount+0x3c9/0x25e0 [ 330.277949] ? copy_mount_string+0x40/0x40 [ 330.282207] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 330.287040] ? copy_mnt_ns+0x8a0/0x8a0 [ 330.290926] ? copy_mount_options+0x1ec/0x2e0 [ 330.295449] ? copy_mnt_ns+0x8a0/0x8a0 [ 330.299346] SyS_mount+0xa8/0x120 [ 330.302792] ? copy_mnt_ns+0x8a0/0x8a0 [ 330.306682] do_syscall_64+0x1d5/0x640 [ 330.310575] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 330.315771] RIP: 0033:0x45f57a [ 330.318965] RSP: 002b:00007f2401f3da68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 330.326682] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045f57a [ 330.333948] RDX: 00007f2401f3dae0 RSI: 00000000200001c0 RDI: 00007f2401f3db00 [ 330.341209] RBP: 000000000078bf00 R08: 00007f2401f3db40 R09: 00007f2401f3dae0 [ 330.348484] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 330.355775] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 330.399456] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 330.493442] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 04:37:46 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f, {0x71071111, 0x0, 0xfffffffd, 0x7, 0x3, 0xfffffffc}}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r1) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00', 0x3c}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:37:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) mq_open(&(0x7f0000000080)=']\x00', 0x80, 0x52, &(0x7f00000000c0)={0x200, 0x8, 0x1, 0x6}) 04:37:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000540)="09fc1c4f0298547bdab1b52dd380e1992331b567573bc453d02f2125b96954dd8a9430e6d3c1a210b75ec44663b1adda46b2333964978c1449ef58059c54dda82351c6c558ba6c26c80100a172cddf39d5f7ce002fb1cccc02e66e2b28f884f6b57838d8a03f48c1de5bf7bae6b5e7f451") r1 = msgget(0x3, 0x800) msgctl$MSG_STAT_ANY(r1, 0xd, &(0x7f0000000340)=""/202) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) ioctl$sock_inet_SIOCGIFBRDADDR(r3, 0x8919, &(0x7f0000000180)={'gretap0\x00', {0x2, 0x4e22, @multicast2}}) sendmsg$NFNL_MSG_CTHELPER_NEW(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400200}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, 0x0, 0x9, 0x201, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFCTH_PRIV_DATA_LEN={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x800) 04:37:46 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000b4d0ffb10100dd01ebb91fb5e1264588845dd977858b306a54c45fc1e092d10d37bd646581d3e3044a167d96106e4715655b3b19037c5e4dd5ce2364382e57e3ef831507"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[], 0x18}}], 0x2, 0x40c4) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[], 0x48}, 0x1, 0x0, 0x0, 0x8050}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x25, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x4c}}, 0x0) 04:37:46 executing program 1 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r1) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000100)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r4, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x20000010) sendmsg$NLBL_UNLABEL_C_ACCEPT(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0xac, r4, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @empty}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'erspan0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'caif0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x2f, 0x7, 'system_u:object_r:systemd_logger_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @multicast2}, @NLBL_UNLABEL_A_SECCTX={0x24, 0x7, 'system_u:object_r:ssh_exec_t:s0\x00'}]}, 0xac}, 0x1, 0x0, 0x0, 0x2000c090}, 0xc0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) [ 332.084295] ip_tables: iptables: counters copy to user failed while replacing table [ 332.101842] FAULT_INJECTION: forcing a failure. [ 332.101842] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 332.105361] ip_tables: iptables: counters copy to user failed while replacing table 04:37:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r0) write$eventfd(r0, &(0x7f0000000080)=0x8, 0x8) [ 332.132525] BTRFS error (device loop5): superblock checksum mismatch [ 332.186758] CPU: 1 PID: 25604 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 332.192989] ip_tables: iptables: counters copy to user failed while replacing table [ 332.194643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.194648] Call Trace: [ 332.194667] dump_stack+0x1b2/0x283 [ 332.194686] should_fail.cold+0x10a/0x154 [ 332.194703] __alloc_pages_nodemask+0x22b/0x2730 [ 332.205231] ip_tables: iptables: counters copy to user failed while replacing table 04:37:46 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) [ 332.211844] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 332.211856] ? rcu_read_lock_sched_held+0x10a/0x130 [ 332.211866] ? __alloc_pages_nodemask+0x1a8a/0x2730 [ 332.211895] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 332.211912] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 332.211925] ? btrfs_parse_early_options+0x19d/0x310 [ 332.264948] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 332.269974] alloc_pages_current+0xe7/0x1e0 [ 332.270901] ip_tables: iptables: counters copy to user failed while replacing table [ 332.274300] __get_free_pages+0xb/0x40 [ 332.274312] selinux_sb_copy_data+0x28/0x380 [ 332.274327] security_sb_copy_data+0x6e/0xa0 [ 332.274342] parse_security_options+0x32/0x90 [ 332.299315] btrfs_mount+0x502/0x2838 [ 332.301399] ip_tables: iptables: counters copy to user failed while replacing table [ 332.303116] ? pcpu_find_block_fit+0x2ed/0x380 [ 332.303127] ? pcpu_alloc+0x37d/0xf70 [ 332.303139] ? btrfs_remount+0x10c0/0x10c0 [ 332.303157] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 332.328937] ? rcu_read_lock_sched_held+0x10a/0x130 [ 332.329069] ip_tables: iptables: counters copy to user failed while replacing table [ 332.333946] ? pcpu_alloc+0xe1/0xf70 [ 332.333966] ? __lockdep_init_map+0x100/0x560 [ 332.333976] ? __lockdep_init_map+0x100/0x560 [ 332.333989] mount_fs+0x92/0x2a0 [ 332.334003] vfs_kern_mount.part.0+0x5b/0x3c0 [ 332.362271] vfs_kern_mount+0x3c/0x60 [ 332.366077] btrfs_mount+0x2a0/0x2838 [ 332.369883] ? pcpu_find_block_fit+0x2ed/0x380 [ 332.374465] ? pcpu_alloc+0x37d/0xf70 [ 332.378265] ? btrfs_remount+0x10c0/0x10c0 [ 332.382504] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 332.387958] ? rcu_read_lock_sched_held+0x10a/0x130 [ 332.392975] ? pcpu_alloc+0xe1/0xf70 [ 332.396698] ? pcpu_find_block_fit+0x380/0x380 [ 332.401299] ? __lockdep_init_map+0x100/0x560 [ 332.405795] ? __lockdep_init_map+0x100/0x560 [ 332.410301] mount_fs+0x92/0x2a0 [ 332.413672] vfs_kern_mount.part.0+0x5b/0x3c0 [ 332.418195] do_mount+0x3c9/0x25e0 [ 332.421742] ? copy_mount_string+0x40/0x40 [ 332.425977] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 332.430815] ? copy_mnt_ns+0x8a0/0x8a0 [ 332.434702] ? copy_mount_options+0x1ec/0x2e0 [ 332.439196] ? copy_mnt_ns+0x8a0/0x8a0 [ 332.443087] SyS_mount+0xa8/0x120 [ 332.446540] ? copy_mnt_ns+0x8a0/0x8a0 [ 332.450426] do_syscall_64+0x1d5/0x640 [ 332.454358] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 332.459569] RIP: 0033:0x45f57a [ 332.462752] RSP: 002b:00007f2401f3da68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 332.470456] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045f57a [ 332.477725] RDX: 00007f2401f3dae0 RSI: 00000000200001c0 RDI: 00007f2401f3db00 04:37:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000d00200009800000000000000680100009800000000000000380200003802000038020000380200003802000004000000000000000000000010000000e00000020000000000000000626f6e645f736c6176655f310000000000000000000000000000e2ffffff001f00000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a45435400000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc18795000000000000000000000000000000000040000000000000000000000000000000000000010000000000000000000000a800d0000000000000000000000000000000000000000000380074696d650000000000554e8269000000000000000000000000000000000000000000ffffffff4f970000001b000000000000f9000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000ffff000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000380071756f7461000000000000000000000000000000000000000000000000000100000000deffff460d0000000000000000000000000000280052454a45435400000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028000000000000000000000000000000001ec500000000000000000000000000feffffff"], 0x1) r3 = dup2(r0, r2) r4 = socket$kcm(0x10, 0x2, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r4, &(0x7f0000000200)={0x0, 0x74, &(0x7f0000000280)={&(0x7f0000000080)={0x50, r5, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}]}]}, 0x50}}, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00042cbd7000fddbdf250200000014000380060007004e210000060004000300000099efc2e6103003b07b508e716c4c9229b04240e0dbe53f85f7fe88b6784e28c09fda1d44c6524f07d886ab87d1aa31b103fa310fb8c4167e8b41509d348f5a862f7526647e063b196882c5a0862118c04fb9e30090a1acc2f54e9c05c5bde0cb8c2a12b12296b1a102bbbd47a1142df13eabc1b0c552d0ae9dac4f133e1801ca04d2c90183e19d53"], 0x28}, 0x1, 0x0, 0x0, 0x4040010}, 0x40004) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) 04:37:47 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000380)) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 04:37:47 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000024000705000000000000000000001f00", @ANYRES32=r4, @ANYBLOB="00000400f1ffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@delchain={0x68, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x4}, {0x0, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x34, 0x1, [@m_pedit={0x30, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=@delchain={0x2c, 0x28, 0xf35, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0xfff3}, {0x4, 0xffff}}, [@TCA_RATE={0x6, 0x5, {0x8, 0x2}}]}, 0x2c}}, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000380)={0x0, @ethernet={0x306, @remote}, @xdp={0x2c, 0x5, r4, 0x7}, @nfc={0x27, 0x1, 0x1, 0x1}, 0x3, 0x0, 0x0, 0x0, 0x7ff, &(0x7f00000002c0)='veth1_to_batadv\x00', 0x212ad557, 0x585a, 0x9}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000300)={r5, 0x1, 0x6, @random="292bc479e905"}, 0x10) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$BLKTRACETEARDOWN(r7, 0x1276, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 332.484988] RBP: 000000000078bf00 R08: 00007f2401f3db40 R09: 00007f2401f3dae0 [ 332.492249] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 332.499513] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 332.504061] ip_tables: iptables: counters copy to user failed while replacing table [ 332.529706] BTRFS error (device loop5): open_ctree failed [ 332.564946] ip_tables: iptables: counters copy to user failed while replacing table [ 332.572366] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 332.605128] ip_tables: iptables: counters copy to user failed while replacing table 04:37:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0xee00) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee00) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3, &(0x7f0000000540)=[{&(0x7f0000000340)="0598202f9389d742d33df7b4a844f90e7c2222b3cf1354a15d0b8d38c508904351225ccae967c56f1b2ee62dfe02b02e6efd6dd45eecfc83afcbc35444978a642edf9992c3a7a4d0d3814de4d1446239ec2344e261ffb0af", 0x58, 0x9}, {&(0x7f00000003c0)="e11acfc1f34ccfb477490a13f734a62c3ab0c1482db7df0e34c9d23e0a0fe0d8028ea9a6129f1cbea065c42733cfd450eaaa116e64b8af70d2af129134deeb0261805044383ce8401b663fd041efa178bf776981891280d19c4ee2dc83c819f829cc7e85e2aa579efac61918c18ea73ca472b26040e6353119021c751769cd1064f217d07fbd95786d6f9e1efa7940c537c8d2e386e133", 0x97, 0x4}, {&(0x7f0000000480)="cecc878d75eaeca7b8e13e7af13b43fc685e87aeca7a10bf53a13498bc977cc2dba4d3667d449ca36e2c0de2948176c03d340d4317951483fdc9d74a9e01dbcbde72b9e457ab526217f8f5dac1450c9f6da2aae1265828377ac16987f341f7ef86c1319c7cb43a91ea9d784e3c090474fe14997c89152c86ecaad810c6467a58b6a11e1834129ba752322eb6a3d458a5f52b3f30010e3b8b750d0f02020509875410f038a4239bca00d03a2417b35f44", 0xb0, 0x7}], 0x3180480, &(0x7f00000005c0)={[{@notreelog='notreelog'}, {@inode_cache='inode_cache'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_lt={'fowner<', r1}}, {@appraise='appraise'}, {@uid_eq={'uid', 0x3d, r2}}, {@fsmagic={'fsmagic', 0x3d, 0xff}}, {@uid_lt={'uid<', r3}}, {@subj_type={'subj_type', 0x3d, 'btrfs\x00'}}]}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r4) r5 = openat$cgroup_ro(r4, &(0x7f0000000100)='cgroup.stat\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r5) setsockopt$inet_sctp6_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000000080)={0xf86, 0xffff, 0x4, 0x8}, 0x8) [ 332.625123] BTRFS error (device loop5): superblock checksum mismatch [ 332.650758] IPVS: Error joining to the multicast group [ 332.665541] IPVS: Error joining to the multicast group [ 332.665696] input: syz1 as /devices/virtual/input/input552 04:37:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000180)={&(0x7f0000000000)="82c868b97d2616cdcb699b2d0a3826611d360010fb6034c6d2e4820af84f62b8455b931be01c7194b5977f7ec65439cf13640da255d7d1c7cc208c9115269e691d1dd5b2a14059a051d7f1f4", &(0x7f0000000540)=""/4096, &(0x7f0000000080)="963d3cf795e053a09fb513e851d568229e9fa8c82c52e6e4ffed8bcfbe775eab8130356a64dc60bed6fb00cfadfa36fdca01728d00b63b951e22b1ad7cf06f3b0998c0d3bf36ce8a48475a8254f2958a349771f99a4599bfee50c9c23f901cfab029d1fe01ace1665c0e9300fd571ae17bb459a19df38ad312a333ef8d635682", &(0x7f0000000100)="383714926cad1734f9970974d2642603cc8c09246d356bd98ba4f6c29faae82ccda537976e5b824cbd190d3531b32c22fe4aa90711fc22c965211db5d25dccaa4e533a0e7f7f680f53529adfac0b61451639e8563f5fed1bdc9a4839ce9c59c1e0bf80cc2f56547a8048357e0c3f", 0x7, r2, 0x4}, 0x38) 04:37:47 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80052, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x43486, 0x0, 0x4, 0x0, 0x2, 0xeffffffe, 0x4}, 0x0, 0x0, r0, 0x8) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) 04:37:47 executing program 1 (fault-call:0 fault-nth:61): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 332.698545] BTRFS error (device loop5): open_ctree failed [ 332.715384] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 04:37:47 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f0000000100)={0x2, 0x3}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r2 = dup2(0xffffffffffffffff, r1) write$FUSE_BMAP(r1, &(0x7f0000000080)={0x18, 0x0, 0x2, {0x7}}, 0x18) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000340)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x892004, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f0000000200)={'veth1_vlan\x00'}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x8, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x2, 0x7}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x96d) ioctl$SNDRV_PCM_IOCTL_UNLINK(r1, 0x4161, 0x0) openat$cgroup_ro(r3, &(0x7f00000000c0)='cpuacct.usage_user\x00', 0x0, 0x0) [ 332.807313] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 332.831906] FAULT_INJECTION: forcing a failure. [ 332.831906] name failslab, interval 1, probability 0, space 0, times 0 04:37:47 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x8004}, 'syz1\x00', 0xe}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400204) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:37:47 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r2 = openat$cgroup_ro(r1, &(0x7f00000000c0)='memory.swap.current\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r2) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f0000000000)={0x2, '@c'}, 0x3) socket$inet_udp(0x2, 0x2, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x28080, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) dup2(0xffffffffffffffff, r3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r4, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r4, &(0x7f0000000640)="dd8a59ee44155d31bbc943357379636530cf95a741ea27efae1e515c4e8022042954c0a67801affcd45dfa7638329947a3b6a25a64555f2f74daf16da4cd166301e594df730d7294bdb459ffa543818c0fad7d45275a3947884589b252930026121ef435d303e65fdb340536917de6e0da09b4927606a0442e2c4cdb6c6723cad24312b0b638479ca028e116a1c59876a131fa57dddb5d9a7ed87c0b23a413caa50226d6cbdfbfb1352830b8a482d549164391a3909680a790979e29fa0a613892ddc061393d0199a0aff322c375abec7422d9039461916cf25a2d", 0xfffffffffffffc6d, 0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000040)=ANY=[], 0x1) sendto$inet(0xffffffffffffffff, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000640)="dd8a59ee44155d31bbc943357379636530cf95a741ea27efae1e515c4e8022042954c0a67801affcd45dfa7638329947a3b6a25a64555f2f74daf16da4cd166301e594df730d7294bdb459ffa543818c0fad7d45275a3947884589b252930026121ef435d303e65fdb340536917de6e0da09b4927606a0442e2c4cdb6c6723cad24312b0b638479ca028e116a1c59876a131fa57dddb5d9a7ed87c0b23a413caa50226d6cbdfbfb1352830b8a482d549164391a3909680a790979e29fa0a613892ddc061393d0199a0aff322c375abec7422d9039461916cf25a2d", 0xfffffffffffffc6d, 0x0, 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(0xffffffffffffffff, 0xc0406619, &(0x7f0000000200)={{0x2, 0x0, @identifier="7f27e68fb7e920328b0adfdc0be8ab0a"}}) [ 332.906059] CPU: 1 PID: 25685 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 332.907574] BTRFS error (device loop5): superblock checksum mismatch [ 332.913944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.913948] Call Trace: [ 332.913965] dump_stack+0x1b2/0x283 [ 332.913982] should_fail.cold+0x10a/0x154 [ 332.913997] should_failslab+0xd6/0x130 [ 332.914008] __kmalloc+0x2c1/0x400 [ 332.914017] ? match_strdup+0x58/0xa0 [ 332.914029] match_strdup+0x58/0xa0 [ 332.914042] btrfs_parse_early_options+0x241/0x310 [ 332.914052] ? __lock_acquire+0x655/0x42a0 [ 332.914065] ? btrfs_kill_super+0x540/0x540 [ 332.914073] ? lock_acquire+0x170/0x3f0 [ 332.914089] ? pcpu_next_unpop+0x8c/0x100 [ 332.927007] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 332.929916] btrfs_mount+0x119/0x2838 [ 332.929931] ? lock_downgrade+0x6e0/0x6e0 [ 332.929940] ? _find_next_bit+0xdb/0x100 [ 332.929950] ? pcpu_alloc+0x37d/0xf70 [ 332.929962] ? btrfs_remount+0x10c0/0x10c0 [ 333.005200] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 333.010640] ? rcu_read_lock_sched_held+0x10a/0x130 [ 333.015643] ? pcpu_alloc+0xe1/0xf70 [ 333.019346] ? pcpu_find_block_fit+0x380/0x380 [ 333.023909] ? __lockdep_init_map+0x100/0x560 [ 333.028401] ? __lockdep_init_map+0x100/0x560 [ 333.032881] mount_fs+0x92/0x2a0 [ 333.036236] vfs_kern_mount.part.0+0x5b/0x3c0 [ 333.040718] vfs_kern_mount+0x3c/0x60 [ 333.044519] btrfs_mount+0x2a0/0x2838 [ 333.048336] ? pcpu_find_block_fit+0x2ed/0x380 [ 333.052905] ? pcpu_alloc+0x37d/0xf70 [ 333.056689] ? btrfs_remount+0x10c0/0x10c0 [ 333.060940] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 333.066374] ? rcu_read_lock_sched_held+0x10a/0x130 [ 333.071372] ? pcpu_alloc+0xe1/0xf70 [ 333.075079] ? pcpu_find_block_fit+0x380/0x380 [ 333.079643] ? __lockdep_init_map+0x100/0x560 [ 333.084134] ? __lockdep_init_map+0x100/0x560 [ 333.088629] mount_fs+0x92/0x2a0 [ 333.091979] vfs_kern_mount.part.0+0x5b/0x3c0 [ 333.096466] do_mount+0x3c9/0x25e0 [ 333.099995] ? copy_mount_string+0x40/0x40 [ 333.104217] ? copy_mount_options+0x17d/0x2e0 [ 333.108696] ? copy_mount_options+0x18f/0x2e0 [ 333.113176] ? copy_mount_options+0x1ec/0x2e0 [ 333.117671] ? copy_mnt_ns+0x8a0/0x8a0 [ 333.121542] SyS_mount+0xa8/0x120 [ 333.124983] ? copy_mnt_ns+0x8a0/0x8a0 [ 333.128856] do_syscall_64+0x1d5/0x640 [ 333.132735] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 333.137910] RIP: 0033:0x45f57a [ 333.141081] RSP: 002b:00007f2401f3da68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 333.148775] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045f57a [ 333.156037] RDX: 00007f2401f3dae0 RSI: 00000000200001c0 RDI: 00007f2401f3db00 [ 333.163297] RBP: 000000000078bf00 R08: 00007f2401f3db40 R09: 00007f2401f3dae0 [ 333.170552] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 333.177807] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="8da4363ac0ed02000af9fd7fff01004d010000000000000000007a00fff6f2a2299748aeb81e1b00b10efd9a000001000010000001fffffff60000005f42485266535f4dc21cd5a5468918b09ffdf1120d594165e80f337a59b3186f82e04278325ecc6878a6b9d1864924161e934ff154fb0d9401314a9922a37028", 0x7c, 0x100010000}], 0x0, 0x0) 04:37:47 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000001001000001", @ANYRES16], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x401, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="480000001000b507cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000380)) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 333.210326] input: syz1 as /devices/virtual/input/input554 04:37:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r0) 04:37:47 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r1) r2 = accept4$inet(r1, 0x0, &(0x7f0000000000), 0x80000) getpeername$l2tp(r2, &(0x7f0000000040)={0x2, 0x0, @dev}, &(0x7f0000000080)=0x10) 04:37:48 executing program 1 (fault-call:0 fault-nth:62): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 333.308641] BTRFS error (device loop5): open_ctree failed 04:37:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x3049000, 0x0) setxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x21, 0x0) [ 333.353963] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 333.355089] input: syz1 as /devices/virtual/input/input556 [ 333.390376] FAULT_INJECTION: forcing a failure. [ 333.390376] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:37:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffaa40deff01004d0100000202001f32e8d2be88ea4e0000fff6f2a2299748aeb81e1b09b10efd9a000001000000000001fffffff60000005f42485266", 0x48, 0x10000}], 0xa00024, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000100)) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) mknodat(r0, &(0x7f0000000080)='./file0\x00', 0x2, 0x5) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) [ 333.403228] CPU: 1 PID: 25745 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 333.411125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.420469] Call Trace: [ 333.423066] dump_stack+0x1b2/0x283 [ 333.426698] should_fail.cold+0x10a/0x154 [ 333.430848] __alloc_pages_nodemask+0x22b/0x2730 [ 333.435632] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 333.440754] ? debug_object_activate+0x450/0x450 [ 333.445521] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 333.450403] ? btrfs_parse_early_options+0x19d/0x310 [ 333.455506] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 333.460566] ? __lock_acquire+0x655/0x42a0 [ 333.464798] ? btrfs_kill_super+0x540/0x540 [ 333.469114] ? lock_acquire+0x170/0x3f0 [ 333.473091] alloc_pages_current+0xe7/0x1e0 [ 333.477427] ? trace_hardirqs_on+0x10/0x10 [ 333.481686] __get_free_pages+0xb/0x40 [ 333.485583] parse_security_options+0x1a/0x90 [ 333.490072] btrfs_mount+0x502/0x2838 [ 333.493880] ? pcpu_find_block_fit+0x2ed/0x380 [ 333.498456] ? pcpu_alloc+0x37d/0xf70 [ 333.502255] ? btrfs_remount+0x10c0/0x10c0 [ 333.506495] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 333.511944] ? rcu_read_lock_sched_held+0x10a/0x130 [ 333.516958] ? pcpu_alloc+0xe1/0xf70 [ 333.520696] ? __lockdep_init_map+0x100/0x560 [ 333.525187] ? __lockdep_init_map+0x100/0x560 [ 333.529683] mount_fs+0x92/0x2a0 [ 333.533050] vfs_kern_mount.part.0+0x5b/0x3c0 [ 333.537545] vfs_kern_mount+0x3c/0x60 [ 333.541348] btrfs_mount+0x2a0/0x2838 [ 333.545162] ? _find_next_bit+0xdb/0x100 [ 333.549216] ? pcpu_alloc+0x37d/0xf70 [ 333.553010] ? btrfs_remount+0x10c0/0x10c0 [ 333.557250] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 333.562698] ? rcu_read_lock_sched_held+0x10a/0x130 [ 333.567712] ? pcpu_alloc+0xe1/0xf70 [ 333.571435] ? pcpu_find_block_fit+0x380/0x380 [ 333.576016] ? __lockdep_init_map+0x100/0x560 [ 333.580509] ? __lockdep_init_map+0x100/0x560 [ 333.585024] mount_fs+0x92/0x2a0 [ 333.588421] vfs_kern_mount.part.0+0x5b/0x3c0 [ 333.592913] do_mount+0x3c9/0x25e0 [ 333.596468] ? copy_mount_string+0x40/0x40 [ 333.600703] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 333.605557] ? copy_mnt_ns+0x8a0/0x8a0 [ 333.609461] ? copy_mount_options+0x1ec/0x2e0 [ 333.613951] ? copy_mnt_ns+0x8a0/0x8a0 [ 333.617837] SyS_mount+0xa8/0x120 [ 333.621292] ? copy_mnt_ns+0x8a0/0x8a0 [ 333.625195] do_syscall_64+0x1d5/0x640 [ 333.629083] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 333.634280] RIP: 0033:0x45f57a [ 333.637474] RSP: 002b:00007f2401f3da68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 333.645235] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045f57a [ 333.652500] RDX: 00007f2401f3dae0 RSI: 00000000200001c0 RDI: 00007f2401f3db00 [ 333.659766] RBP: 000000000078bf00 R08: 00007f2401f3db40 R09: 00007f2401f3dae0 [ 333.667031] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 333.674297] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f00000000c0)='btrfs\x00', &(0x7f0000000000)='./file0\x00', 0xfd4, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$USBDEVFS_DISCSIGNAL(r0, 0x8010550e, &(0x7f0000000080)={0x0, &(0x7f0000000340)="fa25e30d49178d0d8e0c424b19986d25094bfe304434f087592c81cd7b27c793da412239e67d7399d494f6763be670eaea29f28170fcd60fd09f07276b44ecc78031fb94face172dc18bd0da6601c25adafcf868d8c92b2c4f9a11b0993c3bf47927092b2d76494612550676aca3a800b290630375b2bf2516d46f8fbc5ed6a7f434dece98007817110d532e635cc85cf03fe6a2dc53f060453d8892b35d3fae81cfe320cb69bdc0b0fd24aa87bf9ebf180c88255e9b3a9ce8edfcf6f36ea5f7e2bf34e95e53a112bbe57c0f19865f44ae0ec295096dbf79c6103f7b76928564ef415a242118754cb674e5a31b0e62f05e670e0374a2ac84f9c66386d0b8b3fc4824991f6073c52f098a82570e361b3885ecf3a55d44c059a1154e3247a4cd28c117e860ca0d9b40a1f5899ad6a584c18f2760a4b44a0f23b19891b16616a09d82164736abdb54fb15a4dd99b8fb3243130325a38010139422d7f89b15aa220ea2fccac2a847afd085069fb9fc647a0e9dfacb5218a6eaeaba328e69d62bacc27ad141f220c1f934ed88347d0224dfbb9225173ee10c2a256fb247b6fb0bb2472188fd30ddc824c1ba0434d0fef65397ccc0b5a5427deac29953d6659a66bc0e3a48082a8f4f5f4e09d464f640e91614806e46e85e9bc3f68cdac8a8c106866f629c6100914e3c75907a2ac31a026de132971842cd3296b6041e187014ff60e4bc1d6e5722555ab71d6f82f4521c2a70a789035768ad67e8ede71f65d7ce2881667e2387600ea7406371244eb3b0e2b75d1dd99ee85b154d9bdbd5bd5b223b06662305334c8d8064347ad1d88826506f121a697fed5a7cd942c4e68b065b712c68f7106fbb0d1ea2a16523113483cf2c5aa02d0ef699ce08fd06d41ae0c3f75550c034b2cf8b40be7fb0a8c94f461596eb6d53b2eff6d0c9d3f4afa0c2eeec5fed8eb9110df93aebb03f8dadb7bd668d431af0d6f909f4745ccbb5ce0d3aebcdbed5ebe21b8cc3fd17a0c9830942676f9e9e4c7ddc4e7475227964215416910b495e3ddee9d6b2d503e0092c05896377ae493e3e5481ae82b2180dde215ab0efb115b7e4ac8bf346b328c89f30b3be78f04543ccf25cf243a419657563f8140d2fdb7261aa0abf22ce6af639ec3612d68f28132cf420886e50a2ec9ae03915d2f8b841fbb65ea8cbc2807ff1cbbd13996d74277ad5f8127a2b9800a1903c229894ac39caf3b3898664c41bf4c12193f6185c9c6eb37c66c0b8f0976ab501ab91434201f81c92da70fd86a0aac06584877cb065e9fddeaff25711620fe0f0e497ad33a3fe8d43f2e66eb08e689bf432006313313a22218e5dc3a9dba258dacc088a0ddd991ea9d97a7bfb85b132874889c88a28048906777e2fa50a9faeb504e140e0906d3fd68262fd57f6664534d22331609d1fea13fc21884a970438b7d085ffac791c0679436887e7e90bd575f27daf66bafa61964d8d9a8a8d6205ecc2f9c1f870d21c51abfb18080fa55f790c947b75c4d0fc6e014cfc9713b74072a57572f129a57a319518e87b66069d4e1a476911fb0f2d4d14ace9daf093f02ca1d0b6dccc49cf2faf2fe9ae8c53bebbacc9229704a1775a9c776d842af2c3e9a3f9743be4fd7c5bbcc932dc3e4b1b98b909ae1de1e95332e0754cd343fbcdfc6bebaa82e3b1767e43e46d28e9eb353060f7b217b291580a1d34aa543c94c30c209bf77482ed4741c32fc2e6ba0f26280726a9b71cd433edb2d6814f1665742add994afc3df890cac5f62ed76e59e6c34bf04e939280640f9f5657acf7b8553294c0b2eb72ab1825ffad6115f84fc19e44149ff0837325fbed9f343cb5f746c042b0539b49d5862594642d630e96a46d5c61970e764d2190c7cd747c2964bcf08455f3b954ada7af43042d05c31841a4e954beb1307d2729b34831f65987614d3ecc5c20f5a79a2094c8d4b2792147afa59215faa9bfa6c17353494f23f04bd2c8dba594f8aeac377c6ae164be1629d5c033218867d91d04c90c6c1e761f85306ab2c2ef189748fbfea2f6cbc40fb8e196d860d1fcb9a989f86f7c6dca7a2757c9f4a3ebe1a544e19082f9c549fdb6560339f793e23569ae027b1f5a507011d2b94b69aaaf39660d5db05d21fad7caf9b15a49afe63bd63fbd1c0891e74f4aca5bf923f29220c456f50e06e51493ad8732f7d3e42595cca682c2563cb751298da7cf227c89a11dff75689bb9eee87f8f4a0a3b7b9fd2dcfea3c30a3702bc4ca94e9c41287bb523a4f2c4256ae26f988f14b6b590d83fc1a3d0cc4fc40afbd01229e80037cd37f66a913a301a022efc53caee32171b573ee8ad2e5362147f0e09a9668b85ccc51151bc8b5c59f58369586644516a65f51dad847901f51cff88ce4a32244a2ee20ab31db287d225136e9f77d3c3bdfe46e55da7e87ce75fb53c5ab14cb42c1bcce959b8e11d09c18835d421eb8ba78d5900e058fe0723b80ce7594f7874dc915e90257834585da66b09cadb68684a94036b4782a983a11dc8d336e45cdc2d605cb91a242a45f17c1c7faac10d10d683ea2ae28ba063427ad7a0cd22296b55d16dd690d545a8114bde7931b450863f50bc8ecfd6f6b8b11f62135c28940779732f9da1f5d29b7991e97f98999d30d4a9dfc5c3fa49711c2338a12c4fc6a1273cf064c05131e14814cb9a1526c8d983abf332e40ac677e61248ef3f041e8a7beca27cd24cdb9161f9b8ec6a6a417501d3ee55d81f310786bdb273eead59fda5170ca461b2b17fc50e5da3722208e455c8550bbefc4ea8e05a8661ac6bd4f4b965996779257c9af608a665e1ecc7465decc18d5cac023141f90d5afdb0c67f845639907d4b3a62c53ae1e2a78c7101dcb5ae635a31e452ce7d2b9c737d9e5881e2ddff69e9797548b1d6a9690e442ed9e60ae6b189a0970f6ba374489e65f8f17cc7ccbb648565ac40302ea3061abd4d8b3a1bd80bf59ff8825cb0337c1dfb3678b7c9ec7f3318b289ea5cc5b67244edb44a6f5abdfd6383c8dbb4da91bc8fc2f56d35bbd2012f86b0d0bfd42423aac6bc0897e682a76d99993d5941e449456224c8f2a84da58065cf91d7394940992a4ec8a01f965713941e45623b07ac6af0b7f692489d449ceaf6564188a463ead5e5d9b0742d027689c1de70cc5b2240b28cbfbf9df92c69aa0f57d92c9b9eeb0f10a48115a779dfae7516b00e48774d1322fd124ae7095b26c46265c0420131e47a73e715f64d2f7fc4c3af2dd9b1bc2fbec061810cb9b777e2ebcb1447405b57c7c73aa7526660d4fded315bb6c3704aa5d0639e93a6a95998a17796342a0c864b7ca825ba6ba91db9278a7e1c7bf64eac1c5f930d635345648b278b9be467903ae4fe4c9603d4367b5c20402292a0a44a6d65938403efdf9f478676e8a19312ad1f4fc15b3544a95e509ee2fe90797b3393996d2c2ab9b977136e0d926b88961fb398c89f0557a0c8e3edffce50b90d59ec6a95f232d0a47d9dddfbd9378113d07cba8d910e61bf229783914e468b26c6499901a60e4a8a545bf4979434a6eca5bfa3c96471137bf2fe96de4a251ad8b28d77cef039dbd96762801b4fbd79200278d5327bee9019d83851121a3fa749f11ed599c776133edd6736d235be078584c97e5dcfb49a11fe449837e83bfac1f02e406024ec5c687b63ce1d22fd205d0b322c10a1c4e7a366f29e275db3af62c0dcf9f45f1d31e3ff9bce17ef1d57acfd107691785f32d07101ffa429f3664a6d394ee8c50b4b850d24c62f84516c86af301eee341c135b82149024dbe0930fda79dbb446c1e184da8cf3a5fdbbdd04b64f6ca462cc233c162746eb2a8da2004de99f18fcb8b8e08a24a8a471123e6d58c946289255b5988031786fb869fa768006388c8fc1941190e26ca7b4f90c482e5d301ca913a7e4c8ae9dd8e0da97cbb59867f16fe4d6e20cc938e01ee44f69a152ac0e2503cdf91fc99e87c8b9ad301795c0727617d9866f19c0f67504158c22a193029b3effd41c4d3391f5767093444467788a385ea968d87133d5d34b0a667244e8d9039ad27e2c7116956f11435a1e7c1319fceaac06cbb3e1298e9829d6a7f1f0428f9cf6a6afc8a8c9ac4c156c5f91824b2fd715bc3c1546e5854b2d11a7e0a04f26e049723e7f7df2f59b115712cfb195de75abfcfaabc44fe767df8c839e951fefdf9aac650b0f20f30a8a2016e37908b51288c73db3e2d0921edce44c36361bd0ee333cab64cb3712b788dbbd5dcb2b823455df06a760114b7ca796d0c794c1d36bf3612fc46a372e7540dbc7cb5c4762cd1ef737bb2f446870b67e4d6007f6c6859fc5fac90730d7f2a9550be89e40f5a84a97fdc577bf49cd7eadd1225281d7d7fb1ef3ab0f3c002adcd6bca23a11e6c8543010e4c8c69b631552e80ecbe99db451a8ffb6bc59efacfd97de403521b5dd0235ff47c1d30e9013bb3050f802a916c2e457ddcd21d1d78948ab41b86655cd795edc81fe66d031d1dfebbd6136e541d65a5473fd81df473b5c5208048cac8e5bac415ba27b1352a744832270767d81db9e9b220878fe4a27bb8577feb251d2de367a7dfa2d78a0079b97a75bd93b868389c6e2ddd636dc8b163334fc416756fb5803dae91ca39967b8faac91e73eddb769702b8341a55b562171840d55a358458055d4c12615322b8f476c2d296b9ee3463d22e6bde669be9f1e665cbfafa60fc36e9e3b1a6f454a729b337bf4f58e287c0f6c7de1b9c04d84e55eb11316e968de8a9b60084948593a07d84c4eb9ca9102cde9c5a35d6718adbad97db0c080c11be1dfd5a1a8584d5044ec6638eeaefccbd387107b813ea7a87ca3c70fdb3086dca44e53d2375ef92bdbaddcf66529eac7916e7675d66475154663479a958fa9aecc8748d1cdeaaeaea03ae208277f0d871e57f1118c57acc5c1963c6d602987a6527c4c96102720cfac75b98d4f47798dfe2346a77a8e0c662c19f38bb05142bf9e0dc7622163ee33f6d3842221b0c93ad781ccdeb7b4f07987ac41705deadab115347a6aa884e7d9bf07a4fc343d04ab8b65f5b530a0534172c175e33bf36621f920f279dbc34e0ad654812daee3e3ba2839d54dd2f72108d0675efd284a6d2f24707dc95d61561e4b791f857e094a97a2f4d38e7d892421056420af1bd7c1c9befd2d2e1314e5660ec1d043355f45bbe4e810ac9351ad5838e32c5ce13946f9914b465948ffec79cbce249fe7d74e7988b48a54fc1335b5ce15bec2bfba5afaab5a3512d8ecb65e24114de54ee637a86588e1387dcb828ceed55c97e529b40dcfe02affa2a012dd16b999e683230ddf84209d1d6e9a6fcb1065dc0e5ac8a5560ffd8917d84b6df7238e50d8cc86ac96339c8ea7aa5dc0403bfb5f30b17d5d0a9579fce0315ef8739cf822bff1388875d41dac79b4d03f6c51bdbaf5cf13747f2885926d55373bebe9ce9ab169be7d2d03d6f6295566d9813fd296e884aa3be695115578e639af1bb4624e9ddbdfb4de5aa7b12325b482c8a259cfc2ddc489a06c641ae9c1a9186c8d338d8b4efe1effeba4ba1497d2b404cc6b8080e94423b35a20027ff2ddc4498cb3d822ea0ab655660e2d00199684d1d77de23a884fb5d814e8bcd49d554d3c8e1a64778d51bd28e471fe9379f19a7037a1c10e650f0118883a298991ca1bc778550e4a46e2f58894df5cac3e4a498e80dec975160900b22dd8f2d47c67c54b78ed5b4238458f37c58672607b4e61b45b6b28e6677535781e7b6d5c92580b617b1d0486afbe047b61868b8837"}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) [ 333.733691] input: syz1 as /devices/virtual/input/input557 [ 333.750296] print_req_error: I/O error, dev loop5, sector 0 04:37:48 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r1) sendmsg$NFT_MSG_GETSETELEM(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000040)={&(0x7f0000000380)={0x150c, 0xd, 0xa, 0x301, 0x0, 0x0, {0xc, 0x0, 0x1}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x14e0, 0x3, 0x0, 0x1, [{0x1408, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x2fc, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x34, 0x1, "f2a11a223631fd4e70fa0250e5d1db2eb53e5899b5f901f289d0a8e6ded5290aab41ddc7a8b64c7e3554e6a09a29a9de"}, @NFTA_DATA_VALUE={0xd3, 0x1, "3910ec7d995877eec2406d780c5d9038fb8a5954113644f7c29b9ca2dce4513b6484b51dc7f126a440e01bb12cf947f2acfdd9f5245070ee12be844d5cbafdd7a971985ae6ebcf75cfcff10efbfca98956afa76c0272337e9d4feaced05b404c253f1773e4ad5009fc4a44a5b0f9290690f9a23416827ae42b5dd590254cf6afa72151bae9de0d87426d0c572ad5dae13ac07ca9874c36e747740afde63e17765cf95cd570d6f6b1df7f42d34f9061741cf8dc6c58506bb5a582c12834ec633ff44af631ba856cbf77f2d6646e234d"}, @NFTA_DATA_VALUE={0xc1, 0x1, "3b95956fa7eccd4ec687b44d3c694c821eedf9332620a3527c8888b355034b79c5a5bf17a3289e6978ac26fb18c1ffddbf36183e981987bf8af2c392d8fbc74de192d6f880b4aee62e6b35baf930270627d9b5ebff12f1d06d690261ab49580c1293b547f1104fcbf93afa3770d49399f4853a1141076d84c0243c309e5196b495efb0f34c9299a4e97a122b2249c2e44f2dc60bb869f9515691d51aad85a81375c8647d90af130a5709db831679e5428fe14f253d2cfd602388bc31da"}, @NFTA_DATA_VERDICT={0x24, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFTA_DATA_VALUE={0x51, 0x1, "6f0fb35ff90e0f85e769bf598d32e9ce09effaa758e26a9dee29790c548b0883c5477622149ef8b08bd0f5cc939f9e02cd1b40d25d6c879a5612f102fdd0eb8dfb46ee7186f610a0246b2a588f"}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffb}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}]}, @NFTA_DATA_VERDICT={0x2c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VERDICT={0x5c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xffffffffffffffff}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VALUE={0xd, 0x1, "459941db0c5149b5d8"}]}, @NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x9}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x7}, @NFTA_SET_ELEM_DATA={0x10d8, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x18, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}]}, @NFTA_DATA_VALUE={0x62, 0x1, "188132ae6509875bf05e02922fbeda5c4ec94cff0932a082b82be698310cf2ab7ff3f8dd4df668797f3d8e97e959aaa26ee1cb1cefe83ce862e9f5a3c3e25dedc280a4adfda8201951ddc68656300f333d0cc4a4e9c104c15f68c2e726be"}, @NFTA_DATA_VALUE={0x54, 0x1, "e0c9e262376f423a52478ac445d7e5f3b8709658d1ada5ed77755065e62cdc044390e7130e1ac1f936f5b7e5abfe60e8919d66c39aac9f3a6ca17a6a4d5bc6326997be3013223548e569cd81027d32a5"}, @NFTA_DATA_VALUE={0x1004, 0x1, "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"}]}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}]}, {0xd4, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_DATA={0xd0, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0xb6, 0x1, "1ae5090579d6acf74b64b72c4e73ddf3186f3845f3515de4a3ff9523799b4d5ca0ee9cf1cc0f892d83ae12b303921a89fb1c5bab1115cb17fd4c1118177ec0d90558692e7b29e89fac65235f0534f6446f171447f66168002e275ccef52c9eadba31adcd4f88d000fa4a0c03c33bbbb24e61e0cf7d05b8dcbc345ac28089433c63403115bdfb25dfc420c5a71bb6060f08b43ddb20229eb12bf8bc1105db182caa375016fb2a01b6114ae7f04c0ac77a7b92"}, @NFTA_DATA_VALUE={0x11, 0x1, "91c4ca7f00bee2bae9e74dae5c"}]}]}]}]}, 0x150c}}, 0x20000080) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:37:48 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000d00200009800000000000000680100009800000000000000380200003802000038020000380200003802000004000000000000000000000010000000e00000020000000000000000626f6e645f736c6176655f310000000000000000000000000000e2ffffff001f00000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a45435400000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc18795000000000000000000000000000000000040000000000000000000000000000000000000010000000000000000000000a800d0000000000000000000000000000000000000000000380074696d650000000000554e8269000000000000000000000000000000000000000000ffffffff4f970000001b000000000000f9000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000ffff000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000380071756f7461000000000000000000000000000000000000000000000000000100000000deffff460d0000000000000000000000000000280052454a45435400000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028000000000000000000000000000000001ec500000000000000000000000000feffffff"], 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r1) tee(r0, r1, 0x3eed, 0x9) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000080)={0x200, 0x0, 0x200}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x56f}], 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/autofs\x00', 0x43a040, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000001600)=0x1, &(0x7f0000001640)=0x2) [ 333.847562] BTRFS error (device loop5): superblock checksum mismatch [ 333.871231] input: syz1 as /devices/virtual/input/input558 [ 333.910851] BTRFS error (device loop5): open_ctree failed [ 333.943114] input: syz1 as /devices/virtual/input/input559 [ 333.964331] print_req_error: I/O error, dev loop5, sector 0 04:37:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x408840, 0x0) ioctl$SNDRV_PCM_IOCTL_FORWARD(r1, 0x40084149, &(0x7f0000000180)=0xd70b) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r3) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x3c, r5, 0x923, 0x0, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}]}, 0x3c}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r5, 0xa, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e24}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008010}, 0x10) 04:37:48 executing program 1 (fault-call:0 fault-nth:63): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:48 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000380)={0x0, 0x5, "dfeff8e7c4"}, &(0x7f0000000480)=0xd) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 04:37:48 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fsetxattr$security_selinux(r1, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:scanner_device_t:s0\x00', 0x26, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:37:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 04:37:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r0) r1 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r1, 0x0, 0x0, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}}, 0x4000114) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x800, 0x70bd28, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4004841) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:48 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000d00200009800000000000000680100009800000000000000380200003802000038020000380200003802000004000000000000000000000010000000e00000020000000000000000626f6e645f736c6176655f310000000000000000000000000000e2ffffff001f00000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a45435400000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc18795000000000000000000000000000000000040000000000000000000000000000000000000010000000000000000000000a800d0000000000000000000000000000000000000000000380074696d650000000000554e8269000000000000000000000000000000000000000000ffffffff4f970000001b000000000000f9000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000ffff000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000380071756f7461000000000000000000000000000000000000000000000000000100000000deffff460d0000000000000000000000000000280052454a45435400000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028000000000000000000000000000000001ec500000000000000000000000000feffffff"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r1, &(0x7f0000000640)="dd8a59ee44155d31bbc943357379636530cf95a741ea27efae1e515c4e8022042954c0a67801affcd45dfa7638329947a3b6a25a64555f2f74daf16da4cd166301e594df730d7294bdb459ffa543818c0fad7d45275a3947884589b252930026121ef435d303e65fdb340536917de6e0da09b4927606a0442e2c4cdb6c6723cad24312b0b638479ca028e116a1c59876a131fa57dddb5d9a7ed87c0b23a413caa50226d6cbdfbfb1352830b8a482d549164391a3909680a790979e29fa0a613892ddc061393d0199a0aff322c375abec7422d9039461916cf25a2d", 0xfffffffffffffc6d, 0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=ANY=[], 0x1) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) mmap$dsp(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xe, 0x100010, r2, 0x0) [ 334.097906] FAULT_INJECTION: forcing a failure. [ 334.097906] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 334.116355] audit: type=1400 audit(1593837468.783:24): avc: denied { relabelto } for pid=25826 comm="syz-executor.0" name="UDP-Lite" dev="sockfs" ino=67426 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scanner_device_t:s0 tclass=rawip_socket permissive=1 [ 334.149605] input: syz1 as /devices/virtual/input/input560 [ 334.160744] CPU: 0 PID: 25825 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 334.168636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.178002] Call Trace: [ 334.180583] dump_stack+0x1b2/0x283 [ 334.184200] should_fail.cold+0x10a/0x154 [ 334.188335] __alloc_pages_nodemask+0x22b/0x2730 [ 334.193079] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 334.198171] ? debug_object_activate+0x450/0x450 [ 334.202910] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 334.207735] ? btrfs_parse_early_options+0x19d/0x310 [ 334.212823] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 334.217828] ? __lock_acquire+0x655/0x42a0 [ 334.222047] ? btrfs_kill_super+0x540/0x540 [ 334.226351] ? lock_acquire+0x170/0x3f0 [ 334.230316] alloc_pages_current+0xe7/0x1e0 [ 334.234620] ? trace_hardirqs_on+0x10/0x10 [ 334.238838] __get_free_pages+0xb/0x40 [ 334.242710] parse_security_options+0x1a/0x90 [ 334.247203] btrfs_mount+0x502/0x2838 [ 334.250993] ? pcpu_find_block_fit+0x2ed/0x380 [ 334.255560] ? pcpu_alloc+0x37d/0xf70 [ 334.259345] ? btrfs_remount+0x10c0/0x10c0 [ 334.263586] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 334.269019] ? rcu_read_lock_sched_held+0x10a/0x130 [ 334.274017] ? pcpu_alloc+0xe1/0xf70 [ 334.277729] ? __lockdep_init_map+0x100/0x560 [ 334.282215] ? __lockdep_init_map+0x100/0x560 [ 334.286698] mount_fs+0x92/0x2a0 [ 334.290086] vfs_kern_mount.part.0+0x5b/0x3c0 [ 334.294604] vfs_kern_mount+0x3c/0x60 [ 334.298396] btrfs_mount+0x2a0/0x2838 [ 334.302201] ? _find_next_bit+0xdb/0x100 [ 334.306277] ? pcpu_alloc+0x37d/0xf70 [ 334.310078] ? btrfs_remount+0x10c0/0x10c0 [ 334.314303] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 334.319741] ? rcu_read_lock_sched_held+0x10a/0x130 [ 334.324752] ? pcpu_alloc+0xe1/0xf70 [ 334.328459] ? pcpu_find_block_fit+0x380/0x380 [ 334.333024] ? __lockdep_init_map+0x100/0x560 [ 334.337504] ? __lockdep_init_map+0x100/0x560 [ 334.342025] mount_fs+0x92/0x2a0 [ 334.345381] vfs_kern_mount.part.0+0x5b/0x3c0 [ 334.349863] do_mount+0x3c9/0x25e0 [ 334.353388] ? copy_mount_string+0x40/0x40 [ 334.357608] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 334.362434] ? copy_mnt_ns+0x8a0/0x8a0 [ 334.366323] ? copy_mount_options+0x1ec/0x2e0 [ 334.370816] ? copy_mnt_ns+0x8a0/0x8a0 [ 334.374703] SyS_mount+0xa8/0x120 [ 334.378140] ? copy_mnt_ns+0x8a0/0x8a0 [ 334.382014] do_syscall_64+0x1d5/0x640 [ 334.385889] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 334.391060] RIP: 0033:0x45f57a [ 334.394233] RSP: 002b:00007f2401f3da68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 334.401927] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045f57a [ 334.409209] RDX: 00007f2401f3dae0 RSI: 00000000200001c0 RDI: 00007f2401f3db00 [ 334.416461] RBP: 000000000078bf00 R08: 00007f2401f3db40 R09: 00007f2401f3dae0 [ 334.423720] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 334.430973] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:49 executing program 3: openat$audio1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio1\x00', 0x1, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r0) ioctl$SNDCTL_DSP_GETTRIGGER(r0, 0x80045010, &(0x7f00000000c0)) 04:37:49 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x181200, 0x0) getpeername$netrom(r1, &(0x7f0000000040)={{0x3, @rose}, [@rose, @remote, @bcast, @bcast, @default, @bcast, @netrom, @netrom]}, &(0x7f0000000100)=0x48) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{0x0, 0xfffe}, 'syz1\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000140)={0x10001, 0x2, 0x40}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vim2m\x00', 0x2, 0x0) ioctl$FITHAW(r4, 0xc0045878) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:37:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000080)={'security\x00', 0x3, [{}, {}, {}]}, 0x58) [ 334.502598] input: syz1 as /devices/virtual/input/input561 [ 334.530729] BTRFS error (device loop5): superblock checksum mismatch [ 334.587862] input: syz1 as /devices/virtual/input/input562 [ 334.620570] BTRFS error (device loop5): open_ctree failed 04:37:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x2200, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000080)={0x3, [0x0, 0x0, 0x0]}) 04:37:49 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r1) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8082, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x4c2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fe) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 334.642383] input: syz1 as /devices/virtual/input/input563 04:37:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x200000000, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFNL_MSG_ACCT_GET(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x1, 0x7, 0x301, 0x0, 0x0, {0x3, 0x0, 0x2}, [@NFACCT_BYTES={0xc, 0x3, 0x1, 0x0, 0xad}, @NFACCT_QUOTA={0xc, 0x6, 0x1, 0x0, 0x3}, @NFACCT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000010}, 0x20) 04:37:49 executing program 1 (fault-call:0 fault-nth:64): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:49 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="2bfcffffff0000001c0012800b00010067656e65766500000c000280060005000000000008000500", @ANYRES32=r6, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r6, @ANYBLOB], 0x4c}}, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000380)=0xd718, 0x4) 04:37:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) socketpair(0x4, 0x5, 0x5, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$OSF_MSG_ADD(r0, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000340)={0xbb8, 0x0, 0x5, 0x801, 0x0, 0x0, {0x0, 0x0, 0x4}, [{{0x254, 0x1, {{0x2, 0x200}, 0x1f, 0x7f, 0x2, 0xff, 0x12, 'syz1\x00', "291a76acc344e61535975e4f6038312394439dea02492da5a9f9ddde9e352445", "3796a05f5027c3391e031e2075b1e0e475fbfe17795e54efac6f2bbb53c757ec", [{0x0, 0x3, {0x2, 0x6e}}, {0x6e46, 0x1, {0x0, 0x1ff}}, {0x5b20, 0x1, {0x2, 0x7c}}, {0x23, 0x8, {0x1, 0x7}}, {0x9640, 0x4c1, {0x2, 0x2}}, {0xffff, 0x2, {0x3, 0x1ff}}, {0x2d, 0x0, {0x0, 0x5}}, {0x0, 0xd0, {0x1, 0xc6}}, {0x40, 0x2, {0x2, 0xffffffff}}, {0x4, 0x8, {0x2, 0x9}}, {0x8, 0x81, {0x2, 0x4}}, {0x0, 0x4, {0x0, 0x4}}, {0xffff, 0x3, {0x1, 0x800}}, {0xfff, 0x229, {0x1, 0x18000}}, {0xfffb, 0x3, {0x0, 0x800}}, {0x40, 0xff, {0x3, 0x1000}}, {0x3f, 0xd8a, {0x0, 0x7}}, {0x8, 0x6, {0x1, 0x6}}, {0x200, 0xc08e, {0x1, 0x7ff}}, {0x8, 0x7, {0x3, 0xd1}}, {0x0, 0x186, {0x0, 0x20}}, {0x5, 0x5, {0x1, 0x3}}, {0x7, 0x7, {0x3, 0x2}}, {0x7f, 0x8, {0x1, 0x20}}, {0x4, 0xfff7, {0x2, 0x101}}, {0x5, 0x100, {0x3, 0x80c}}, {0xd79c, 0xffc3, {0x3, 0x7}}, {0xffff, 0x916, {0x1, 0xffffffff}}, {0x4, 0x3, {0x3, 0x7}}, {0xfffa, 0xfe00, {0x3, 0x8}}, {0x1000, 0x40, {0x3, 0x9}}, {0x1, 0x70f, {0x1, 0x3}}, {0x6, 0x1, {0x1, 0x20}}, {0x8, 0x3, {0x2, 0x3f}}, {0x0, 0x4, {0x3, 0x7}}, {0x3, 0x5, {0x1, 0x1}}, {0x4, 0x3, {0x3, 0x3f}}, {0xb1, 0x7, {0x1, 0x19}}, {0x2fb5, 0x5, {0x1, 0x7}}, {0x5a5, 0x200, {0x2, 0x800}}]}}}, {{0x254, 0x1, {{0x3, 0x1}, 0x6, 0x1, 0xe45, 0x0, 0x11, 'syz1\x00', "dbb936eddda04ddd582a5a4f4a03421e364b1bfaed5d5554ac0d3431f601dff8", "69a9d59689db3d81746a32a97bdeaf4aff3a165d15a5076e0c906d21001a14f4", [{0x3, 0x772, {0x2, 0xffffffff}}, {0x7b26, 0x8000, {0x0, 0x7}}, {0x0, 0x5, {0x3, 0xffff8001}}, {0x200, 0x9, {0x2, 0x3}}, {0x1369, 0x4d2, {0x3, 0xfffffffe}}, {0x20, 0x42, {0x1, 0x7f}}, {0x2, 0x3, {0x1, 0x8}}, {0x2, 0x8, {0x0, 0x9}}, {0x9, 0x2, {0x2, 0x2}}, {0x3f, 0x3ff, {0x1, 0x7fff}}, {0x1, 0x1, {0x1, 0x7fffffff}}, {0xc3b, 0x400, {0x2, 0x9}}, {0x8, 0x1, {0x3, 0x8}}, {0xbae, 0x8, {0x0, 0x329f}}, {0x40, 0x1000, {0x2, 0x8}}, {0x2, 0x0, {0x0, 0x6}}, {0x0, 0x800, {0x1, 0xccbc}}, {0x5, 0xfff}, {0x1, 0xfff, {0x1, 0x7fff}}, {0x7, 0x71, {0x2, 0x8}}, {0xff80, 0x5, {0x3, 0x2a0}}, {0x40, 0x0, {0x1, 0x6c}}, {0x1, 0x5, {0x0, 0x10001}}, {0x9, 0x85, {0x0, 0x4}}, {0x3, 0x3, {0x2, 0x5}}, {0x8, 0x3, {0x1, 0x8}}, {0x6, 0x7, {0x2, 0xfff3}}, {0x1, 0x7ff, {0x3, 0x7}}, {0x9, 0x5, {0x2, 0x1f}}, {0xfffb, 0xc6, {0x1, 0x1}}, {0x1, 0x6, {0x2, 0xffff}}, {0x5, 0x7eb, {0x2, 0x5}}, {0x2, 0x130, {0x1, 0x80000000}}, {0x0, 0x4, {0x2, 0x5}}, {0x7ff, 0x2, {0x3, 0x1000}}, {0x100, 0x5, {0x1, 0x1000}}, {0xfffe, 0x7, {0x3, 0x1}}, {0x7fff, 0x6, {0x3, 0x9d5}}, {0x81, 0xfffe, {0x0, 0xc3}}, {0x4a9f, 0x7, {0x1, 0x5}}]}}}, {{0x254, 0x1, {{0x2, 0x80000000}, 0x20, 0xd9, 0xfff, 0x8, 0x21, 'syz0\x00', "4b4ec9e2364231dbe0af8d17f134fe58144ee6e024f1d78b13d0af4cb0ad01ea", "7e243f1e740fa47da87efd95ee3c3bf9dc0d7b362ba7d2bd1e2370197b327985", [{0x40, 0xf4b5, {0x1, 0x40}}, {0x3, 0x2546, {0x3, 0x800}}, {0x5, 0x0, {0x0, 0x3}}, {0x5, 0xff7f, {0x1, 0x7}}, {0x20, 0xf50, {0x2, 0x7}}, {0x3f, 0x1ff, {0x3, 0x1}}, {0x2, 0xfff, {0x0, 0x1}}, {0x1186, 0x5, {0x0, 0x400}}, {0x0, 0x1ff, {0x3, 0xffffffff}}, {0x35, 0xd5, {0x1}}, {0x1, 0x80, {0x3, 0x9}}, {0x0, 0x4, {0x2, 0x6}}, {0xff, 0x6, {0x0, 0x4}}, {0xf56, 0x4, {0x1, 0x80000000}}, {0x401, 0x1f, {0x2, 0x8f2}}, {0x4, 0x8, {0x2, 0x8}}, {0x6, 0xbf8, {0x2, 0x8}}, {0x3f, 0x3, {0x1, 0x5}}, {0x2, 0x7, {0x0, 0x2}}, {0x4, 0x8cb, {0x3, 0x6}}, {0x3, 0x7f, {0x0, 0xc5}}, {0xccbb, 0x1f, {0x3, 0x80000001}}, {0x2, 0x8001, {0x0, 0x1}}, {0x8, 0x8000, {0x2, 0x53ab}}, {0x8, 0x81, {0x2, 0xdf56}}, {0x3f6, 0x7, {0x0, 0x38a9}}, {0x9, 0x8, {0x3, 0x7}}, {0x4, 0xd05, {0x2, 0x44d}}, {0x9, 0x1e, {0x1, 0x2}}, {0x8cce, 0xfeff, {0x2, 0x7f}}, {0x3ff, 0x4, {0x3, 0xc8f8}}, {0x9, 0x4, {0x0, 0x5}}, {0x7ff, 0x7, {0x2, 0x805}}, {0x400, 0x93, {0x0, 0x10001}}, {0x1, 0x1c91, {0x0, 0x8}}, {0x400, 0xfcc, {0x1, 0x9}}, {0x8, 0x9, {0x3, 0x5}}, {0x0, 0x6, {0x1, 0x4}}, {0x8, 0x6, {0x0, 0x1a}}, {0xb4d, 0x7e9, {0x3, 0x3f}}]}}}, {{0x254, 0x1, {{0x3, 0x3}, 0x81, 0x7, 0x5, 0x8, 0x18, 'syz0\x00', "65150653706f6efb538d541f40b3bc72b7bc2ae3e41348573d92edf6b188e4b2", "a9a5cfc8f21981cd5e587ae581b114b7a8f5db445d107358d141208fd6ebc183", [{0x7, 0xfff8, {0x2, 0xffff}}, {0x0, 0xffff, {0x0, 0x2}}, {0x1, 0x7fff, {0x3, 0x78f}}, {0x67, 0x9, {0x0, 0xfff}}, {0x7, 0x2, {0x3, 0x1}}, {0x1, 0x4, {0x1, 0x5}}, {0x0, 0x8, {0x2, 0x9}}, {0x3, 0x6, {0x0, 0x70}}, {0x38, 0x2, {0x3, 0x3}}, {0x401, 0x1000, {0x3, 0xc7d}}, {0x1ac, 0x9, {0x3, 0x5ac4}}, {0x8000, 0x1a, {0x1, 0x1f}}, {0x9, 0x9, {0x1, 0xff2}}, {0xc000, 0x5, {0x2, 0xff}}, {0x8, 0x8001, {0x1, 0x6}}, {0x7fff, 0x4, {0x0, 0x401}}, {0x2, 0x4, {0x2, 0x2}}, {0x2008, 0x400, {0x1, 0x935c}}, {0xcf5c, 0x9, {0x1, 0x3ff}}, {0xb8, 0x81, {0x1, 0x8}}, {0x9, 0xbb2, {0x3, 0x7fffffff}}, {0x5, 0x400, {0x3, 0x47}}, {0x7, 0x3ff, {0x2, 0x9}}, {0x8, 0x5751, {0x1, 0x81}}, {0xfada, 0x3d3, {0x0, 0x8}}, {0x80, 0xff, {0x3, 0x8}}, {0x3, 0xff, {0x3, 0xfa4}}, {0x7, 0x4, {0x1, 0x1f67}}, {0x6, 0x9, {0x1, 0x8}}, {0x9, 0x4fb8, {0x3, 0x800}}, {0x9b5a, 0x5, {0x0, 0x5}}, {0x1, 0x9, {0x0, 0x556a}}, {0x0, 0x8, {0x3, 0x7fffffff}}, {0x1, 0x4, {0x3}}, {0x3ff, 0x6943, {0x0, 0x9}}, {0x6, 0x48e8, {0x0, 0xfffffff7}}, {0x3f, 0x5, {0x1, 0xfffffff9}}, {0x0, 0xff, {0x0, 0x9}}, {0x4, 0xfff, {0x1, 0x1000}}, {0x3, 0x7f, {0x3, 0x2}}]}}}, {{0x254, 0x1, {{0x2, 0x1c6000}, 0x5, 0xfa, 0x4, 0x5, 0x28, 'syz0\x00', "131c039523d3bec35ac70d83bd155f289f5fb9667aec72ff783c3afaab845584", "f86b3aa04585c972d2d53f79af51442e600a5a94cc5411f6bce4474773a1bb5c", [{0x3, 0x100}, {0x8, 0xffd0, {0x2, 0x7fffffff}}, {0x0, 0x400, {0x0, 0x7fff}}, {0x0, 0x4, {0x1, 0xcb1}}, {0x2, 0x1000}, {0x5, 0x6, {0x2, 0x9}}, {0x4e, 0x11e, {0x3, 0x5}}, {0x101, 0x1, {0x2, 0x1}}, {0x9, 0xe5, {0x0, 0x200}}, {0x6, 0x9, {0x0, 0x80}}, {0x2, 0x3f, {0x2, 0x5}}, {0x4, 0x3, {0x3, 0x80}}, {0x7, 0xb91d, {0x3, 0x4}}, {0x80, 0x3, {0x3, 0x3}}, {0x7514, 0x0, {0x0, 0x1}}, {0x9, 0x3ff, {0x0, 0x8}}, {0x1, 0x7, {0x3, 0x7}}, {0xe3, 0x8001, {0x2, 0x7}}, {0x5, 0x1000, {0x3, 0x5}}, {0x400, 0x6, {0x3, 0x4}}, {0x6, 0x5, {0x3, 0x107a}}, {0x4, 0x2, {0x1, 0x8000}}, {0xf199, 0x583, {0x2, 0x401}}, {0x7fff, 0x160c, {0x3, 0x4}}, {0x4, 0x1ff}, {0x1, 0x101}, {0x3ff, 0x8, {0x3, 0x200}}, {0x401, 0x8, {0x3, 0x5ebe}}, {0x2ed9, 0x0, {0x1, 0x40}}, {0x7f, 0xe09b, {0x3, 0x100}}, {0x1000, 0x7fff, {0x2, 0xea}}, {0x5, 0x6d7a, {0x0, 0x2}}, {0x0, 0x1, {0x1, 0x1}}, {0xff, 0x1, {0x2, 0xfffff570}}, {0x3f, 0x286c, {0x1, 0x3}}, {0x3, 0x1000, {0x1, 0x2}}, {0x7ff, 0x8000, {0x1, 0x3}}, {0x401, 0x8000, {0x0, 0x40}}, {0xfff, 0x0, {0x3, 0x5}}, {0xd, 0x1, {0x3, 0x7fff}}]}}}]}, 0xbb8}, 0x1, 0x0, 0x0, 0x40}, 0x40000) [ 334.757556] input: syz1 as /devices/virtual/input/input564 [ 334.771349] FAULT_INJECTION: forcing a failure. [ 334.771349] name failslab, interval 1, probability 0, space 0, times 0 [ 334.796942] BTRFS error (device loop5): superblock checksum mismatch [ 334.817436] CPU: 1 PID: 25913 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 334.825323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.834671] Call Trace: [ 334.837267] dump_stack+0x1b2/0x283 [ 334.840899] should_fail.cold+0x10a/0x154 [ 334.845053] should_failslab+0xd6/0x130 [ 334.849027] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 334.853709] selinux_parse_opts_str+0x48d/0xa00 [ 334.858376] ? debug_object_activate+0x450/0x450 [ 334.863132] ? selinux_key_alloc+0x1a0/0x1a0 [ 334.867550] ? selinux_sb_copy_data+0x206/0x380 [ 334.872227] security_sb_parse_opts_str+0x6e/0xa0 [ 334.877069] parse_security_options+0x49/0x90 [ 334.881561] btrfs_mount+0x502/0x2838 [ 334.885364] ? pcpu_find_block_fit+0x2ed/0x380 [ 334.889947] ? pcpu_alloc+0x37d/0xf70 [ 334.893779] ? btrfs_remount+0x10c0/0x10c0 [ 334.898022] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 334.903475] ? rcu_read_lock_sched_held+0x10a/0x130 [ 334.908487] ? pcpu_alloc+0xe1/0xf70 [ 334.912206] ? __lockdep_init_map+0x100/0x560 [ 334.916697] ? __lockdep_init_map+0x100/0x560 [ 334.921199] mount_fs+0x92/0x2a0 [ 334.924576] vfs_kern_mount.part.0+0x5b/0x3c0 [ 334.929077] vfs_kern_mount+0x3c/0x60 [ 334.932880] btrfs_mount+0x2a0/0x2838 [ 334.936701] ? _find_next_bit+0xdb/0x100 [ 334.940758] ? pcpu_alloc+0x37d/0xf70 [ 334.944569] ? btrfs_remount+0x10c0/0x10c0 [ 334.948806] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 334.954256] ? rcu_read_lock_sched_held+0x10a/0x130 [ 334.959265] ? pcpu_alloc+0xe1/0xf70 [ 334.962985] ? pcpu_find_block_fit+0x380/0x380 [ 334.967563] ? __lockdep_init_map+0x100/0x560 [ 334.972059] ? __lockdep_init_map+0x100/0x560 [ 334.976617] mount_fs+0x92/0x2a0 [ 334.979991] vfs_kern_mount.part.0+0x5b/0x3c0 [ 334.984492] do_mount+0x3c9/0x25e0 [ 334.988038] ? copy_mount_string+0x40/0x40 [ 334.992272] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 334.997161] ? copy_mnt_ns+0x8a0/0x8a0 [ 335.001072] ? copy_mount_options+0x1ec/0x2e0 [ 335.005575] ? copy_mnt_ns+0x8a0/0x8a0 [ 335.009519] SyS_mount+0xa8/0x120 [ 335.012973] ? copy_mnt_ns+0x8a0/0x8a0 [ 335.016866] do_syscall_64+0x1d5/0x640 [ 335.020758] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 335.025943] RIP: 0033:0x45f57a [ 335.029128] RSP: 002b:00007f2401f3da68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 335.036839] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045f57a [ 335.044117] RDX: 00007f2401f3dae0 RSI: 00000000200001c0 RDI: 00007f2401f3db00 [ 335.051379] RBP: 000000000078bf00 R08: 00007f2401f3db40 R09: 00007f2401f3dae0 [ 335.058661] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 335.065927] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:49 executing program 1 (fault-call:0 fault-nth:65): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:49 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{0x200}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 335.109116] BTRFS error (device loop5): open_ctree failed [ 335.203173] BTRFS error (device loop5): superblock checksum mismatch [ 335.213844] FAULT_INJECTION: forcing a failure. [ 335.213844] name failslab, interval 1, probability 0, space 0, times 0 [ 335.238271] nla_parse: 4 callbacks suppressed [ 335.238285] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 335.241794] CPU: 0 PID: 25953 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 335.244409] input: syz1 as /devices/virtual/input/input566 [ 335.251357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.251361] Call Trace: [ 335.251380] dump_stack+0x1b2/0x283 [ 335.251397] should_fail.cold+0x10a/0x154 [ 335.251413] should_failslab+0xd6/0x130 [ 335.251424] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 335.251438] selinux_parse_opts_str+0x4f8/0xa00 [ 335.251448] ? debug_object_activate+0x450/0x450 [ 335.251461] ? selinux_key_alloc+0x1a0/0x1a0 [ 335.251477] ? selinux_sb_copy_data+0x206/0x380 [ 335.274285] security_sb_parse_opts_str+0x6e/0xa0 [ 335.274300] parse_security_options+0x49/0x90 [ 335.274310] btrfs_mount+0x502/0x2838 [ 335.274324] ? _find_next_bit+0xdb/0x100 [ 335.274335] ? pcpu_alloc+0x37d/0xf70 [ 335.274346] ? btrfs_remount+0x10c0/0x10c0 [ 335.274364] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 335.274375] ? rcu_read_lock_sched_held+0x10a/0x130 [ 335.347353] ? pcpu_alloc+0xe1/0xf70 [ 335.351078] ? __lockdep_init_map+0x100/0x560 [ 335.355569] ? __lockdep_init_map+0x100/0x560 [ 335.360066] mount_fs+0x92/0x2a0 [ 335.363448] vfs_kern_mount.part.0+0x5b/0x3c0 [ 335.367944] vfs_kern_mount+0x3c/0x60 [ 335.371750] btrfs_mount+0x2a0/0x2838 [ 335.375545] ? _find_next_bit+0xdb/0x100 [ 335.379587] ? pcpu_alloc+0x37d/0xf70 [ 335.383373] ? btrfs_remount+0x10c0/0x10c0 [ 335.387587] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 335.393014] ? rcu_read_lock_sched_held+0x10a/0x130 [ 335.398020] ? pcpu_alloc+0xe1/0xf70 [ 335.401712] ? pcpu_find_block_fit+0x380/0x380 [ 335.406272] ? __lockdep_init_map+0x100/0x560 [ 335.410755] ? __lockdep_init_map+0x100/0x560 [ 335.415228] mount_fs+0x92/0x2a0 [ 335.418600] vfs_kern_mount.part.0+0x5b/0x3c0 [ 335.423098] do_mount+0x3c9/0x25e0 [ 335.426616] ? copy_mount_string+0x40/0x40 [ 335.430830] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 335.435647] ? copy_mnt_ns+0x8a0/0x8a0 [ 335.439508] ? copy_mount_options+0x1ec/0x2e0 [ 335.443994] ? copy_mnt_ns+0x8a0/0x8a0 [ 335.447858] SyS_mount+0xa8/0x120 [ 335.451286] ? copy_mnt_ns+0x8a0/0x8a0 [ 335.455152] do_syscall_64+0x1d5/0x640 [ 335.459035] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 335.464203] RIP: 0033:0x45f57a [ 335.467374] RSP: 002b:00007f2401f3da68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 335.475057] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045f57a [ 335.482303] RDX: 00007f2401f3dae0 RSI: 00000000200001c0 RDI: 00007f2401f3db00 [ 335.489563] RBP: 000000000078bf00 R08: 00007f2401f3db40 R09: 00007f2401f3dae0 [ 335.496813] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 04:37:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f00000001c0)=0x0, &(0x7f0000000540)=0x4) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000001c00)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001bc0)={&(0x7f0000000580)={0x1604, 0x12, 0x8, 0x70bd26, 0x25dfdbfe, {0x28, 0x1, 0x5, 0x5, {0x4e21, 0x4e23, [0x4fa1939a, 0xce1, 0x5, 0x7], [0xfea, 0x7fffffff, 0x0, 0x20], r3, [0x400]}, 0x3f, 0xffff}, [@INET_DIAG_REQ_BYTECODE={0x8f, 0x1, "4f6493835f3d088af1ef56c977d85c5d1b2810b76a110fee30a358b2e7688542fbf31c1a4157a6ed5ab21ccf7da3a50bd1cc048f44e671bfa07027531ca2b2d968aec91a77e9ba94398535a39a2ccfe87853f99fb37bec8d0f79d6523bc07122a7579f860ae1ba44f135770e14fce01696a7560d721967fe1984f1f711abced1ba206617d11953ba72b4d2"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0xd4, 0x1, "7bda73aa9800e590833a929ed6a892c2f5d6dff3c7fe14bc409be473eaa95b649ab535748a20a3f608642d8c01023b5d14266a27fb91497622a9bfd90ca17a977b6edf6468fd0840ec6eef6a126a829ceb1d2dff34c31a6d9a05f29c34a3fb82ba85ed3d0541e9e6853480af245490a8249ce20fd5137d1ee6c9aab0abf914b4a95caafc39794ab4dc265731a402432baf003fc9eb1c26de5d94bc15428349bf65ac56eebd8ca806c02fd4e39afd1f37c7f0feecc092e623a2223cbc5d981a04ab09c8c5e9f08fea0323445261436031"}, @INET_DIAG_REQ_BYTECODE={0x4e, 0x1, "86207590e7b0e72e5483be5572dbc678f5cb2f63b36541e25d0efc89aa991642278585d75e7f08b627e8c3a869da7ae0ffbf688409ffbefd9ce8f15322642da0713bb5a82852797374f8"}, @INET_DIAG_REQ_BYTECODE={0x8c, 0x1, "1721db2012e06c9b9c2ec30b14bc5f1cf776f531b9b2ab867ba683df489c28185e9431735d7f0fac0b201eb57ff8a755860ebfbb771125333eba9e755b2bb581d60490467457705f5ced7651a9e101a72ef581cff27e16ed00581a1dde9ae74093fcf3f11c8e85bfd017ab4447daade8427aacfc27d2bdaa0033c93835c0c69a0cecb08c474a05e2"}, @INET_DIAG_REQ_BYTECODE={0xaf, 0x1, "2f9bd6350da51a89eef591ca5b6514518b9fbaf0c15027172ca746cfa43c76a27412516c6ab3965cfb0c4acceca45ba63a1c9985e11044bfa61757f2255838b656d207405caa6469d5b7f6317657ac4581fc9275f0e4baa2067314e317b40ae79ca2f3dfe5d293f32b08fe0700c060d63610be589498ddaec6a4b45652abdab09d29a3e023234553cd87219bb5b45a12846bce9e170aab41f670177238c942e3b636c700e01fb0f9f8447c"}, @INET_DIAG_REQ_BYTECODE={0xfd, 0x1, "8de60a4952594eb9b8f634917d69232aca3e179f74ba5f01cbc3f7a3abc63401a59e3659af5cf480514b157f8545d92b31b7b5a5b2cb292f00574b858ba9b0d8b6292ee99c663a3c4047eb50f6386983e107a7f2a3297bee0064805a3d7c5eed18815c698d543fdd7f9eb5673d74e96409bea1b96c00d310415cef2c4e38b01cbfc72e92c1e53b5f3f38facd2c6d47c260fbf61a9d258743f0d7bc9e7b46f542fed8c770318dfe67f4efbd2274446dd8682034972ca0173b2077c0ecdf79f4d72c8df7032925f5378b394d61d87c9b20bd3133e97b49c4dd1a2773abc586a12992f5d243d78986352b961e24604d7154abf053757589b4f81e"}, @INET_DIAG_REQ_BYTECODE={0xc1, 0x1, "c4b5f52f85ea1f6ff7952c6dd91df68db86ac89bb272a4d3c12db14e4e2657cdab41eb1937b25426fb9ef98702b8682551f91c93681361087afcf8cff4c7216df28ac6e8280332dad53a217501058450055fc5e8e960ae8c6d7afbe560ac21edeb5ae598ee66fa9ada4beddbd2041f7d061b0d032c5c0c6b2dded7b8d345d75c2af705b192d6fa8692e15808347329e6995e3a742aba93a3e55f72013202ed34e1cf4dac8361e82b6909c527faf82775901934e66c8bbb7cf4f9be4a22"}, @INET_DIAG_REQ_BYTECODE={0x5c, 0x1, "e284bf44cdbf81f01cfc6382ed062998f7aa9a862101815826f1bd7eb6b8b94213432e3befdc340d4dcbe37bdd7330d3527da7415e3e2c5c0c75d1a6cf6de720e037301890270d026f8f2589405fb795da0218de4a78f59c"}, @INET_DIAG_REQ_BYTECODE={0xa2, 0x1, "77c35c3390216b77758304fa29d6f5f74f220f3c7d0522ae1c39af3b5dcaec901f97339d13555878926e309836abd8a3b98aa608d9fd2a1e51c01c07611d7dddec690e3a42ae674563ae8c63cacf4cb82971840da8c6fc659e42918798382023a45267b388508dbd79f3563e181e038ee2adab635eff2987ea2dde93dd24029cc28c231191f4d0e32d4ac2f86a6c7015e9763f4facddd62cce8a20657656"}]}, 0x1604}, 0x1, 0x0, 0x0, 0x40}, 0x820) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r4, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') sendmsg$NL80211_CMD_SET_REG(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x30, r6, 0xa01, 0x0, 0x0, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8}, @NL80211_ATTR_REG_RULES={0xa, 0x22, 0x0, 0x1, [@NL80211_ATTR_DFS_CAC_TIME={0x8}]}]}, 0x30}}, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r7, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r7, &(0x7f0000000640)="dd8a59ee44155d31bbc943357379636530cf95a741ea27efae1e515c4e8022042954c0a67801affcd45dfa7638329947a3b6a25a64555f2f74daf16da4cd166301e594df730d7294bdb459ffa543818c0fad7d45275a3947884589b252930026121ef435d303e65fdb340536917de6e0da09b4927606a0442e2c4cdb6c6723cad24312b0b638479ca028e116a1c59876a131fa57dddb5d9a7ed87c0b23a413caa50226d6cbdfbfb1352830b8a482d549164391a3909680a790979e29fa0a613892ddc061393d0199a0aff322c375abec7422d9039461916cf25a2d", 0xfffffffffffffc6d, 0x0, 0x0, 0x0) ioctl$sock_SIOCADDRT(r7, 0x890b, &(0x7f0000001c40)={0x0, @phonet={0x23, 0xfa, 0x7f, 0x1}, @ethernet={0x306, @local}, @can={0x1d, r3}, 0x52, 0x0, 0x0, 0x0, 0x200, &(0x7f0000000080)='veth1\x00', 0x9, 0x4, 0x2}) sendmsg$NL80211_CMD_NEW_INTERFACE(r4, &(0x7f0000001d80)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000001dc0)=ANY=[@ANYBLOB="b82825da8e08607938068c21d7b35df1ff3e820e3042b769a0d475da813521fd90da8ce57648a7f3b5675373ccac7eb6641d000000000000240000000000000000", @ANYRES16=r6, @ANYBLOB="000328bd7000fedbdf250700000008000100030000001400040076657468305f746f5f6272696467650014000400626f6e645f736c6176655f300000000008000300", @ANYRES32=r8, @ANYBLOB="14000400766c616e3000000000000000000000000800050007000000080001000200000014000400"/56], 0x84}, 0x1, 0x0, 0x0, 0x2000c848}, 0x1) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) 04:37:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000040)='./file0/file0\x00', 0x4, 0x0, &(0x7f0000000040), 0x0, 0x0) r0 = shmat(0x0, &(0x7f0000ffb000/0x2000)=nil, 0x4000) shmdt(r0) shmdt(r0) [ 335.504063] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:50 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000080)=0x60, 0x2) r3 = socket$inet_udp(0x2, 0x2, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0xc000, 0x3) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="cd5929a0b0a023088404e8b09635f79c27ad7401ea38f3f157f46e733f55464b4d08f3770f54ec7b48041128cdd95cf856a813e689d3c353752b41d9b61b845898a30471f764a1171d735948e8e1e5ac06a1dc567eb8479013650f39f24901a7a97cd0d64fea4945c5d14292dc1d0f5829f2893a1b1c0a2390256fefe781e1f15c853c83f21db055e0d90e22302bb3fab27d99d1823c758a37a59a14094e496c56e807ffa4cf73bd306f8257d761a0a1bde121dcd5c1898628d7dd7408d37179dc060948492d3ac3fd9b5f4776867882c5"], 0x1) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) 04:37:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x80, 0x0) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f00000000c0)) r1 = geteuid() syz_mount_image$vfat(&(0x7f0000000100)='vfat\x00', &(0x7f0000000140)='./file1\x00', 0x8, 0x7, &(0x7f0000000680)=[{&(0x7f0000000200)="182c90cd46f0a2a1031f69e29308e65c4eb282ceb61d1b467c02767aacad059df91fad7683c06f031d24f87c3a520bf61c621602bd06933cc5d91f4f987faf5b97d51b60ce32e397ad0d453c215b450df4c5763fe0c1f744cd19f6aba32758089caaf37442ee510fb9b4eb5a468fcfc85e0d1069decd17cb06362e31e03db7f106411a199ad798ce6bf853958272a4af7492a157da7461f824dc611a9888d4b17569e7049fb4450b402018fdf87e2181", 0xb0, 0x24}, {&(0x7f0000000180)="739516d4e733574d4392477b991a7caa72fde65dd262d80be0ffc99721e13a0d1350b2902b353896af1b4ea05f0362579f6b96dba25d6d3926a1681d", 0x3c, 0x3c8}, {&(0x7f0000000340)="bfc583a4a6f6aece8c6f815764a94b84a3ba69fb680dcbcc7c46a047745207554e74cfd20ac92ffc2a20ac05df4e7d625be2da8dbb92f3f1b0f891c2c56ccbaa3eab8bbec9c0411dc3a25c348ffaa090a28c9d1622d590119c245a36d0064fd570dfd008dbc0ec6af6d2ee11e65a0b5b8f584e5d5d9de925bbeec91304517a06e191bc26a5e3fdf7e3012c4a18c533bdb2d6420bcf07d31f070068266b0f846c6717f35eaa34ff09988960a803c7758629d7e14d2143cec949f9e3960e9d", 0xbe, 0x8}, {&(0x7f0000000400)="511d6696e103195e104669604a8f45cb220c50f6476adf661be0486669d3841d55ebb8c252fa29ea7acb652751643b3405cb7872637964888be7a30d2febe1563fa564dc2cd335c5ed80b23d0a2e770b5b42a7b23f4a4883390dd3abf60fcc0d91f1654abb41380fb83daa30355baec6ff20351d04183bdbf1fb21d243bf081e8a33a383e1ddfa3940698ed8b385b8459e19aa86d23add293f12", 0x9a, 0x8}, {&(0x7f00000004c0)="d8b07a7fb7621c2c5502583f95ed23213defe0707f9c1684532b0806dc0ecc61ba0d1d38291c1efa6edc1de34fc3b9e2a8d716339aabfa735c08d812a474ef67b4e1654322c36b790349e2a7f7b555ee0119ff432d88010b6420799d1acf9f30fd83b5a4407366d6fb8426975ef99565575495c7c140d14f17878479e567de9a8e04a38bcadc84158f73eabe4347e61679c81addea82fd9cef344c2bf018803f45eb906f5cf8860916781930fcbbbbbdcbe2d87243a81cf945cef5d051aa1126d7ed19", 0xc3, 0x7}, {&(0x7f00000005c0)="b4aac0a7edeeccff789a6dd26344f0d45a4b83fc0dc96177d5", 0x19, 0x100}, {&(0x7f0000000600)="abdde231a61120e6f20f20e3fe29535c582baff36da61a08299e8774c4b6878a6b3b9c849055f61bc62bb42382a3772711a0b7531d680f8d755eea94e6af0de39397a1bf526b06affbef89eaa5ac88a9a11984fbff6b79736729a59a04ff947628c74a80795105bf79f2c9bb4f7429b3b0d275", 0x73, 0x3e6ccd09}], 0x2000000, &(0x7f00000007c0)=ANY=[@ANYBLOB='utf8=1,nonumtail=0,pcr=00000000000000000024,appraise_type=imasig,seclabel,euid<', @ANYRESDEC=r1, @ANYBLOB="2c1006b1"]) 04:37:50 executing program 1 (fault-call:0 fault-nth:66): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:50 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x5a, 0x0, 0x9, "f7db6d4f0b4863d678e39b6c2429dd3c", "a30b2ad53e6a8eeaa5a6a02e615f2330e4e965e64a36804662647c7aedfcd4aa0a34b894ef3fbab4d13a4f2bbce88abf2f805e544bfcc834e666c80cf0e4514014a6f7db0d"}, 0x5a, 0x2) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 335.628477] BTRFS error (device loop5): open_ctree failed [ 335.655405] input: syz1 as /devices/virtual/input/input568 [ 335.672399] FAULT_INJECTION: forcing a failure. 04:37:50 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="78800000", @ANYRES16=r1, @ANYBLOB="02002abd7000fbdbdf250100000008000700000400005c000880180000801400040002004e24e00000020000000000000000180000801400040002004e21ffffffff0000000000000000100000800400098008000a0001000000180000801400040002004e20ac1e00010000000000000000"], 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d280000000000006ab7bd31f8c55b4d2cfd4d3605998cd39d2aace05c012ccaead5098c053fd1d82df73f7d7a0450c55257f7857f125e545c7d195c8d342ea48c30c17482f41f99e75a647c4743f2ca728ca16a43e8eb6825edfae6c035cf9a1b8183ee", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f00000005c0)={0x0, @in={{0x2, 0x4e22, @multicast2}}, 0x1f, 0x2}, 0x90) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 04:37:50 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000100)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000140)={&(0x7f0000000200)="006c5839dac6e3d88a6170b4cf4bf7036044d2e758cde8773a5dc27653a0aec97f4f4f1a7b25119f12a75f57a83108e4f76eaacbe60198e7bddb3f2353aba5b1f0848cdb86d4db39a4ac2ac3155da47db04c64828866b82deee8b11d936137b01bfc933f3b92fa994b4d32ac85c5a95076cc9f1e9a01ffb4ea2714e5fa37d7b5eab063ccd45c8c862e294abb3b73a3bfe8a6f55964fa903f2257109fb051bf1aa6d2e39fb0702c870558695ac1f755b5", &(0x7f00000002c0)=""/175, &(0x7f0000000380)="c973e3744d84d6cbb4f3a534f6587a8d6442226b264a4f30eab5c4e4102b66e7bf4dc72ae779dfff8a3c25177461989a98d07083c500d459c8b48087fce223ee160873fcb0671c5cef361dd99eb3955e41a9540e262f9af7ff888ce0203693827706fd3ee43857281abae025ce7253bde7d138e4762e04862d39177e6e4e061fdf2637e45c642314b288ce3c925e26070317d99aa089af0783c79bfa3ae2419501dc523b30fc9b923fdf0500023c9771238ccb4436edacae", &(0x7f0000000000)="6cb9bb24ad908d123ce7a2e32687b8b586ceb7a7d42b8945b542dc5e4f4621fccca5ec60b3b839c57872d93c193c18d6f2a6a8873ded64bb8a1d5b189d", 0x6, r1}, 0x38) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$nfc_llcp(r1, &(0x7f0000000480), &(0x7f0000000500)=0x60, 0x80000) fstatfs(r2, &(0x7f0000000540)=""/128) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000440)={0x0, r3, 0x7, 0xfffffffffffffffb, 0x80000000, 0x9}) sendmsg$IPVS_CMD_NEW_DAEMON(r1, 0x0, 0x0) 04:37:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000100)={0xa00000, 0x6, 0x3, r0, 0x0, &(0x7f00000000c0)={0xa00906, 0x1ef, [], @p_u16=&(0x7f0000000080)=0x81}}) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)={0x14, r3, 0x923}, 0x14}}, 0x20040000) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000540)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, r3, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x4}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x6}, @L2TP_ATTR_SESSION_ID={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000001}, 0x40080) r4 = accept$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = syz_open_dev$mouse(&(0x7f00000005c0)='/dev/input/mouse#\x00', 0x7, 0x800) ioctl$SG_GET_VERSION_NUM(r6, 0x2282, &(0x7f0000000600)) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) [ 335.672399] name failslab, interval 1, probability 0, space 0, times 0 [ 335.701524] CPU: 1 PID: 25983 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 335.709411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.718797] Call Trace: [ 335.721386] dump_stack+0x1b2/0x283 [ 335.725019] should_fail.cold+0x10a/0x154 [ 335.729171] should_failslab+0xd6/0x130 [ 335.733145] kmem_cache_alloc+0x28e/0x3c0 [ 335.737296] getname_kernel+0x4e/0x340 [ 335.741184] kern_path+0x1b/0x40 [ 335.744553] lookup_bdev.part.0+0x60/0x160 [ 335.748785] ? blkdev_open+0x250/0x250 [ 335.752671] ? selinux_key_alloc+0x1a0/0x1a0 [ 335.757084] blkdev_get_by_path+0x70/0xf0 [ 335.761248] btrfs_scan_one_device+0x84/0x330 [ 335.764655] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. [ 335.765744] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 335.765764] ? device_list_add+0x8f0/0x8f0 [ 335.765781] btrfs_mount+0x528/0x2838 [ 335.787348] ? pcpu_find_block_fit+0x2ed/0x380 [ 335.791928] ? pcpu_alloc+0x37d/0xf70 [ 335.795732] ? btrfs_remount+0x10c0/0x10c0 [ 335.799973] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 335.805426] ? rcu_read_lock_sched_held+0x10a/0x130 [ 335.810437] ? pcpu_alloc+0xe1/0xf70 [ 335.814174] ? __lockdep_init_map+0x100/0x560 [ 335.816614] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.2'. [ 335.818663] ? __lockdep_init_map+0x100/0x560 [ 335.818678] mount_fs+0x92/0x2a0 [ 335.818693] vfs_kern_mount.part.0+0x5b/0x3c0 [ 335.818705] vfs_kern_mount+0x3c/0x60 [ 335.818717] btrfs_mount+0x2a0/0x2838 [ 335.847174] ? _find_next_bit+0xdb/0x100 [ 335.851251] ? pcpu_alloc+0x37d/0xf70 [ 335.855052] ? btrfs_remount+0x10c0/0x10c0 [ 335.859290] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 335.864736] ? rcu_read_lock_sched_held+0x10a/0x130 [ 335.869748] ? pcpu_alloc+0xe1/0xf70 [ 335.873474] ? pcpu_find_block_fit+0x380/0x380 [ 335.878052] ? __lockdep_init_map+0x100/0x560 [ 335.882544] ? __lockdep_init_map+0x100/0x560 [ 335.887045] mount_fs+0x92/0x2a0 [ 335.890411] vfs_kern_mount.part.0+0x5b/0x3c0 [ 335.894924] do_mount+0x3c9/0x25e0 [ 335.898468] ? copy_mount_string+0x40/0x40 [ 335.902703] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 335.907542] ? copy_mnt_ns+0x8a0/0x8a0 [ 335.911429] ? copy_mount_options+0x1ec/0x2e0 [ 335.915932] ? copy_mnt_ns+0x8a0/0x8a0 [ 335.919819] SyS_mount+0xa8/0x120 [ 335.923271] ? copy_mnt_ns+0x8a0/0x8a0 [ 335.927177] do_syscall_64+0x1d5/0x640 [ 335.931072] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 335.936275] RIP: 0033:0x45f57a [ 335.939458] RSP: 002b:00007f2401f3da68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 04:37:50 executing program 3: prctl$PR_GET_KEEPCAPS(0x7) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f00000004c0)={0x2, 0x1, 0x8, 0x1, 0x5}, 0xc) syz_mount_image$btrfs(&(0x7f0000000480)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0xfffffffffffffffe, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x2985091, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r1) ioctl$SIOCPNGETOBJECT(r1, 0x89e0, &(0x7f0000000000)) syz_mount_image$nfs(&(0x7f0000000080)='nfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x3, &(0x7f0000000400)=[{&(0x7f0000000100)="0cd82461c3db8ca1b86263a51985151ccc1e77cd34838f8dc2fb2f7983882fdefcd9a78e5172c4584d2ea91826be86b702d841d4db4fed237fc5dc6c633255011d8795833ef31bb8fda1953c3382d46486f19b20e56450add894486fad975778cc8ee9da113853d5e4f2ceb2d9d2d6d7a0d7893b6c28c85150e5b5b8f3cdebb222d563d54ce3aa342ff2787e600d61e7b79da5853eb3", 0x96, 0x1}, {&(0x7f0000000200)="6705e18a2330f3d0bd22961f1fbea7b3bfa0d3f4b2313a686b8a6c98363870f955d6c7d8279674f19b9ad63f33bdfabf65a677e78469726ef06c0c4e620de5db023c751c23921fd927cf1cafef52649f829372dd7eff1e547f0286f9ae949cb626fd184359d2bd3425e76c41918145", 0x6f, 0x98a}, {&(0x7f0000000340)="1c5df1cfe9e81ffeecf4b65a231a58ff6013a2526f1937c6d015f475a1c26b3cf4c1f43c63f64416d707f748c3d2433847742c953df69c60ee10bfe86a6ef5819c38b242708a0c852ce68b5edeb4d00c0b6b94eaaefd196d3e4467988d62757e0ab61ad4c728fe5dcfe3a0024f5ec3071ba68aaf19fd2c9eabcde3c8e783bc3ef2cb172e1c", 0x85, 0x5}], 0x400, &(0x7f0000000280)='btrfs\x00') [ 335.947160] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045f57a [ 335.954429] RDX: 00007f2401f3dae0 RSI: 00000000200001c0 RDI: 00007f2401f3db00 [ 335.961691] RBP: 000000000078bf00 R08: 00007f2401f3db40 R09: 00007f2401f3dae0 [ 335.968972] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 335.976245] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 335.996508] input: syz1 as /devices/virtual/input/input569 04:37:50 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000580)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000480)=[{0x0, 0x0, [0x8, 0x8, 0x4, 0x6, 0xf46, 0x7, 0xfffffeff, 0xfff, 0x7f, 0x7, 0x9, 0x1, 0x3, 0x100, 0x400, 0x2]}, {0x0, 0x0, [0x8, 0x3, 0x400, 0x7, 0xfff, 0x8, 0x1, 0xa8db, 0x7, 0x8, 0x1, 0x7, 0x6, 0x2, 0x80000000, 0xfffffff8]}], 0xffffffffffffffff, 0x1, 0x1, 0x90}}, 0x20) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 04:37:50 executing program 1 (fault-call:0 fault-nth:67): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 336.007107] print_req_error: I/O error, dev loop5, sector 0 04:37:50 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r3) perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x5, 0x8, 0x7, 0xc0, 0x0, 0xfff, 0x342b4, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3ff, 0x2, @perf_bp={&(0x7f0000000000), 0x5}, 0x470, 0x7, 0x800, 0x0, 0x100, 0x0, 0x80}, r2, 0xb, r3, 0x8) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:37:50 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r2) recvfrom$inet6(r2, &(0x7f0000000000)=""/91, 0x5b, 0x10020, &(0x7f0000000080)={0xa, 0x4e24, 0x1, @loopback, 0xffff}, 0x1c) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 336.052627] BTRFS error (device loop5): superblock checksum mismatch 04:37:50 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r1) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000340)={0x802f, {0x4, 0x0, 0x0, 0xffffffff}}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000d00200009800000000000000680100009800000000000000380200003802000038020000380200003802000004000000000000000000000010000000e00000020000000000000000626f6e645f736c6176655f310000000000000000000000000000e2ffffff001f00000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a45435400000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc18795000000000000000000000000000000000040000000000000000000000000000000000000010000000000000000000000a800d0000000000000000000000000000000000000000000380074696d650000000000554e8269000000000000000000000000000000000000000000ffffffff4f970000001b000000000000f9000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000ffff000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000380071756f7461000000000000000000000000000000000000000000000000000100000000deffff460d0000000000000000000000000000280052454a45435400000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028000000000000000000000000000000001ec500000000000000000000000000feffffff"], 0x1) dup3(r0, r3, 0x80000) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 336.117959] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 336.141693] FAULT_INJECTION: forcing a failure. [ 336.141693] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 336.153509] CPU: 1 PID: 26029 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 336.161453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.170810] Call Trace: [ 336.173403] dump_stack+0x1b2/0x283 [ 336.177039] should_fail.cold+0x10a/0x154 [ 336.181188] ? kernel_text_address+0x6e/0xe0 [ 336.185600] __alloc_pages_nodemask+0x22b/0x2730 [ 336.190371] ? trace_hardirqs_on+0x10/0x10 [ 336.194604] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 336.199447] ? trace_hardirqs_on+0x10/0x10 [ 336.203680] ? do_syscall_64+0x1d5/0x640 [ 336.207743] ? trace_hardirqs_on+0x10/0x10 [ 336.211975] ? lock_acquire+0x170/0x3f0 [ 336.215948] cache_grow_begin+0x91/0x410 [ 336.220027] cache_alloc_refill+0x28c/0x360 [ 336.224359] kmem_cache_alloc+0x333/0x3c0 [ 336.228509] getname_kernel+0x4e/0x340 [ 336.232396] kern_path+0x1b/0x40 [ 336.235781] lookup_bdev.part.0+0x60/0x160 [ 336.235872] input: syz1 as /devices/virtual/input/input571 [ 336.240008] ? blkdev_open+0x250/0x250 [ 336.240019] ? selinux_key_alloc+0x1a0/0x1a0 [ 336.240031] blkdev_get_by_path+0x70/0xf0 [ 336.240042] btrfs_scan_one_device+0x84/0x330 [ 336.240057] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 336.267551] ? device_list_add+0x8f0/0x8f0 [ 336.271809] btrfs_mount+0x528/0x2838 [ 336.275656] ? _find_next_bit+0xdb/0x100 [ 336.279713] ? pcpu_alloc+0x37d/0xf70 [ 336.283517] ? btrfs_remount+0x10c0/0x10c0 [ 336.287758] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 336.293253] ? rcu_read_lock_sched_held+0x10a/0x130 [ 336.298270] ? pcpu_alloc+0xe1/0xf70 [ 336.302018] ? __lockdep_init_map+0x100/0x560 [ 336.306554] ? __lockdep_init_map+0x100/0x560 [ 336.311053] mount_fs+0x92/0x2a0 [ 336.314435] vfs_kern_mount.part.0+0x5b/0x3c0 [ 336.318930] vfs_kern_mount+0x3c/0x60 [ 336.322756] btrfs_mount+0x2a0/0x2838 [ 336.326563] ? _find_next_bit+0xdb/0x100 [ 336.330623] ? pcpu_alloc+0x37d/0xf70 [ 336.334476] ? btrfs_remount+0x10c0/0x10c0 [ 336.338726] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 336.344175] ? rcu_read_lock_sched_held+0x10a/0x130 [ 336.349208] ? pcpu_alloc+0xe1/0xf70 [ 336.352930] ? pcpu_find_block_fit+0x380/0x380 [ 336.357511] ? __lockdep_init_map+0x100/0x560 [ 336.362004] ? __lockdep_init_map+0x100/0x560 [ 336.366503] mount_fs+0x92/0x2a0 [ 336.369874] vfs_kern_mount.part.0+0x5b/0x3c0 [ 336.374375] do_mount+0x3c9/0x25e0 [ 336.377935] ? copy_mount_string+0x40/0x40 [ 336.382190] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 336.387027] ? copy_mnt_ns+0x8a0/0x8a0 [ 336.390914] ? copy_mount_options+0x1ec/0x2e0 [ 336.395442] ? copy_mnt_ns+0x8a0/0x8a0 [ 336.399329] SyS_mount+0xa8/0x120 [ 336.402779] ? copy_mnt_ns+0x8a0/0x8a0 [ 336.406667] do_syscall_64+0x1d5/0x640 [ 336.410564] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 336.415754] RIP: 0033:0x45f57a [ 336.418934] RSP: 002b:00007f2401f3da68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 336.426659] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045f57a [ 336.433926] RDX: 00007f2401f3dae0 RSI: 00000000200001c0 RDI: 00007f2401f3db00 [ 336.441193] RBP: 000000000078bf00 R08: 00007f2401f3db40 R09: 00007f2401f3dae0 [ 336.448457] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 336.455745] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:51 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0xee00) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r3, 0xee00) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r5, 0xee00) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000300)={{}, {0x1, 0x6}, [{0x2, 0x1, r1}, {0x2, 0x3, r2}, {0x2, 0x0, r3}, {0x2, 0x4, r4}, {0x2, 0x0, r5}, {0x2, 0x2, r6}], {0x4, 0x2}, [], {0x10, 0x2}, {0x20, 0x6}}, 0x54, 0x1) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000000)={0x2, 0xc63b}) [ 336.468162] BTRFS error (device loop5): open_ctree failed 04:37:51 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000640)="dd8a59ee44155d31bbc943357379636530cf95a741ea27efae1e515c4e8022042954c0a67801affcd45dfa7638329947a3b6a25a64555f2f74daf16da4cd166301e594df730d7294bdb459ffa543818c0fad7d45275a3947884589b252930026121ef435d303e65fdb340536917de6e0da09b4927606a0442e2c4cdb6c6723cad24312b0b638479ca028e116a1c59876a131fa57dddb5d9a7ed87c0b23a413caa50226d6cbdfbfb1352830b8a482d549164391a3909680a790979e29fa0a613892ddc061393d0199a0aff322c375abec7422d9039461916cf25a2d", 0xdb, 0x4040000, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000008c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000740)=ANY=[@ANYRES16=r1, @ANYRES32=r2, @ANYRESOCT, @ANYRESDEC, @ANYBLOB="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", @ANYBLOB="b4d25f5b35a12c6bf8af55cee873c4f1109e69b5bc1ba317b5309c2d4ad0a3c4f61937a2daf98330604f63fd2ad9", @ANYRES32], 0x1) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x280600, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r4, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000180)={0x0, 0x6, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00') sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000600)={0x3c, r7, 0x400, 0x70bd2e, 0x25dfdbfc, {}, [@BATADV_ATTR_ELP_INTERVAL={0xfffe, 0x3a, 0x7}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x7}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x801}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000800}, 0xf3270b0e8b2ab092) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$FIGETBSZ(r3, 0x2, &(0x7f0000000000)) socket$inet_udp(0x2, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 04:37:51 executing program 3: openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x200280, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r0, 0xee00) syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f0000000180)='./file0\x00', 0x7, 0x2, &(0x7f0000000240)=[{&(0x7f0000000440)="a9853748f120a3715ed4115f0e50fca90ab19b93c294eaa508920efbcc6901402f67e49b5db25d1327b2fa44dcf3122553976848fa922f061af7b68b8ffb70eb2d13af3eb40328a9f929a8b2c528a188624cb348de2cedf605f6a6cb17a9f693c70b225e21b41a367005c34da8e48cb8066d1ceb41459913f5551feb644a8e8f2c2b4d65fa451201291a5bc5a00cd18d75cab07525fb86415da3b71b7f78b2ac7e2c2367000000000000", 0xaa, 0x1f}, {&(0x7f0000000340)="096cc7fe205bc04d7314fdcef891312a1ff7415a38f64d511544c6e24ac76805f6fcf496800ffd7dab11cc4ed3ec0fc5d8b955a6d2da71cd6c97fbfa77d6b733dad9e11fc370e026104c1707bcdbf4fd1e4c9457539ec6e2c87bb129a823ca4019375f41e69bf5b9a453cbed50a10c253a9a2880966e60fbe8531e56d5a577d7c9691be522c1750954c7ab33ee63863a49e4595305c136a5ef2899424f572b541ec6ac9e408ff1878d86e19feb88e5250442e0fc6197e2a33190b75e855c7185ba04cb80a5fc3bb9", 0xc8, 0x1}], 0x80000, &(0x7f0000000500)=ANY=[@ANYBLOB="63720700746f723d827edb7d2c646f6e745f6d6561737572652c7063723d3030303030303036312c657569643cb916ba3233ed736f4b706dddc08917fe26aae98ff1e89ae02051dadbbbed00cfa73ba6a3cefd0eaadc973054403a2dd862bb23168646d3a194a64c10c1f116", @ANYRESDEC=r0, @ANYBLOB="2c646f6e745f6861026047d3"]) [ 336.563004] input: syz1 as /devices/virtual/input/input572 04:37:51 executing program 1 (fault-call:0 fault-nth:68): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x10, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x2) setrlimit(0x5, &(0x7f0000000240)={0x3f033584, 0x9}) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180)='security.capability\x00', &(0x7f0000000200)=@v2={0x2000000, [{0x0, 0xe5ff}, {0x2, 0x6}]}, 0x14, 0x1) [ 336.603145] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 04:37:51 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000024000705000000000000000000001f00", @ANYRES32=r5, @ANYBLOB="00000400f1ffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@delchain={0x68, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x4}, {0x0, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x34, 0x1, [@m_pedit={0x30, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=@delchain={0x68, 0x28, 0xf35, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x2}, {0x4, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x34, 0x1, [@m_mpls={0x30, 0x0, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x84000001}, 0xc, &(0x7f0000000040)={&(0x7f0000000380)={0x314, 0x0, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@NL80211_ATTR_MESH_CONFIG={0x1c, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_HWMP_ACTIVE_PATH_TIMEOUT={0x8, 0xb, 0x5}, @NL80211_MESHCONF_AUTO_OPEN_PLINKS={0x5}, @NL80211_MESHCONF_GATE_ANNOUNCEMENTS={0x5, 0x11, 0x1}]}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_BSS_BASIC_RATES={0x16, 0x24, "a878c98716da9de35b4b218a8dec47fba934"}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r5}, @NL80211_ATTR_CONTROL_PORT_OVER_NL80211={0x4}, @NL80211_ATTR_TX_RATES={0x2a8, 0x5a, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x24, 0x3, [@NL80211_TXRATE_LEGACY={0x17, 0x1, "fd941f18939c9d8b9ff25c385246a9204ecc46"}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}]}, @NL80211_BAND_2GHZ={0xa4, 0x0, [@NL80211_TXRATE_LEGACY={0x18, 0x1, "0df37eb6098a2c7aade7be44beefd19d155e9fce"}, @NL80211_TXRATE_LEGACY={0x7, 0x1, "228bd7"}, @NL80211_TXRATE_LEGACY={0x23, 0x1, "32ddcba8af9a2a68aea288b188396b803dad72fe620482c6a3a751d02f0258"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x101, 0xffff, 0x2, 0x81, 0xff, 0x7, 0x7, 0xffff]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_HT={0x17, 0x2, "c5d92075ef5ea4a88a8712deb8dc46fa6fdd9f"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x8, 0x6, 0x9, 0x8000, 0x9, 0x8, 0xf483, 0x5]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x8, 0x8, 0x80, 0x9, 0x8, 0x4, 0x1]}}]}, @NL80211_BAND_60GHZ={0x90, 0x2, [@NL80211_TXRATE_LEGACY={0xe, 0x1, "1e8669494fdbfd4bdf66"}, @NL80211_TXRATE_LEGACY={0xb, 0x1, "835c5e8ff865f1"}, @NL80211_TXRATE_LEGACY={0x16, 0x1, "cec29bdbb670e561a122ad5f15e967f2b9ae"}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x4f, 0x2, "a47d3fe498b1ea64a3bf7477caecffbf84aad7fbc2f38a6ce362857f0f9bea581753e44fc628bf6857018d6ac5a1307a4c2167592d7802e0b3c459a3d80c97e460ce1cd6e788d9d193782b"}]}, @NL80211_BAND_5GHZ={0x94, 0x1, [@NL80211_TXRATE_HT={0x46, 0x2, "82b73e3d4277467cd050f86f3a6d7737c496268edf097c902b7593d19888468ab4d92469a2af0654b471d110953c053ab220f1356a71dcd681064311796b211d077b"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x13, 0xffff, 0x4, 0x0, 0xe2, 0xffff, 0x8, 0xdcb7]}}, @NL80211_TXRATE_HT={0xe, 0x2, "e5371536d746c5fac0cc"}, @NL80211_TXRATE_HT={0x12, 0x2, "f30d9718f3f5fc51edd91bd1bd0c"}, @NL80211_TXRATE_LEGACY={0xf, 0x1, "d4bdf5e6857832c6ee7186"}]}, @NL80211_BAND_5GHZ={0xb8, 0x1, [@NL80211_TXRATE_HT={0x47, 0x2, "0c676703f7c4e905e67e31c0df16a3d834787779670c963e7e38b1700a2fc08c0219a161a1805ffdaee6042747d32b7f2340fe6b2adad73d72be256b8b95bc1801cef9"}, @NL80211_TXRATE_LEGACY={0x23, 0x1, "033a421bb367a62c423d434f9fb704a05f485ae58f13a748d599b9856e8377"}, @NL80211_TXRATE_LEGACY={0x7, 0x1, "032a80"}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xdfd, 0x1, 0x0, 0x9, 0xffff, 0x7f, 0x718]}}, @NL80211_TXRATE_LEGACY={0x7, 0x1, "5acfa0"}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x19, 0x1, "1f3130c8ebfe222e69298e9af7f86fa69d6e1e95e1"}]}]}]}, 0x314}, 0x1, 0x0, 0x0, 0x80}, 0x40) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f, {0x0, 0x0, 0xfffffffc}}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 336.674837] BTRFS error (device loop5): superblock checksum mismatch [ 336.698610] FAULT_INJECTION: forcing a failure. [ 336.698610] name failslab, interval 1, probability 0, space 0, times 0 [ 336.710641] CPU: 1 PID: 26091 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 336.718524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.727883] Call Trace: [ 336.730471] dump_stack+0x1b2/0x283 [ 336.734105] should_fail.cold+0x10a/0x154 [ 336.738253] ? mempool_free+0x1d0/0x1d0 [ 336.742244] should_failslab+0xd6/0x130 [ 336.746218] kmem_cache_alloc+0x40/0x3c0 [ 336.750289] ? mempool_free+0x1d0/0x1d0 [ 336.754255] mempool_alloc+0x111/0x2d0 [ 336.758165] ? remove_element.isra.0+0x1b0/0x1b0 [ 336.762909] ? check_preemption_disabled+0x35/0x240 [ 336.767919] bio_alloc_bioset+0x352/0x640 [ 336.772054] ? bvec_alloc+0x2d0/0x2d0 [ 336.775841] ? lock_downgrade+0x6e0/0x6e0 [ 336.779980] submit_bh_wbc+0xf5/0x6f0 [ 336.783772] block_read_full_page+0x71f/0x8f0 [ 336.788268] ? set_init_blocksize+0x210/0x210 [ 336.792754] ? __lru_cache_add+0x17b/0x250 [ 336.796973] ? __bread_gfp+0x1f0/0x1f0 [ 336.800844] ? add_to_page_cache_lru+0x151/0x300 [ 336.805582] ? add_to_page_cache_locked+0x40/0x40 [ 336.810424] ? __page_cache_alloc+0xd7/0x3c0 [ 336.814821] do_read_cache_page+0x354/0xc10 [ 336.819125] ? blkdev_writepages+0xd0/0xd0 [ 336.823346] btrfs_read_disk_super+0xd0/0x370 [ 336.827825] btrfs_scan_one_device+0xb5/0x330 [ 336.832305] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 336.837302] ? device_list_add+0x8f0/0x8f0 [ 336.841530] btrfs_mount+0x528/0x2838 [ 336.845316] ? _find_next_bit+0xdb/0x100 [ 336.849362] ? pcpu_alloc+0x37d/0xf70 [ 336.853148] ? btrfs_remount+0x10c0/0x10c0 [ 336.857376] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 336.862811] ? rcu_read_lock_sched_held+0x10a/0x130 [ 336.867810] ? pcpu_alloc+0xe1/0xf70 [ 336.871535] ? __lockdep_init_map+0x100/0x560 [ 336.876015] ? __lockdep_init_map+0x100/0x560 [ 336.880499] mount_fs+0x92/0x2a0 [ 336.883854] vfs_kern_mount.part.0+0x5b/0x3c0 [ 336.888354] vfs_kern_mount+0x3c/0x60 [ 336.892142] btrfs_mount+0x2a0/0x2838 [ 336.895931] ? _find_next_bit+0xdb/0x100 [ 336.899978] ? pcpu_alloc+0x37d/0xf70 [ 336.903764] ? btrfs_remount+0x10c0/0x10c0 [ 336.908006] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 336.913456] ? rcu_read_lock_sched_held+0x10a/0x130 [ 336.918453] ? pcpu_alloc+0xe1/0xf70 [ 336.922153] ? pcpu_find_block_fit+0x380/0x380 [ 336.926720] ? __lockdep_init_map+0x100/0x560 [ 336.931201] ? __lockdep_init_map+0x100/0x560 [ 336.935686] mount_fs+0x92/0x2a0 [ 336.939092] vfs_kern_mount.part.0+0x5b/0x3c0 [ 336.943591] do_mount+0x3c9/0x25e0 [ 336.947121] ? copy_mount_string+0x40/0x40 [ 336.951339] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 336.956161] ? copy_mnt_ns+0x8a0/0x8a0 [ 336.960030] ? copy_mount_options+0x1ec/0x2e0 [ 336.964508] ? copy_mnt_ns+0x8a0/0x8a0 [ 336.968377] SyS_mount+0xa8/0x120 [ 336.971847] ? copy_mnt_ns+0x8a0/0x8a0 [ 336.975738] do_syscall_64+0x1d5/0x640 [ 336.979626] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 336.984796] RIP: 0033:0x45f57a [ 336.987968] RSP: 002b:00007f2401f3da68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 336.995660] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045f57a [ 337.002914] RDX: 00007f2401f3dae0 RSI: 00000000200001c0 RDI: 00007f2401f3db00 [ 337.010166] RBP: 000000000078bf00 R08: 00007f2401f3db40 R09: 00007f2401f3dae0 [ 337.017421] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 337.024674] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 337.039753] BTRFS error (device loop5): open_ctree failed [ 337.048875] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. 04:37:51 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_MASTER={0x8, 0xa, r7}]}, 0x4c}}, 0x0) 04:37:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r1) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r2, 0x401, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) 04:37:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) 04:37:51 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r4}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r4, 0xfffffffe}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000080)={r4, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @rand_addr=0x64010101}, 0x4}}, [0x1ff31697, 0x2, 0x5, 0x8, 0xff, 0x4, 0x81, 0x0, 0x0, 0x7f, 0x101, 0x2b, 0x662, 0x8, 0x5]}, &(0x7f0000000180)=0x100) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000200)={r5, 0xdd}, 0x8) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 337.136792] input: syz1 as /devices/virtual/input/input573 [ 337.141430] HTB: quantum of class FFFF0004 is big. Consider r2q change. [ 337.206133] net_ratelimit: 23 callbacks suppressed [ 337.206137] ip_tables: iptables: counters copy to user failed while replacing table [ 337.234826] BTRFS error (device loop5): superblock checksum mismatch [ 337.244792] HTB: quantum of class FFFF0002 is big. Consider r2q change. 04:37:51 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000000)={0x1, 0x2, 0x800}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 337.256355] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 337.281656] ip_tables: iptables: counters copy to user failed while replacing table [ 337.289814] BTRFS error (device loop5): open_ctree failed 04:37:52 executing program 1 (fault-call:0 fault-nth:69): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x2, 0x2, &(0x7f00000000c0)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}, {&(0x7f0000000080)="d9a22aa436773557a219aa0ff2a84cfdd69a5336568d91d4cefc", 0x1a, 0x3}], 0x0, 0x0) [ 337.305838] ip_tables: iptables: counters copy to user failed while replacing table [ 337.338627] input: syz1 as /devices/virtual/input/input575 04:37:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$RTC_PIE_OFF(r1, 0x7006) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r3) ioctl$SCSI_IOCTL_PROBE_HOST(r3, 0x5385, &(0x7f0000000000)={0x59, ""/89}) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) [ 337.387633] input: syz1 as /devices/virtual/input/input576 [ 337.389086] BTRFS error (device loop5): superblock checksum mismatch [ 337.425426] FAULT_INJECTION: forcing a failure. [ 337.425426] name failslab, interval 1, probability 0, space 0, times 0 04:37:52 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f0000000000), 0x2) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 337.438602] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 337.462935] BTRFS error (device loop5): open_ctree failed 04:37:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300)='nl80211\x00') sendmsg$NL80211_CMD_SET_REG(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x30, r1, 0xa01, 0x0, 0x0, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8}, @NL80211_ATTR_REG_RULES={0xa, 0x22, 0x0, 0x1, [@NL80211_ATTR_DFS_CAC_TIME={0x8}]}]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_SET_BSS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20010204}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x70, r1, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@NL80211_STA_WME_MAX_SP={0x1e, 0x2, "c052dbb9de6034429782304f618c5f915a7be9cce39fa7c1c1a3"}, @NL80211_STA_WME_MAX_SP={0x1c, 0x2, "cc984530bfc6addfc5bf0caa5545824ec3266fdf56400644"}, @NL80211_ATTR_P2P_OPPPS={0x5}, @NL80211_ATTR_P2P_OPPPS={0x5}, @NL80211_ATTR_BSS_SHORT_SLOT_TIME={0x5, 0x1e, 0x4}, @NL80211_ATTR_AP_ISOLATE={0x5, 0x60, 0x6}]}, 0x70}}, 0x4000) [ 337.493734] CPU: 0 PID: 26171 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 337.496454] ip_tables: iptables: counters copy to user failed while replacing table [ 337.501615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 337.501620] Call Trace: [ 337.501641] dump_stack+0x1b2/0x283 [ 337.501661] should_fail.cold+0x10a/0x154 [ 337.501681] should_failslab+0xd6/0x130 [ 337.501693] kmem_cache_alloc+0x28e/0x3c0 [ 337.501714] alloc_buffer_head+0x20/0xd0 [ 337.524365] ip_tables: iptables: counters copy to user failed while replacing table [ 337.525007] alloc_page_buffers+0xb3/0x1f0 [ 337.553265] create_empty_buffers+0x36/0x470 [ 337.557677] ? mem_cgroup_commit_charge+0x17d/0x3a0 [ 337.562691] create_page_buffers+0x14d/0x1c0 [ 337.567100] block_read_full_page+0xb9/0x8f0 [ 337.571507] ? __add_to_page_cache_locked+0x328/0x890 [ 337.576696] ? check_preemption_disabled+0x35/0x240 [ 337.581702] ? set_init_blocksize+0x210/0x210 [ 337.586195] ? __lru_cache_add+0x17b/0x250 [ 337.590440] ? __bread_gfp+0x1f0/0x1f0 [ 337.594306] ? add_to_page_cache_lru+0x151/0x300 [ 337.599042] ? add_to_page_cache_locked+0x40/0x40 [ 337.603879] ? __page_cache_alloc+0xd7/0x3c0 [ 337.608272] do_read_cache_page+0x354/0xc10 [ 337.612580] ? blkdev_writepages+0xd0/0xd0 [ 337.616847] btrfs_read_disk_super+0xd0/0x370 [ 337.621338] btrfs_scan_one_device+0xb5/0x330 [ 337.625850] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 337.630851] ? device_list_add+0x8f0/0x8f0 [ 337.635118] btrfs_mount+0x528/0x2838 [ 337.638909] ? _find_next_bit+0xdb/0x100 [ 337.642994] ? pcpu_alloc+0x37d/0xf70 [ 337.646774] ? btrfs_remount+0x10c0/0x10c0 [ 337.651009] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 337.656439] ? rcu_read_lock_sched_held+0x10a/0x130 [ 337.661435] ? pcpu_alloc+0xe1/0xf70 [ 337.665129] ? __lockdep_init_map+0x100/0x560 [ 337.669602] ? __lockdep_init_map+0x100/0x560 [ 337.674076] mount_fs+0x92/0x2a0 [ 337.677458] vfs_kern_mount.part.0+0x5b/0x3c0 [ 337.681932] vfs_kern_mount+0x3c/0x60 [ 337.685727] btrfs_mount+0x2a0/0x2838 [ 337.689517] ? _find_next_bit+0xdb/0x100 [ 337.693583] ? pcpu_alloc+0x37d/0xf70 [ 337.697377] ? btrfs_remount+0x10c0/0x10c0 [ 337.701609] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 337.707038] ? rcu_read_lock_sched_held+0x10a/0x130 [ 337.712030] ? pcpu_alloc+0xe1/0xf70 [ 337.715735] ? pcpu_find_block_fit+0x380/0x380 [ 337.720306] ? __lockdep_init_map+0x100/0x560 [ 337.724782] ? __lockdep_init_map+0x100/0x560 [ 337.729272] mount_fs+0x92/0x2a0 [ 337.732619] vfs_kern_mount.part.0+0x5b/0x3c0 [ 337.737109] do_mount+0x3c9/0x25e0 [ 337.740629] ? copy_mount_string+0x40/0x40 [ 337.744845] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 337.749666] ? copy_mnt_ns+0x8a0/0x8a0 [ 337.753530] ? copy_mount_options+0x1ec/0x2e0 [ 337.758001] ? copy_mnt_ns+0x8a0/0x8a0 [ 337.761885] SyS_mount+0xa8/0x120 [ 337.765343] ? copy_mnt_ns+0x8a0/0x8a0 [ 337.769223] do_syscall_64+0x1d5/0x640 [ 337.773090] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 337.778259] RIP: 0033:0x45f57a [ 337.781435] RSP: 002b:00007f2401f3da68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 04:37:52 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$netlink(0x10, 0x3, 0xc) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r3, 0x200, 0x70bd25, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0xc4) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000002740)=ANY=[@ANYBLOB="00120000", @ANYRES16=r3, @ANYBLOB="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"], 0x1200}}, 0x4000) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r9, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000024000705000000000000000000001f00", @ANYRES32=r9, @ANYBLOB="00000400f1ffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="680000002800310f00"/20, @ANYRES32=r9, @ANYBLOB="040000000000ffff000000000b00010063b3726f7570000038000200340001002200000001000000706564697400000004000280040006000c00070000000008000000000c0008000000000000000000"], 0x68}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=@delchain={0x68, 0x28, 0xf35, 0x0, 0x0, {0x0, 0x0, 0x0, r9, {0xb}, {0x4, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x34, 0x1, [@m_mpls={0x30, 0x0, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0xb4, r3, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}]}, @ETHTOOL_A_LINKINFO_PHYADDR={0x5, 0x3, 0x7}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x4}, @ETHTOOL_A_LINKINFO_HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4000880}, 0x8010) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) 04:37:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8d02363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a229b748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) [ 337.789132] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045f57a [ 337.796381] RDX: 00007f2401f3dae0 RSI: 00000000200001c0 RDI: 00007f2401f3db00 [ 337.803636] RBP: 000000000078bf00 R08: 00007f2401f3db40 R09: 00007f2401f3dae0 [ 337.810905] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 337.818159] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:52 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0xd) 04:37:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f00000004c0)='y\x00', 0x2, 0x0) syz_read_part_table(0x7fff, 0x3, &(0x7f0000000200)=[{&(0x7f0000000080)="4fa62828be890a3433d6af3b1ab81c437628f09f7833b31b18c057869e476ed13362606f7b55ca6dae6ff09d71c0ed05f98e68aa22a22ac166bc900e792f97c3f6acf5b67ac64f9989054b7efe17c10829373b39c5ec9c6ce04ffff76906d5a90dcae8810d99f76b03b20d0c07f4e36dd4dff17c789c1ab67085ec4e6c527e0d8b97893e17", 0x85, 0xfffffffffffefffe}, {&(0x7f0000000140)="d811330d18d9a082b03d1c16383ba5284ad272a0139730efabf559f52f8d29645cb381d7e1134b38aea30e40ef8f0376257392e17d409800a96802355f6d41b908c177b7dbbf1ae83797025f7df1359949581f64dc30086b439b3e9357f6d34ee42ce0fc17c208b011a8eaaf", 0x6c}, {&(0x7f0000000340)="3895c3c4a6d5ae6830d09ddca6571e3708aab99428edb757e4706ba1f8037b80a7dae12945079b632a669b93411913978a46def583fe69e258d3a8b27c3ca1d9bd421c4d06d13b04d53bc49684181c15b91effbdcafbfc7aa299249b436f2b23030f035d022311cac1b9d0b8a16225240fed2ed3d67872a138bbb4cb33146b27a9b1cb9bc21e5b391fcf91872e483bb0fa47ba075950060ec757c0e30d06e2261cc8471640b34fc40450895fd94041bea3607504592a74a3cecb5ee406ff0723baf991aba406e71120ecee0df5c1deaba5975a547fb3dba49b73b77c8e2ec9135271b9", 0xe3, 0xfffffffffffffe00}]) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000500)='/dev/hwrng\x00', 0x8000, 0x0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000540)='/dev/nvme-fabrics\x00', 0x20080, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000580)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000005c0), 0x13f, 0x8}}, 0x20) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ocfs2_control\x00', 0x8000, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x2, 0x4, 0x8537}) 04:37:52 executing program 1 (fault-call:0 fault-nth:70): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 337.877021] ip_tables: iptables: counters copy to user failed while replacing table [ 337.905488] input: syz1 as /devices/virtual/input/input577 [ 337.957744] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 337.983671] BTRFS: device fsid fff6f2a2-29b7-48ae-b81e-1b00b10efd9a devid 0 transid 0 /dev/loop5 [ 338.002346] BTRFS error (device loop5): superblock checksum mismatch [ 338.010344] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 338.023252] FAULT_INJECTION: forcing a failure. [ 338.023252] name failslab, interval 1, probability 0, space 0, times 0 [ 338.036607] CPU: 1 PID: 26228 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 338.044492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.053845] Call Trace: [ 338.056461] dump_stack+0x1b2/0x283 [ 338.060094] should_fail.cold+0x10a/0x154 [ 338.064244] ? mempool_free+0x1d0/0x1d0 [ 338.068219] should_failslab+0xd6/0x130 [ 338.072193] kmem_cache_alloc+0x40/0x3c0 [ 338.076282] ? mempool_free+0x1d0/0x1d0 [ 338.080259] mempool_alloc+0x111/0x2d0 [ 338.084152] ? remove_element.isra.0+0x1b0/0x1b0 [ 338.088906] ? check_preemption_disabled+0x35/0x240 [ 338.093926] bio_alloc_bioset+0x352/0x640 [ 338.098075] ? bvec_alloc+0x2d0/0x2d0 [ 338.101879] ? lock_downgrade+0x6e0/0x6e0 [ 338.106032] submit_bh_wbc+0xf5/0x6f0 [ 338.109837] block_read_full_page+0x71f/0x8f0 [ 338.114334] ? set_init_blocksize+0x210/0x210 [ 338.118827] ? __lru_cache_add+0x17b/0x250 [ 338.123070] ? __bread_gfp+0x1f0/0x1f0 [ 338.126952] ? add_to_page_cache_lru+0x151/0x300 [ 338.131703] ? add_to_page_cache_locked+0x40/0x40 [ 338.136538] ? __page_cache_alloc+0xd7/0x3c0 [ 338.140944] do_read_cache_page+0x354/0xc10 [ 338.145260] ? blkdev_writepages+0xd0/0xd0 [ 338.149502] btrfs_read_disk_super+0xd0/0x370 [ 338.153997] btrfs_scan_one_device+0xb5/0x330 [ 338.158491] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 338.163501] ? device_list_add+0x8f0/0x8f0 [ 338.167769] btrfs_mount+0x528/0x2838 [ 338.171591] ? _find_next_bit+0xdb/0x100 [ 338.175657] ? pcpu_alloc+0x37d/0xf70 [ 338.179464] ? btrfs_remount+0x10c0/0x10c0 [ 338.183710] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 338.189160] ? rcu_read_lock_sched_held+0x10a/0x130 [ 338.194188] ? pcpu_alloc+0xe1/0xf70 [ 338.197920] ? __lockdep_init_map+0x100/0x560 [ 338.202419] ? __lockdep_init_map+0x100/0x560 [ 338.206911] mount_fs+0x92/0x2a0 [ 338.210277] vfs_kern_mount.part.0+0x5b/0x3c0 [ 338.214817] vfs_kern_mount+0x3c/0x60 [ 338.218631] btrfs_mount+0x2a0/0x2838 [ 338.222435] ? _find_next_bit+0xdb/0x100 [ 338.226503] ? pcpu_alloc+0x37d/0xf70 [ 338.230342] ? btrfs_remount+0x10c0/0x10c0 [ 338.234586] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 338.240036] ? rcu_read_lock_sched_held+0x10a/0x130 [ 338.245053] ? pcpu_alloc+0xe1/0xf70 [ 338.248811] ? pcpu_find_block_fit+0x380/0x380 [ 338.253392] ? __lockdep_init_map+0x100/0x560 [ 338.257886] ? __lockdep_init_map+0x100/0x560 [ 338.262383] mount_fs+0x92/0x2a0 [ 338.265751] vfs_kern_mount.part.0+0x5b/0x3c0 [ 338.270259] do_mount+0x3c9/0x25e0 [ 338.273805] ? copy_mount_string+0x40/0x40 [ 338.278044] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 338.282883] ? copy_mnt_ns+0x8a0/0x8a0 [ 338.286771] ? copy_mount_options+0x1ec/0x2e0 [ 338.291266] ? copy_mnt_ns+0x8a0/0x8a0 [ 338.295160] SyS_mount+0xa8/0x120 [ 338.298618] ? copy_mnt_ns+0x8a0/0x8a0 [ 338.302511] do_syscall_64+0x1d5/0x640 [ 338.306408] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 338.311595] RIP: 0033:0x45f57a [ 338.314779] RSP: 002b:00007f2401f3da68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 338.322492] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045f57a [ 338.329759] RDX: 00007f2401f3dae0 RSI: 00000000200001c0 RDI: 00007f2401f3db00 [ 338.337024] RBP: 000000000078bf00 R08: 00007f2401f3db40 R09: 00007f2401f3dae0 [ 338.339269] input: syz1 as /devices/virtual/input/input578 [ 338.344289] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 04:37:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000000400)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}, {&(0x7f0000000100)="86f37b9a2ea5efae10f0ecf28d5b360237bb480b9012fcf2861ab5c4ee3c9a993bd79db68948ab6b8b68e3f3f0e5734e99159fdb832c23603ad4bd0efb1b0473f764644c57093a3b8ae6c75f20ca99fc35d42cea7bc39b0373babeb153712ffcce7054b36d3e6a0134a9a2c548ac5a9b463c194441a33ad149d1d217484f9ec77bdb78233fc287e4e92b", 0x8a, 0x2}, {&(0x7f0000000200)="5ed62292aac358e0d38c09637de8d7f3782c6d3c78cbbb17875b19c9bdce69574879e4ba5475d021bb8a9b399befb75a4089cbfe01d9024b4518adc954d452974c209f8d180e6adf95aacee2bd1c7ad87234bd56b0d501b0e3b7e599a17534c0a9918ddeee24287836f02af0a959", 0x6e, 0x1}, {&(0x7f0000000340)="6d1cdc6044385d7b852f624c5e51e6591ff2beabff624b2d23ab36a39ab1169a486683e5d8e13e49c80ba5e43a843c464bafbfa4735543bdd61b30b2b7144a77342219c26a5b4ce5107cf52f419ec68dcc2013c2081ae19fd1c2fea38b6d658fa4c6f7d103673bdc80ca596f7cde511929380d79f42742c855ab7d070d7e0ad39ae4412c00302ef8e5da182b2367c789e7f272fad3a90f48143e40061d24", 0x9e, 0xed30}], 0x200003, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x80, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f00000000c0)=""/14) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) [ 338.357171] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 338.379059] ip_tables: iptables: counters copy to user failed while replacing table 04:37:53 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) connect$inet6(r1, &(0x7f0000004540)={0xa, 0x4e28, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r1, &(0x7f0000001980), 0x8c83086635fae290, 0x2000f760) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$NL80211_CMD_SET_REG(0xffffffffffffffff, 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) write$UHID_GET_REPORT_REPLY(r2, &(0x7f0000000100)={0xa, {0xa, 0x66, 0x6}}, 0xa) 04:37:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000140)={{0x5, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) close(r2) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmallocinfo\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r4) ioctl$GIO_SCRNMAP(r4, 0x4b40, &(0x7f0000000200)=""/222) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r5, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x0}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r3, 0xc0086423, &(0x7f00000000c0)={r6, 0x1}) [ 338.418916] audit: type=1326 audit(1593837473.093:25): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=26249 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45f96a code=0x0 [ 338.441553] BTRFS error (device loop5): open_ctree failed 04:37:53 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x3c, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 04:37:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000100)='l2tp\x00') syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r1) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000340)=""/33) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r4}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r4, 0xfffffffe}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000080)={r4, 0xfff}, 0x8) setxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=@known='system.advise\x00', &(0x7f0000000280)='/dev/autofs\x00', 0xc, 0x3) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) 04:37:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) socket$phonet_pipe(0x23, 0x5, 0x2) [ 338.545767] input: syz1 as /devices/virtual/input/input579 04:37:53 executing program 1 (fault-call:0 fault-nth:71): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 338.611754] BTRFS error (device loop5): superblock checksum mismatch [ 338.625609] ip_tables: iptables: counters copy to user failed while replacing table [ 338.644548] input: syz1 as /devices/virtual/input/input580 [ 338.657156] ip_tables: iptables: counters copy to user failed while replacing table [ 338.665588] BTRFS error (device loop5): open_ctree failed 04:37:53 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r1) ioctl$SNDCTL_DSP_SETFRAGMENT(r1, 0xc004500a, &(0x7f0000000000)=0xfff) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 338.703006] FAULT_INJECTION: forcing a failure. [ 338.703006] name failslab, interval 1, probability 0, space 0, times 0 [ 338.729798] print_req_error: I/O error, dev loop5, sector 0 [ 338.731544] ip_tables: iptables: counters copy to user failed while replacing table [ 338.757265] CPU: 0 PID: 26301 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 338.765154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.774499] Call Trace: [ 338.777102] dump_stack+0x1b2/0x283 [ 338.780731] should_fail.cold+0x10a/0x154 [ 338.784881] should_failslab+0xd6/0x130 [ 338.788869] kmem_cache_alloc+0x28e/0x3c0 [ 338.793015] alloc_buffer_head+0x20/0xd0 [ 338.797079] alloc_page_buffers+0xb3/0x1f0 [ 338.801361] create_empty_buffers+0x36/0x470 [ 338.805768] ? mem_cgroup_commit_charge+0x17d/0x3a0 [ 338.810796] create_page_buffers+0x14d/0x1c0 [ 338.815200] block_read_full_page+0xb9/0x8f0 [ 338.819602] ? __add_to_page_cache_locked+0x328/0x890 [ 338.824806] ? check_preemption_disabled+0x35/0x240 [ 338.829824] ? set_init_blocksize+0x210/0x210 [ 338.834346] ? __lru_cache_add+0x17b/0x250 [ 338.838609] ? __bread_gfp+0x1f0/0x1f0 [ 338.842494] ? add_to_page_cache_lru+0x151/0x300 [ 338.847248] ? add_to_page_cache_locked+0x40/0x40 [ 338.852093] ? __page_cache_alloc+0xd7/0x3c0 [ 338.856503] do_read_cache_page+0x354/0xc10 [ 338.860825] ? blkdev_writepages+0xd0/0xd0 [ 338.865075] btrfs_read_disk_super+0xd0/0x370 [ 338.869612] btrfs_scan_one_device+0xb5/0x330 [ 338.874129] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 338.878164] input: syz1 as /devices/virtual/input/input581 [ 338.879138] ? device_list_add+0x8f0/0x8f0 [ 338.879157] btrfs_mount+0x528/0x2838 [ 338.879172] ? _find_next_bit+0xdb/0x100 [ 338.879182] ? pcpu_alloc+0x37d/0xf70 [ 338.879193] ? btrfs_remount+0x10c0/0x10c0 [ 338.879211] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 338.879222] ? rcu_read_lock_sched_held+0x10a/0x130 [ 338.879230] ? pcpu_alloc+0xe1/0xf70 [ 338.879247] ? __lockdep_init_map+0x100/0x560 [ 338.879259] ? __lockdep_init_map+0x100/0x560 [ 338.928013] mount_fs+0x92/0x2a0 [ 338.931382] vfs_kern_mount.part.0+0x5b/0x3c0 [ 338.935869] vfs_kern_mount+0x3c/0x60 [ 338.939658] btrfs_mount+0x2a0/0x2838 [ 338.943476] ? _find_next_bit+0xdb/0x100 [ 338.947513] ? pcpu_alloc+0x37d/0xf70 [ 338.951288] ? btrfs_remount+0x10c0/0x10c0 [ 338.955502] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 338.960965] ? rcu_read_lock_sched_held+0x10a/0x130 [ 338.965994] ? pcpu_alloc+0xe1/0xf70 [ 338.969705] ? pcpu_find_block_fit+0x380/0x380 [ 338.974271] ? __lockdep_init_map+0x100/0x560 [ 338.978748] ? __lockdep_init_map+0x100/0x560 [ 338.983243] mount_fs+0x92/0x2a0 [ 338.986602] vfs_kern_mount.part.0+0x5b/0x3c0 [ 338.991075] do_mount+0x3c9/0x25e0 [ 338.994593] ? copy_mount_string+0x40/0x40 [ 338.998810] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 339.003636] ? copy_mnt_ns+0x8a0/0x8a0 [ 339.007500] ? copy_mount_options+0x1ec/0x2e0 [ 339.011968] ? copy_mnt_ns+0x8a0/0x8a0 [ 339.015854] SyS_mount+0xa8/0x120 [ 339.019311] ? copy_mnt_ns+0x8a0/0x8a0 [ 339.023189] do_syscall_64+0x1d5/0x640 [ 339.027055] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 339.032218] RIP: 0033:0x45f57a [ 339.035381] RSP: 002b:00007f2401f3da68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 339.043065] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045f57a [ 339.050314] RDX: 00007f2401f3dae0 RSI: 00000000200001c0 RDI: 00007f2401f3db00 [ 339.057568] RBP: 000000000078bf00 R08: 00007f2401f3db40 R09: 00007f2401f3dae0 [ 339.064816] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 339.072062] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000d00200009800000000000000680100009800000000000000380200003802000038020000380200003802000004000000000000000000000010000000e00000020000000000000000626f6e645f736c6176655f310000000000000000000000000000e2ffffff001f00000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a45435400000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc18795000000000000000000000000000000000040000000000000000000000000000000000000010000000000000000000000a800d0000000000000000000000000000000000000000000380074696d650000000000554e8269000000000000000000000000000000000000000000ffffffff4f970000001b000000000000f9000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000ffff000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000380071756f7461000000000000000000000000000000000000000000000000000100000000deffff460d0000000000000000000000000000280052454a45435400000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028000000000000000000000000000000001ec500000000000000000000000000feffffff"], 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r1) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r4}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000040)={r4, 0xfffffffe}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000000c0)={0x3, 0x0, 0x8004, 0x8, 0x3, 0x7, 0x7, 0x1, r4}, 0x20) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) newfstatat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x6000) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x6a, 0x700000, "51437732e8fab1f858bc998560ef9e46086f32616638169b0cb23b26541015d538297e00b6210b15dce4ad1250844b1f686fc6468cbbcaa1fc2c7287caaec4d1e9b1e7d8a9efd3dd7aede316162be31e87d02c7366564af1cf3f9a140e93e7832f6c"}, &(0x7f00000001c0), 0x1000) 04:37:53 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYRES64=r1], 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) [ 339.119435] BTRFS error (device loop1): superblock checksum mismatch [ 339.171419] input: syz1 as /devices/virtual/input/input582 [ 339.186242] BTRFS error (device loop1): open_ctree failed 04:37:53 executing program 1 (fault-call:0 fault-nth:72): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:54 executing program 5: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xa5}, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000100)=0x5) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$VIDIOC_S_OUTPUT(r3, 0xc004562f, &(0x7f0000000280)=0xfff) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r4, 0x84, 0x16, &(0x7f0000000080)={0x2, [0x2, 0x3]}, &(0x7f0000000340)=0x8) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000d00200009800000000000000680100009800000000000000380200003802000038020000380200003802000004000000000000000000000010000000e00000020000000000000000626f6e645f736c6176655f310000000000000000000000000000e2ffffff001f00000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a45435400000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc18795000000000000000000000000000000000040000000000000000000000000000000000000010000000000000000000000a800d0000000000000000000000000000000000000000000380074696d650000000000554e8269000000000000000000000000000000000000000000ffffffff4f970000001b000000000000f9000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000ffff000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000380071756f7461000000000000000000000000000000000000000000000000000100000000deffff460d0000000000000000000000000000280052454a45435400000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028000000000000000000000000000000001ec500000000000000000000000000feffffff"], 0x1) writev(r5, &(0x7f0000000880)=[{&(0x7f00000003c0)="98ca6ea500d840441f99da9833053fb08b160c7febab8d09d2e54420abe67c8184859c0ddc984ad6848fc6e966c1bb93c177c9d63a6570f6b002e75146ee4eaef02f7b5c8800cd7c32f3ab52beabe07f52b9d3c80824df96761c440b392b775d9fe9b56ea32ccedfb47a047275655a9ec434486001fb3b75d2cd413a84291badfd57408c2181eb92b90692432c49c9787fe18ac74698997d43109134822c30b1c09f2b41080a01fdbebadb3050", 0xad}, {&(0x7f0000000480)}, {&(0x7f00000004c0)="2e72745965025ecdba6f4dc467e71f98782d853fc44cbe788c3861c111f3f3eb7c111c913845ce1a19ceaf9e816173622b9b7c22103e007a4674ca6ebf40e6fb2d0c72fa455d3fd2079c9ec7c7700ea76d892452c69b6d804f8b40d5c18c6ef5fa4dd2ec532bee68c96b8228d7ed7ef6011dcc47e9f598e5429545f4a2a8b622f80e71", 0x83}, {&(0x7f0000000580)="e7f40263637adbf7f9cc85fb9d6ef72cafbed4986b460474c71548e3cd83acb8428411b8f432451f93ea5e16db1fbeb09bc3be5e0b936f0c", 0x38}, {&(0x7f00000005c0)="584765f0ba27badc6b30b65b5b958be9c0348b666fc5eb0d2335ed53b6e4f0f54c6948d3f11a84199844be1142fe2cfae4e738a0cb30ceeb7d50b644a3580babefd3d92ec9e44d1189960701e30e5bd8dede9c9354ee6154f040875bab96f3a0079f73cc8d3196ff91f842bb32ce704b0e1cd509a6d9970057154eb3d9b1ef048bc88fb24b2b08413099b2db7165daf22a6ee3f8", 0x94}, {&(0x7f0000000680)="78793d4c6f4774cb4c0307a31f6e6194bd8ea73319f79ac3bb09cdffae01988286001b2fa1454f5099637672fa6279e28d7a0409d6ece01b104be0ed06f9543898d4a6c40262b69b79bc1b74e734b15578731018dfcfe26c15212311a24692dab717f8a4be5c2c13d609a3e4f2a4f5bb6ea4db8c18f4a8d2fa2ca21de9808010219e26c477d2246bc54e302b3b68561632fc71e4dd83324179f519e57ac79d6d42c478c410cb15c6351ec37eaebd103c0817f5ae552d59c6aed8beb28ea9ce57c376e434cc362c6f5dd41a536f609529e57d0ced84b3eb231522f2312dd32074c3", 0xe1}, {&(0x7f0000000780)="c19dbc95b6e3a79a191a370e192c88c60e5205f2f70f8cc54d6c275c5884ffb670c0f4934d6683d3e656005851c53da4338edfecf8d243cbf0dee7edcd1f50b8260de217d4d89b05457d1bb150369e9d9014a87aec168687b0fbdcbf5657e8c34abde80e278246254a45cb5bd5369b6e35", 0x71}, {&(0x7f0000000800)="259d0ee20f54b401e1b949d2a54ec5ddbae80d773d91ae5c463a40d0923c532d30a2518c", 0x24}, {&(0x7f0000000840)}], 0x9) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000380)={@dev={0xac, 0x14, 0x14, 0xf}, @multicast1}, 0x8) [ 339.343751] FAULT_INJECTION: forcing a failure. [ 339.343751] name failslab, interval 1, probability 0, space 0, times 0 [ 339.365609] CPU: 1 PID: 26349 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 339.373499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 339.382845] Call Trace: [ 339.385440] dump_stack+0x1b2/0x283 [ 339.389070] should_fail.cold+0x10a/0x154 [ 339.393222] ? mempool_free+0x1d0/0x1d0 [ 339.397207] should_failslab+0xd6/0x130 [ 339.401193] kmem_cache_alloc+0x40/0x3c0 [ 339.405251] ? mempool_free+0x1d0/0x1d0 [ 339.409220] mempool_alloc+0x111/0x2d0 [ 339.413108] ? remove_element.isra.0+0x1b0/0x1b0 [ 339.417902] ? check_preemption_disabled+0x35/0x240 [ 339.422936] bio_alloc_bioset+0x352/0x640 [ 339.427077] ? bvec_alloc+0x2d0/0x2d0 [ 339.430880] ? lock_downgrade+0x6e0/0x6e0 [ 339.435029] submit_bh_wbc+0xf5/0x6f0 [ 339.438831] block_read_full_page+0x71f/0x8f0 [ 339.443325] ? set_init_blocksize+0x210/0x210 [ 339.447817] ? __lru_cache_add+0x17b/0x250 [ 339.452105] ? __bread_gfp+0x1f0/0x1f0 [ 339.456006] ? add_to_page_cache_lru+0x151/0x300 [ 339.460760] ? add_to_page_cache_locked+0x40/0x40 [ 339.465602] ? __page_cache_alloc+0xd7/0x3c0 [ 339.470011] do_read_cache_page+0x354/0xc10 [ 339.474327] ? blkdev_writepages+0xd0/0xd0 [ 339.478567] btrfs_read_disk_super+0xd0/0x370 [ 339.483058] btrfs_scan_one_device+0xb5/0x330 [ 339.487581] ? trace_hardirqs_on_caller+0x3a8/0x580 04:37:54 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x5, 0x7fffffff, 0xffffffff00000001}}, 0x28) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x9, 0x2, &(0x7f0000000180)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}, {&(0x7f0000000080)="5e075055c5f15f077e4a528d4812eeadba737a58617661312f110b4fb4328f6a2d60d6b640a2b8059895db731948d1f15179cdc1f1abfbaefbe8e8ddcdb48efc6e56b82862f18acf27a924757f8746a7ab1cd188dff7878880b3188b13cbacdef5e14d64091b5d8a9b1e84099388879f221833f2fc7dd3e33821cf43600ca7b2c31e8519ed9983d5626e902b8645018d8ce4b20ab8f25cc4b786325831f4bb4a5d6f976f71c96f43b63bdc10ffb5957617a1087d47af1c7f62822be0ac95f1a4d6", 0xc1, 0x99}], 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r1) bind$ax25(r1, &(0x7f00000003c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x8}, [@null, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @null, @default, @null]}, 0x48) 04:37:54 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$VIDIOC_S_EXT_CTRLS(r3, 0xc0205648, &(0x7f0000000040)={0xf000000, 0x401, 0x8, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x990af9, 0x91cf, [], @value64=0x2}}) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:37:54 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000380)={0x0, 0xc995}, 0x8) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000480)=ANY=[@ANYBLOB="4a000000b7ddd9488f7f94bb6de5ed6a9de4a96d7765f5dc34db4e60a88f33aec8ed105d88cd8083346b280000ff5d6b1c", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=@newlink={0x108, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}, @IFLA_WEIGHT={0x8, 0xf, 0x9}, @IFLA_MASTER={0x8}, @IFLA_LINK={0x8}, @IFLA_PORT_SELF={0xa4, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "7cbcdbbed84c3dca0e9ce21a887b1fe4"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "11c9a09ebab59e3e0241ad469ae03f7d"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "d6b98141cc24e1110012ab45587da343"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "bdb3fd3ab4f53bd098932ac39509bcf8"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ebedf99ffe8adc8000a8970443dc9989"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "8e9b9655a42b667f82d304d22085386f"}, @IFLA_PORT_PROFILE={0xa, 0x2, 'pedit\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f6acf58634bbcad8bf11f5985ec79a72"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}]}]}, 0x108}}, 0x0) [ 339.492591] ? device_list_add+0x8f0/0x8f0 [ 339.496827] btrfs_mount+0x528/0x2838 [ 339.500628] ? pcpu_find_block_fit+0x2ed/0x380 [ 339.505205] ? pcpu_alloc+0x37d/0xf70 [ 339.509001] ? btrfs_remount+0x10c0/0x10c0 [ 339.513243] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 339.518703] ? rcu_read_lock_sched_held+0x10a/0x130 [ 339.523712] ? pcpu_alloc+0xe1/0xf70 [ 339.527428] ? __lockdep_init_map+0x100/0x560 [ 339.531924] ? __lockdep_init_map+0x100/0x560 [ 339.536425] mount_fs+0x92/0x2a0 [ 339.539799] vfs_kern_mount.part.0+0x5b/0x3c0 04:37:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) time(&(0x7f0000000540)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r2) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000006c0)={&(0x7f00000005c0)={0x78, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_ADDR={0x30, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x8}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8}]}, 0x78}, 0x1, 0x0, 0x0, 0x20000004}, 0x4c805) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r5}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r5, 0xfffffffe}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000180)={r5, 0x81}, &(0x7f00000001c0)=0x8) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x42000, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140)='l2tp\x00') sendmsg$L2TP_CMD_TUNNEL_CREATE(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000640)={0x3c, r8, 0x923, 0x70bd2c, 0x0, {}, [@L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_CONN_ID={0x8}, @L2TP_ATTR_ENCAP_TYPE={0xffffff58, 0x2, 0x1}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX, @L2TP_ATTR_PROTO_VERSION={0x0, 0x7, 0x3}, @L2TP_ATTR_DATA_SEQ={0x0, 0x4, 0x9}, @L2TP_ATTR_PW_TYPE={0x0, 0x1, 0x5}, @L2TP_ATTR_PROTO_VERSION={0x0, 0x7, 0x2}]}, 0x3c}}, 0x0) sendmsg$L2TP_CMD_NOOP(r6, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r8, 0x4, 0x70bd2c, 0x25dfdbff, {}, [@L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x1}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @broadcast}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x20}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x2000a090) [ 339.544300] vfs_kern_mount+0x3c/0x60 [ 339.548102] btrfs_mount+0x2a0/0x2838 [ 339.551909] ? pcpu_find_block_fit+0x2ed/0x380 [ 339.556486] ? pcpu_alloc+0x37d/0xf70 [ 339.560286] ? btrfs_remount+0x10c0/0x10c0 [ 339.564528] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 339.569975] ? rcu_read_lock_sched_held+0x10a/0x130 [ 339.574987] ? pcpu_alloc+0xe1/0xf70 [ 339.578706] ? pcpu_find_block_fit+0x380/0x380 [ 339.583287] ? __lockdep_init_map+0x100/0x560 [ 339.587779] ? __lockdep_init_map+0x100/0x560 [ 339.592290] mount_fs+0x92/0x2a0 [ 339.595669] vfs_kern_mount.part.0+0x5b/0x3c0 [ 339.600163] do_mount+0x3c9/0x25e0 [ 339.603706] ? copy_mount_string+0x40/0x40 [ 339.607944] ? copy_mount_options+0x17d/0x2e0 [ 339.612464] ? copy_mount_options+0x187/0x2e0 [ 339.616982] ? copy_mount_options+0x1ec/0x2e0 [ 339.621473] ? copy_mnt_ns+0x8a0/0x8a0 [ 339.625357] SyS_mount+0xa8/0x120 [ 339.628806] ? copy_mnt_ns+0x8a0/0x8a0 [ 339.632691] do_syscall_64+0x1d5/0x640 [ 339.636582] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 339.641763] RIP: 0033:0x45f57a 04:37:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8d02363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a229b748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) [ 339.644944] RSP: 002b:00007f2401f3da68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 339.652663] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045f57a [ 339.659927] RDX: 00007f2401f3dae0 RSI: 00000000200001c0 RDI: 00007f2401f3db00 [ 339.667191] RBP: 000000000078bf00 R08: 00007f2401f3db40 R09: 00007f2401f3dae0 [ 339.674455] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 339.681728] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:54 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=ANY=[@ANYBLOB="4c0000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="2bfcffffff0000001c0012800b00010067656e65766500000c000280060005000000000008000500", @ANYRES32=r6, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r6, @ANYBLOB], 0x4c}}, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000380)=0xd718, 0x4) [ 339.760281] input: syz1 as /devices/virtual/input/input583 04:37:54 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r2, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r2, &(0x7f0000000640)="dd8a59ee44155d31bbc943357379636530cf95a741ea27efae1e515c4e8022042954c0a67801affcd45dfa7638329947a3b6a25a64555f2f74daf16da4cd166301e594df730d7294bdb459ffa543818c0fad7d45275a3947884589b252930026121ef435d303e65fdb340536917de6e0da09b4927606a0442e2c4cdb6c6723cad24312b0b638479ca028e116a1c59876a131fa57dddb5d9a7ed87c0b23a413caa50226d6cbdfbfb1352830b8a482d549164391a3909680a790979e29fa0a613892ddc061393d0199a0aff322c375abec7422d9039461916cf25a2d", 0xfffffffffffffc6d, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYRESHEX=r1, @ANYRESOCT=r2, @ANYRES64, @ANYRES16=r0, @ANYRES16, @ANYRES32=r3], 0x1) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) [ 339.849132] input: syz1 as /devices/virtual/input/input584 04:37:54 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x110, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0xf4, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0xb0, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x4}, @WGPEER_A_ALLOWEDIPS={0x90, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, [], 0x1}}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x12}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x3}}]}]}]}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed40004000000000000dc12de4918deae363bcef5b89f83fb609e4a25444a7e2dd8d9aa7128a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d5999550829804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 04:37:54 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f, {0x200}}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 339.945163] BTRFS error (device loop5): superblock checksum mismatch 04:37:54 executing program 1 (fault-call:0 fault-nth:73): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:54 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) setsockopt(r1, 0x2, 0x9, &(0x7f0000000080)="1846407b8a8c2ec40e907c2ff502fa7acf5ec5e2dc409419c94ae8683d2f08164f5fcbf4ad46e48a7442d962033b8c7c5ea95b2bbe0017c47dae5c6a5b06edd4737f67ffc959d6bc34c6ec4e3c46c124e7136961c9c517e9d27140acc496728386da46b8ac177a84cc618254973c274b2ca9833c8acc84bf166b181f12a7e0", 0x7f) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="b48d411fcb680cf9a3d9a785b68541436ce378629aa7b20b7fbf9c92395ce102a37416969b8a1cce96d141eb3275b3eb917f71be01d0f3ee8394d2675df1c6a9ebbdfb21bfde2abec766847a2dbf7c1259916b8503bf12743608c4b7630265a73f98ec614046a55db870ae1431dc5845944e15a65e3e"], 0x1) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r4, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) shutdown(r4, 0x1) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r5, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r6, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r6, &(0x7f0000000640)="dd8a59ee44155d31bbc943357379636530cf95a741ea27efae1e515c4e8022042954c0a67801affcd45dfa7638329947a3b6a25a64555f2f74daf16da4cd166301e594df730d7294bdb459ffa543818c0fad7d45275a3947884589b252930026121ef435d303e65fdb340536917de6e0da09b4927606a0442e2c4cdb6c6723cad24312b0b638479ca028e116a1c59876a131fa57dddb5d9a7ed87c0b23a413caa50226d6cbdfbfb1352830b8a482d549164391a3909680a790979e29fa0a613892ddc061393d0199a0aff322c375abec7422d9039461916cf25a2d", 0xfffffffffffffc6d, 0x0, 0x0, 0x0) poll(&(0x7f0000000580)=[{}, {0xffffffffffffffff, 0x450}, {0xffffffffffffffff, 0x4400}, {0xffffffffffffffff, 0x9449}, {0xffffffffffffffff, 0x40}, {r5, 0x2}, {r6, 0x4}], 0x7, 0x2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) [ 340.025575] input: syz1 as /devices/virtual/input/input585 [ 340.048467] BTRFS error (device loop5): open_ctree failed [ 340.093056] FAULT_INJECTION: forcing a failure. [ 340.093056] name failslab, interval 1, probability 0, space 0, times 0 [ 340.117623] input: syz1 as /devices/virtual/input/input586 [ 340.133554] CPU: 0 PID: 26417 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 340.141456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 340.150805] Call Trace: [ 340.153395] dump_stack+0x1b2/0x283 [ 340.157031] should_fail.cold+0x10a/0x154 [ 340.161196] should_failslab+0xd6/0x130 [ 340.165176] kmem_cache_alloc_node_trace+0x25a/0x400 [ 340.170278] __kmalloc_node+0x38/0x70 [ 340.174079] kvmalloc_node+0x88/0xd0 [ 340.177795] btrfs_mount+0xea4/0x2838 [ 340.181595] ? pcpu_find_block_fit+0x2ed/0x380 [ 340.186170] ? pcpu_alloc+0x37d/0xf70 [ 340.189965] ? btrfs_remount+0x10c0/0x10c0 [ 340.194199] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 340.199647] ? rcu_read_lock_sched_held+0x10a/0x130 [ 340.204666] ? pcpu_alloc+0xe1/0xf70 [ 340.208391] ? __lockdep_init_map+0x100/0x560 [ 340.212881] ? __lockdep_init_map+0x100/0x560 [ 340.217412] mount_fs+0x92/0x2a0 [ 340.220782] vfs_kern_mount.part.0+0x5b/0x3c0 [ 340.225272] vfs_kern_mount+0x3c/0x60 [ 340.229084] btrfs_mount+0x2a0/0x2838 [ 340.232906] ? pcpu_find_block_fit+0x2ed/0x380 [ 340.237482] ? pcpu_alloc+0x37d/0xf70 [ 340.241278] ? btrfs_remount+0x10c0/0x10c0 [ 340.245513] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 340.250956] ? rcu_read_lock_sched_held+0x10a/0x130 [ 340.255963] ? pcpu_alloc+0xe1/0xf70 [ 340.259686] ? pcpu_find_block_fit+0x380/0x380 [ 340.264271] ? __lockdep_init_map+0x100/0x560 [ 340.268763] ? __lockdep_init_map+0x100/0x560 [ 340.273255] mount_fs+0x92/0x2a0 [ 340.276621] vfs_kern_mount.part.0+0x5b/0x3c0 [ 340.281132] do_mount+0x3c9/0x25e0 [ 340.284681] ? copy_mount_string+0x40/0x40 [ 340.288940] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 340.293777] ? copy_mnt_ns+0x8a0/0x8a0 [ 340.297660] ? copy_mount_options+0x1ec/0x2e0 [ 340.302148] ? copy_mnt_ns+0x8a0/0x8a0 [ 340.306053] SyS_mount+0xa8/0x120 [ 340.309502] ? copy_mnt_ns+0x8a0/0x8a0 [ 340.313389] do_syscall_64+0x1d5/0x640 [ 340.317285] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 340.322467] RIP: 0033:0x45f57a [ 340.325649] RSP: 002b:00007f2401f3da68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 340.333366] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045f57a [ 340.340628] RDX: 00007f2401f3dae0 RSI: 00000000200001c0 RDI: 00007f2401f3db00 [ 340.347892] RBP: 000000000078bf00 R08: 00007f2401f3db40 R09: 00007f2401f3dae0 [ 340.355155] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 340.362422] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) 04:37:55 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000000000)={0x2, 0xa844, [{0x5, 0x0, 0x5}, {0xff, 0x0, 0x7f}]}) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 340.440261] nla_parse: 8 callbacks suppressed [ 340.440267] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 04:37:55 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000010010000010b7939375ce6c588a67e1e589e97b8d594f585ace87c0153c60ae83b54f392b69cc185540eb81adf82ddd5dd6bf64c56afdd6554a62d61c656299aca8ada5998"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000006751d34be351f803b9100100000a000000f300000000000000"], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x15) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) 04:37:55 executing program 1 (fault-call:0 fault-nth:74): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 340.539776] input: syz1 as /devices/virtual/input/input587 [ 340.557237] BTRFS error (device loop5): superblock checksum mismatch [ 340.584781] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 340.625055] FAULT_INJECTION: forcing a failure. [ 340.625055] name failslab, interval 1, probability 0, space 0, times 0 [ 340.636593] BTRFS error (device loop5): open_ctree failed [ 340.646558] CPU: 0 PID: 26468 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 340.653157] input: syz1 as /devices/virtual/input/input588 [ 340.654456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 340.654462] Call Trace: [ 340.654482] dump_stack+0x1b2/0x283 [ 340.654500] should_fail.cold+0x10a/0x154 [ 340.654520] should_failslab+0xd6/0x130 [ 340.654534] kmem_cache_alloc_node+0x54/0x400 [ 340.688260] create_task_io_context+0x2a/0x3c0 [ 340.692846] generic_make_request_checks+0x1605/0x1a20 [ 340.698130] ? part_round_stats+0x5c0/0x5c0 [ 340.702454] ? trace_hardirqs_on+0x10/0x10 [ 340.706691] generic_make_request+0x6b/0x850 [ 340.711106] ? blk_queue_exit+0x1d0/0x1d0 [ 340.715254] ? check_preemption_disabled+0x35/0x240 [ 340.720309] ? guard_bio_eod+0x15c/0x520 [ 340.724393] submit_bio+0x234/0x390 [ 340.728022] ? generic_make_request+0x850/0x850 [ 340.732694] ? guard_bio_eod+0x1ba/0x520 [ 340.736783] ? bio_add_page+0x96/0xe0 [ 340.740621] submit_bh_wbc+0x526/0x6f0 [ 340.744524] block_read_full_page+0x71f/0x8f0 [ 340.749025] ? set_init_blocksize+0x210/0x210 [ 340.753527] ? __lru_cache_add+0x17b/0x250 [ 340.757760] ? __bread_gfp+0x1f0/0x1f0 [ 340.761654] ? add_to_page_cache_lru+0x151/0x300 [ 340.766423] ? add_to_page_cache_locked+0x40/0x40 [ 340.771264] ? __page_cache_alloc+0xd7/0x3c0 [ 340.775673] do_read_cache_page+0x354/0xc10 [ 340.779993] ? blkdev_writepages+0xd0/0xd0 [ 340.784234] btrfs_read_disk_super+0xd0/0x370 [ 340.788732] btrfs_scan_one_device+0xb5/0x330 [ 340.793334] ? trace_hardirqs_on_caller+0x3a8/0x580 [ 340.798348] ? device_list_add+0x8f0/0x8f0 [ 340.802588] btrfs_mount+0x528/0x2838 [ 340.806394] ? pcpu_find_block_fit+0x2ed/0x380 [ 340.810976] ? pcpu_alloc+0x37d/0xf70 [ 340.814773] ? btrfs_remount+0x10c0/0x10c0 [ 340.819020] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 340.824469] ? rcu_read_lock_sched_held+0x10a/0x130 [ 340.829479] ? pcpu_alloc+0xe1/0xf70 [ 340.833206] ? __lockdep_init_map+0x100/0x560 [ 340.837709] ? __lockdep_init_map+0x100/0x560 [ 340.842205] mount_fs+0x92/0x2a0 [ 340.845571] vfs_kern_mount.part.0+0x5b/0x3c0 [ 340.850065] vfs_kern_mount+0x3c/0x60 [ 340.853868] btrfs_mount+0x2a0/0x2838 [ 340.857676] ? _find_next_bit+0xdb/0x100 [ 340.861739] ? pcpu_alloc+0x37d/0xf70 [ 340.865548] ? btrfs_remount+0x10c0/0x10c0 [ 340.869791] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 340.875251] ? rcu_read_lock_sched_held+0x10a/0x130 [ 340.880266] ? pcpu_alloc+0xe1/0xf70 [ 340.883989] ? pcpu_find_block_fit+0x380/0x380 [ 340.888591] ? __lockdep_init_map+0x100/0x560 [ 340.893106] ? __lockdep_init_map+0x100/0x560 [ 340.897605] mount_fs+0x92/0x2a0 [ 340.900974] vfs_kern_mount.part.0+0x5b/0x3c0 [ 340.905473] do_mount+0x3c9/0x25e0 [ 340.909020] ? copy_mount_string+0x40/0x40 [ 340.913256] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 340.918125] ? copy_mnt_ns+0x8a0/0x8a0 [ 340.922014] ? copy_mount_options+0x1ec/0x2e0 [ 340.926507] ? copy_mnt_ns+0x8a0/0x8a0 [ 340.930391] SyS_mount+0xa8/0x120 [ 340.933841] ? copy_mnt_ns+0x8a0/0x8a0 [ 340.937727] do_syscall_64+0x1d5/0x640 [ 340.941618] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 340.946804] RIP: 0033:0x45f57a [ 340.949987] RSP: 002b:00007f2401f3da68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 340.957732] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045f57a [ 340.965012] RDX: 00007f2401f3dae0 RSI: 00000000200001c0 RDI: 00007f2401f3db00 04:37:55 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) setsockopt(r1, 0x2, 0x9, &(0x7f0000000080)="1846407b8a8c2ec40e907c2ff502fa7acf5ec5e2dc409419c94ae8683d2f08164f5fcbf4ad46e48a7442d962033b8c7c5ea95b2bbe0017c47dae5c6a5b06edd4737f67ffc959d6bc34c6ec4e3c46c124e7136961c9c517e9d27140acc496728386da46b8ac177a84cc618254973c274b2ca9833c8acc84bf166b181f12a7e0", 0x7f) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="b48d411fcb680cf9a3d9a785b68541436ce378629aa7b20b7fbf9c92395ce102a37416969b8a1cce96d141eb3275b3eb917f71be01d0f3ee8394d2675df1c6a9ebbdfb21bfde2abec766847a2dbf7c1259916b8503bf12743608c4b7630265a73f98ec614046a55db870ae1431dc5845944e15a65e3e"], 0x1) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r4, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) shutdown(r4, 0x1) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r5, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r6, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r6, &(0x7f0000000640)="dd8a59ee44155d31bbc943357379636530cf95a741ea27efae1e515c4e8022042954c0a67801affcd45dfa7638329947a3b6a25a64555f2f74daf16da4cd166301e594df730d7294bdb459ffa543818c0fad7d45275a3947884589b252930026121ef435d303e65fdb340536917de6e0da09b4927606a0442e2c4cdb6c6723cad24312b0b638479ca028e116a1c59876a131fa57dddb5d9a7ed87c0b23a413caa50226d6cbdfbfb1352830b8a482d549164391a3909680a790979e29fa0a613892ddc061393d0199a0aff322c375abec7422d9039461916cf25a2d", 0xfffffffffffffc6d, 0x0, 0x0, 0x0) poll(&(0x7f0000000580)=[{}, {0xffffffffffffffff, 0x450}, {0xffffffffffffffff, 0x4400}, {0xffffffffffffffff, 0x9449}, {0xffffffffffffffff, 0x40}, {r5, 0x2}, {r6, 0x4}], 0x7, 0x2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) 04:37:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000000)="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") r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) [ 340.972274] RBP: 000000000078bf00 R08: 00007f2401f3db40 R09: 00007f2401f3dae0 [ 340.979534] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 340.986799] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) 04:37:55 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_proto_private(r0, 0x89ed, &(0x7f0000000000)="55ec2926ed03e1f6fd4e0154bd82b93113c603f47f22cf6b68b789cb22f54c486bb4afda3b5384491b9be8c2e3367f0d2c6137cfcd616a02948d5a7932ca244131ef5457f9e416c191cbfcbec5faadf8202192b722c7af23c35ce0451171ccd2907ec27b3d485bd141a577a8bff378") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r1) getpeername(r1, &(0x7f0000000280)=@xdp, &(0x7f0000000100)=0x80) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f0000000340)={0xf, {0x0, 0x0, 0x0, 0x0, 0x4000000}}) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x3) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$USBDEVFS_SETINTERFACE(r3, 0x80085504, &(0x7f0000000080)={0x40, 0x43ab}) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x9}, 'syz0\x00', 0x2}) socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r4 = dup(0xffffffffffffffff) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r5) fcntl$setstatus(r5, 0x4, 0x42000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r2, 0x5501) 04:37:55 executing program 1 (fault-call:0 fault-nth:75): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:55 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) setsockopt(r1, 0x2, 0x9, &(0x7f0000000080)="1846407b8a8c2ec40e907c2ff502fa7acf5ec5e2dc409419c94ae8683d2f08164f5fcbf4ad46e48a7442d962033b8c7c5ea95b2bbe0017c47dae5c6a5b06edd4737f67ffc959d6bc34c6ec4e3c46c124e7136961c9c517e9d27140acc496728386da46b8ac177a84cc618254973c274b2ca9833c8acc84bf166b181f12a7e0", 0x7f) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="b48d411fcb680cf9a3d9a785b68541436ce378629aa7b20b7fbf9c92395ce102a37416969b8a1cce96d141eb3275b3eb917f71be01d0f3ee8394d2675df1c6a9ebbdfb21bfde2abec766847a2dbf7c1259916b8503bf12743608c4b7630265a73f98ec614046a55db870ae1431dc5845944e15a65e3e"], 0x1) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r4, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) shutdown(r4, 0x1) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r5, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r6, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r6, &(0x7f0000000640)="dd8a59ee44155d31bbc943357379636530cf95a741ea27efae1e515c4e8022042954c0a67801affcd45dfa7638329947a3b6a25a64555f2f74daf16da4cd166301e594df730d7294bdb459ffa543818c0fad7d45275a3947884589b252930026121ef435d303e65fdb340536917de6e0da09b4927606a0442e2c4cdb6c6723cad24312b0b638479ca028e116a1c59876a131fa57dddb5d9a7ed87c0b23a413caa50226d6cbdfbfb1352830b8a482d549164391a3909680a790979e29fa0a613892ddc061393d0199a0aff322c375abec7422d9039461916cf25a2d", 0xfffffffffffffc6d, 0x0, 0x0, 0x0) poll(&(0x7f0000000580)=[{}, {0xffffffffffffffff, 0x450}, {0xffffffffffffffff, 0x4400}, {0xffffffffffffffff, 0x9449}, {0xffffffffffffffff, 0x40}, {r5, 0x2}, {r6, 0x4}], 0x7, 0x2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) [ 341.075947] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 04:37:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000280)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r3}}, 0x30) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f0000000000)={0x14, 0x88, 0xfa00, {r3, 0x1c, 0x0, @ib={0x1b, 0x1, 0x5, {"14b18c1a086a3a252d299469575a0b00"}, 0x401, 0x5, 0xa0b}}}, 0x90) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000d00200009800000000000000680100009800000000000000380200003802000038020000380200003802000004000000000000000000000010000000e00000020000000000000000626f6e645f736c6176655f310000000000000000000000000000e2ffffff001f00000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a45435400000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc18795000000000000000000000000000000000040000000000000000000000000000000000000010000000000000000000000a800d0000000000000000000000000000000000000000000380074696d650000000000554e8269000000000000000000000000000000000000000000ffffffff4f970000001b000000000000f9000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000ffff000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000380071756f7461000000000000000000000000000000000000000000000000000100000000deffff460d0000000000000000000000000000280052454a45435400000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028000000000000000000000000000000001ec500000000000000000000000000feffffff"], 0x1) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r5, &(0x7f0000000280)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r6}}, 0x30) write$RDMA_USER_CM_CMD_SET_OPTION(r4, &(0x7f0000000580)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000540), r6, 0x0, 0x2, 0x4}}, 0x20) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) [ 341.134458] input: syz0 as /devices/virtual/input/input589 04:37:55 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) setsockopt(r1, 0x2, 0x9, &(0x7f0000000080)="1846407b8a8c2ec40e907c2ff502fa7acf5ec5e2dc409419c94ae8683d2f08164f5fcbf4ad46e48a7442d962033b8c7c5ea95b2bbe0017c47dae5c6a5b06edd4737f67ffc959d6bc34c6ec4e3c46c124e7136961c9c517e9d27140acc496728386da46b8ac177a84cc618254973c274b2ca9833c8acc84bf166b181f12a7e0", 0x7f) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000d00200009800000000000000680100009800000000000000380200003802000038020000380200003802000004000000000000000000000010000000e00000020000000000000000626f6e645f736c6176655f310000000000000000000000000000e2ffffff001f00000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a45435400000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc18795000000000000000000000000000000000040000000000000000000000000000000000000010000000000000000000000a800d0000000000000000000000000000000000000000000380074696d650000000000554e8269000000000000000000000000000000000000000000ffffffff4f970000001b000000000000f9000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000ffff000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000380071756f7461000000000000000000000000000000000000000000000000000100000000deffff460d0000000000000000000000000000280052454a45435400000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028000000000000000000000000000000001ec500000000000000000000000000feffffff"], 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="b48d411fcb680cf9a3d9a785b68541436ce378629aa7b20b7fbf9c92395ce102a37416969b8a1cce96d141eb3275b3eb917f71be01d0f3ee8394d2675df1c6a9ebbdfb21bfde2abec766847a2dbf7c1259916b8503bf12743608c4b7630265a73f98ec614046a55db870ae1431dc5845944e15a65e3e"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) shutdown(r3, 0x1) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r4, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r5, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r5, &(0x7f0000000640)="dd8a59ee44155d31bbc943357379636530cf95a741ea27efae1e515c4e8022042954c0a67801affcd45dfa7638329947a3b6a25a64555f2f74daf16da4cd166301e594df730d7294bdb459ffa543818c0fad7d45275a3947884589b252930026121ef435d303e65fdb340536917de6e0da09b4927606a0442e2c4cdb6c6723cad24312b0b638479ca028e116a1c59876a131fa57dddb5d9a7ed87c0b23a413caa50226d6cbdfbfb1352830b8a482d549164391a3909680a790979e29fa0a613892ddc061393d0199a0aff322c375abec7422d9039461916cf25a2d", 0xfffffffffffffc6d, 0x0, 0x0, 0x0) poll(&(0x7f0000000580)=[{}, {0xffffffffffffffff, 0x450}, {0xffffffffffffffff, 0x4400}, {0xffffffffffffffff, 0x9449}, {0xffffffffffffffff, 0x40}, {r4, 0x2}, {r5, 0x4}], 0x7, 0x2) [ 341.181278] BTRFS error (device loop5): superblock checksum mismatch [ 341.199083] FAULT_INJECTION: forcing a failure. [ 341.199083] name failslab, interval 1, probability 0, space 0, times 0 [ 341.227748] CPU: 0 PID: 26514 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 341.235649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.245031] Call Trace: [ 341.247661] dump_stack+0x1b2/0x283 [ 341.251338] should_fail.cold+0x10a/0x154 [ 341.255509] should_failslab+0xd6/0x130 [ 341.259472] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 341.264166] btrfs_mount+0xf1e/0x2838 [ 341.268044] ? pcpu_find_block_fit+0x2ed/0x380 [ 341.272676] ? pcpu_alloc+0x37d/0xf70 [ 341.276518] ? btrfs_remount+0x10c0/0x10c0 [ 341.280808] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 341.286327] ? rcu_read_lock_sched_held+0x10a/0x130 [ 341.291371] ? pcpu_alloc+0xe1/0xf70 [ 341.295146] ? __lockdep_init_map+0x100/0x560 [ 341.299680] ? __lockdep_init_map+0x100/0x560 [ 341.304211] mount_fs+0x92/0x2a0 [ 341.307647] vfs_kern_mount.part.0+0x5b/0x3c0 [ 341.312176] vfs_kern_mount+0x3c/0x60 [ 341.315994] btrfs_mount+0x2a0/0x2838 [ 341.319831] ? pcpu_find_block_fit+0x2ed/0x380 [ 341.324448] ? pcpu_alloc+0x37d/0xf70 [ 341.328251] ? btrfs_remount+0x10c0/0x10c0 [ 341.332526] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 341.337994] ? rcu_read_lock_sched_held+0x10a/0x130 [ 341.343105] ? pcpu_alloc+0xe1/0xf70 [ 341.346881] ? pcpu_find_block_fit+0x380/0x380 [ 341.351522] ? __lockdep_init_map+0x100/0x560 [ 341.356074] ? __lockdep_init_map+0x100/0x560 [ 341.360658] mount_fs+0x92/0x2a0 [ 341.364101] vfs_kern_mount.part.0+0x5b/0x3c0 [ 341.368600] do_mount+0x3c9/0x25e0 [ 341.372141] ? copy_mount_string+0x40/0x40 [ 341.376361] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 341.381254] ? copy_mnt_ns+0x8a0/0x8a0 [ 341.385207] ? copy_mount_options+0x1ec/0x2e0 [ 341.389740] ? copy_mnt_ns+0x8a0/0x8a0 [ 341.393616] SyS_mount+0xa8/0x120 [ 341.397099] ? copy_mnt_ns+0x8a0/0x8a0 [ 341.401029] do_syscall_64+0x1d5/0x640 [ 341.404977] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 341.410152] RIP: 0033:0x45f57a [ 341.413361] RSP: 002b:00007f2401f3da68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 341.421121] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045f57a 04:37:56 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000100)=0x8, 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x129cc0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r4, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) connect$rds(r4, &(0x7f0000000040)={0x2, 0x4e22, @rand_addr=0x64010101}, 0x10) ioctl$UI_SET_PHYS(r4, 0x4008556c, &(0x7f0000000000)='syz1\x00') ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:37:56 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000380)={0x0, 'syzkaller0\x00', {0x3}, 0x5}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 341.428421] RDX: 00007f2401f3dae0 RSI: 00000000200001c0 RDI: 00007f2401f3db00 [ 341.435712] RBP: 000000000078bf00 R08: 00007f2401f3db40 R09: 00007f2401f3dae0 [ 341.443019] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 341.450331] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:56 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) setsockopt(r1, 0x2, 0x9, &(0x7f0000000080)="1846407b8a8c2ec40e907c2ff502fa7acf5ec5e2dc409419c94ae8683d2f08164f5fcbf4ad46e48a7442d962033b8c7c5ea95b2bbe0017c47dae5c6a5b06edd4737f67ffc959d6bc34c6ec4e3c46c124e7136961c9c517e9d27140acc496728386da46b8ac177a84cc618254973c274b2ca9833c8acc84bf166b181f12a7e0", 0x7f) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="b48d411fcb680cf9a3d9a785b68541436ce378629aa7b20b7fbf9c92395ce102a37416969b8a1cce96d141eb3275b3eb917f71be01d0f3ee8394d2675df1c6a9ebbdfb21bfde2abec766847a2dbf7c1259916b8503bf12743608c4b7630265a73f98ec614046a55db870ae1431dc5845944e15a65e3e"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) shutdown(r3, 0x1) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r4, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r5, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r5, &(0x7f0000000640)="dd8a59ee44155d31bbc943357379636530cf95a741ea27efae1e515c4e8022042954c0a67801affcd45dfa7638329947a3b6a25a64555f2f74daf16da4cd166301e594df730d7294bdb459ffa543818c0fad7d45275a3947884589b252930026121ef435d303e65fdb340536917de6e0da09b4927606a0442e2c4cdb6c6723cad24312b0b638479ca028e116a1c59876a131fa57dddb5d9a7ed87c0b23a413caa50226d6cbdfbfb1352830b8a482d549164391a3909680a790979e29fa0a613892ddc061393d0199a0aff322c375abec7422d9039461916cf25a2d", 0xfffffffffffffc6d, 0x0, 0x0, 0x0) poll(&(0x7f0000000580)=[{}, {0xffffffffffffffff, 0x450}, {0xffffffffffffffff, 0x4400}, {0xffffffffffffffff, 0x9449}, {0xffffffffffffffff, 0x40}, {r4, 0x2}, {r5, 0x4}], 0x7, 0x2) 04:37:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="4800000024000705000000000000000000001f00", @ANYRES32=r6, @ANYBLOB="00000400f1ffffff0000000008000100687462001c0002001800020003"], 0x48}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@delchain={0x68, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {0x4}, {0x0, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x34, 0x1, [@m_pedit={0x30, 0x0, 0x0, 0x0, {{0xa, 0x1, 'pedit\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000600)=@delchain={0x68, 0x28, 0xf35, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {0x2}, {0x4, 0xffff}}, [@filter_kind_options=@f_cgroup={{0xb, 0x1, 'cgroup\x00'}, {0x38, 0x2, [@TCA_CGROUP_ACT={0x34, 0x1, [@m_mpls={0x30, 0x0, 0x0, 0x0, {{0x9, 0x1, 'mpls\x00'}, {0x4}, {0x4}, {0xc}, {0xc}}}]}]}}]}, 0x68}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x58, 0x0, 0x400, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @multicast}, @BATADV_ATTR_GW_MODE={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x6}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x8}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x4004800}, 0x20000004) getsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000000)={@dev, @dev, @broadcast}, &(0x7f0000000040)=0xc) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r8, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) recvmsg(r8, &(0x7f0000000600)={&(0x7f0000000080)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/158, 0x9e}], 0x1, &(0x7f0000000540)=""/154, 0x9a}, 0x0) [ 341.519189] input: syz1 as /devices/virtual/input/input591 04:37:56 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) setsockopt(r1, 0x2, 0x9, &(0x7f0000000080)="1846407b8a8c2ec40e907c2ff502fa7acf5ec5e2dc409419c94ae8683d2f08164f5fcbf4ad46e48a7442d962033b8c7c5ea95b2bbe0017c47dae5c6a5b06edd4737f67ffc959d6bc34c6ec4e3c46c124e7136961c9c517e9d27140acc496728386da46b8ac177a84cc618254973c274b2ca9833c8acc84bf166b181f12a7e0", 0x7f) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="b48d411fcb680cf9a3d9a785b68541436ce378629aa7b20b7fbf9c92395ce102a37416969b8a1cce96d141eb3275b3eb917f71be01d0f3ee8394d2675df1c6a9ebbdfb21bfde2abec766847a2dbf7c1259916b8503bf12743608c4b7630265a73f98ec614046a55db870ae1431dc5845944e15a65e3e"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) shutdown(r3, 0x1) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r4, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r5, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r5, &(0x7f0000000640)="dd8a59ee44155d31bbc943357379636530cf95a741ea27efae1e515c4e8022042954c0a67801affcd45dfa7638329947a3b6a25a64555f2f74daf16da4cd166301e594df730d7294bdb459ffa543818c0fad7d45275a3947884589b252930026121ef435d303e65fdb340536917de6e0da09b4927606a0442e2c4cdb6c6723cad24312b0b638479ca028e116a1c59876a131fa57dddb5d9a7ed87c0b23a413caa50226d6cbdfbfb1352830b8a482d549164391a3909680a790979e29fa0a613892ddc061393d0199a0aff322c375abec7422d9039461916cf25a2d", 0xfffffffffffffc6d, 0x0, 0x0, 0x0) poll(&(0x7f0000000580)=[{}, {0xffffffffffffffff, 0x450}, {0xffffffffffffffff, 0x4400}, {0xffffffffffffffff, 0x9449}, {0xffffffffffffffff, 0x40}, {r4, 0x2}, {r5, 0x4}], 0x7, 0x2) [ 341.564386] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 341.591887] input: syz1 as /devices/virtual/input/input592 [ 341.608555] BTRFS error (device loop5): open_ctree failed 04:37:56 executing program 1 (fault-call:0 fault-nth:76): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 341.637034] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 341.649190] print_req_error: I/O error, dev loop5, sector 0 04:37:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000640)="dd8a59ee44155d31bbc943357379636530cf95a741ea27efae1e515c4e8022042954c0a67801affcd45dfa7638329947a3b6a25a64555f2f74daf16da4cd166301e594df730d7294bdb459ffa543818c0fad7d45275a3947884589b252930026121ef435d303e65fdb340536917de6e0da09b4927606a0442e2c4cdb6c6723cad24312b0b638479ca028e116a1c59876a131fa57dddb5d9a7ed87c0b23a413caa50226d6cbdfbfb1352830b8a482d549164391a3909680a790979e29fa0a613892ddc061393d0199a0aff322c375abec7422d9039461916cf25a2d", 0xfffffffffffffc6d, 0x0, 0x0, 0x0) fstat(r0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) newfstatat(0xffffffffffffff9c, &(0x7f0000001700)='./file0/file0\x00', &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x7, &(0x7f0000001540)=[{&(0x7f0000000100)="4980ce9a13aa64ba1b4bed1ff63daf6cb564abc2f32d3f8f62c1152f915f80c2344ca34c1b6b5fa368a4e06f7f6ac6", 0x2f, 0x1f}, {&(0x7f0000000200)="bfcab67a9e1c486549e9238c69e3cc6a665eb1e1cae8bb8f32b938e5ee8c019a7e1bcd722b031728d5b75448914c994fca827ff4974510592175e67ec5610ceaf47d2d26f1aea4ab1f151c09658452774103ac06b4a538d3dc031eeff009c335af98da3896663e59e82644d512830ab5a9dc56272c412e5070e8729088ec62c9401180e787e8bc78d513355c626ae115e18ded91a6154cef536d16b255bc706916ea27edc15805f1aa0a0d571a491b65720d18", 0xb3}, {&(0x7f0000000340)="bfb523453b12ae9b47591b0c309802c61edbb41b10b68b7d80f530262505ef73759fc35862ee4619c113272fedc68649e9b8a412b4ce87645fbc9be9194a7fa0beff49e2d6a91dd58964e58dc0b59afd85cc1637c986ffd43d1dca067685f13b811839fac32d0c899f7d77655e8a7dafc9235937c6ed78a18d7e7278befe9cd2557fd14c3aed98a1e6c872e37995382fd83623a9a78a3411ce8bc7bfe32e", 0x9e, 0x6}, {&(0x7f0000000400)="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", 0x1000, 0x5}, {&(0x7f0000000140)="3cf5940c9799e2857e683bd66c535ce6f15f7b1248e740fd6629fbc9b058aebfab97c759ff48449ec1e1b347280787541f6c684199d776effe77f03f21cb3eee1112d47adc18c2337ba975c847a27e22b2d411910b03b3817b515360187f0fb134137a147dbf4b4f", 0x68, 0x5}, {&(0x7f0000001400)="32e929639871d4a66242eb1e4a0e59240b313789ced76a0a421ae5ec51a6bd8bd5d037838ae43e7aeb8884bd9e4e2278425dda82852e573c05f55c3407bcb52e4e48370a98280574abb07058c87c81735c9da7f0c45562011420a7c7aea05291e513d167901e6028bd54e749d9b96a4d1815fdfe79f9daeeb079f9c9f4773a5f976326b42a9b5c2ed669fb0514502d9b35906bfa693511f073e7995fc7f2597dabc19a88", 0xa4, 0x7}, {&(0x7f00000014c0)="e5b0e78b963a46f27816653b58dee8eba13657c32fce6e4b9d3b0df617d5487acc3c9d30e0c1ad08a9bd223bb6579c9af57e5057b1d5a754e19f1184b55fb17216f776ddb757ccfce3d7e43e9f0d482014bd45d1b5e3a5902eb728c364d53f", 0x5f}], 0x1000080, &(0x7f0000001680)={[{@quota='quota'}, {@commit={'commit', 0x3d, 0x4d}}, {@norecovery='norecovery'}], [{@fowner_lt={'fowner<', r1}}, {@fowner_gt={'fowner>', r3}}, {@appraise='appraise'}, {@obj_type={'obj_type'}}]}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) 04:37:56 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x40801, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 341.729074] HTB: quantum of class FFFF0004 is small. Consider r2q change. [ 341.739179] HTB: quantum of class FFFF0002 is small. Consider r2q change. 04:37:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) [ 341.792031] BTRFS error (device loop5): superblock checksum mismatch [ 341.804193] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 04:37:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x140d, 0x1, 0x70bd28, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000}, 0x40084) [ 341.838967] FAULT_INJECTION: forcing a failure. [ 341.838967] name failslab, interval 1, probability 0, space 0, times 0 [ 341.864994] CPU: 0 PID: 26572 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 341.872900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.882256] Call Trace: [ 341.884855] dump_stack+0x1b2/0x283 [ 341.888497] should_fail.cold+0x10a/0x154 [ 341.892642] should_failslab+0xd6/0x130 [ 341.896633] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 341.901296] ? loop_clr_fd+0x464/0xac0 [ 341.905182] ? dev_uevent_filter+0xd0/0xd0 [ 341.909415] kobject_uevent_env+0x1fa/0xc50 [ 341.913741] loop_clr_fd+0x49e/0xac0 [ 341.917457] lo_ioctl+0x89c/0x1c00 [ 341.921015] ? kasan_slab_free+0x119/0x190 [ 341.925265] ? loop_clr_fd+0xac0/0xac0 [ 341.929152] blkdev_ioctl+0x91d/0x17c0 [ 341.933037] ? blkpg_ioctl+0x8d0/0x8d0 [ 341.936938] ? trace_hardirqs_on+0x10/0x10 [ 341.941198] block_ioctl+0xd9/0x120 [ 341.944825] ? blkdev_fallocate+0x3a0/0x3a0 [ 341.949143] do_vfs_ioctl+0x75a/0xfe0 [ 341.952938] ? selinux_parse_skb.constprop.0+0x16c0/0x16c0 [ 341.958558] ? ioctl_preallocate+0x1a0/0x1a0 [ 341.962973] ? security_file_ioctl+0x76/0xb0 [ 341.967383] ? security_file_ioctl+0x83/0xb0 [ 341.971792] SyS_ioctl+0x7f/0xb0 [ 341.975152] ? do_vfs_ioctl+0xfe0/0xfe0 [ 341.979159] do_syscall_64+0x1d5/0x640 [ 341.983048] entry_SYSCALL_64_after_hwframe+0x46/0xbb 04:37:56 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r3) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000004a00)={{{@in6=@private2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@private2}}, &(0x7f0000004b00)=0xe8) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000004b40)={r4, 0x1, 0x6}, 0x10) [ 341.988228] RIP: 0033:0x45c9f7 [ 341.991419] RSP: 002b:00007f2401f3da68 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 341.999122] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045c9f7 [ 342.006386] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 342.013654] RBP: 000000000078bf00 R08: 00007f2401f3db40 R09: 00007f2401f3dae0 [ 342.020919] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 342.028183] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 342.049399] BTRFS error (device loop5): open_ctree failed 04:37:56 executing program 1 (fault-call:0 fault-nth:77): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 04:37:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000d00200009800000000000000680100009800000000000000380200003802000038020000380200003802000004000000000000000000000010000000e00000020000000000000000626f6e645f736c6176655f310000000000000000000000000000e2ffffff001f00000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a45435400000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc18795000000000000000000000000000000000040000000000000000000000000000000000000010000000000000000000000a800d0000000000000000000000000000000000000000000380074696d650000000000554e8269000000000000000000000000000000000000000000ffffffff4f970000001b000000000000f9000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000ffff000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000380071756f7461000000000000000000000000000000000000000000000000000100000000deffff460d0000000000000000000000000000280052454a45435400000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028000000000000000000000000000000001ec500000000000000000000000000feffffff"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$inet(0x2, 0x2, 0x2000000088) bind(r2, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvmmsg(r2, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) 04:37:56 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000440)='wireguard\x00') socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000003e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0xa, "f3"}], 0x18}}], 0x2, 0x0) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f00000000c0)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000400)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x78, r1, 0x2, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x400}, @WGDEVICE_A_PEERS={0x5c, 0x8, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @multicast2}}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @broadcast}}]}, {0x10, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x4}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x18, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8011}, 0x4048800) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_GET_KEY(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)={0x58, 0x0, 0x8, 0x70bd2d, 0x25dfdbfe, {}, [@NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x20, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_ATTR_KEY_IDX={0x5}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x3}, @NL80211_ATTR_KEY_SEQ={0xc, 0xa, "a2945ca37af367aa"}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000000}, 0x40004) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32, @ANYBLOB="0000000000000000280012000c0001007665746800000000", @ANYRES32=0x0, @ANYBLOB="775956ed408a2ed49d6cf9f9b724f5ecdc4918deae363bcef5b89f83a2387bfb255f4a7e2dd8d9aa7129a1a794dbc6963fba71fd46977cc84b39789e621ee6a1f65fc28622d225bd3d2fddd793b10f0a91c9d1d243984c4b9f7d50f5228260e28c4175f18fa2e72d599955ca29804a349ac608d72a8e05a9c0bcbdd78faa21"], 0x48}, 0x1, 0x0, 0x0, 0x200040d1}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x7) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newlink={0x4c, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x32b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @geneve={{0xb, 0x1, 'geneve\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GENEVE_PORT={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x4c}}, 0x0) [ 342.126353] input: syz1 as /devices/virtual/input/input595 04:37:56 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYRESHEX=r0], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) [ 342.180102] input: syz1 as /devices/virtual/input/input596 [ 342.202453] FAULT_INJECTION: forcing a failure. [ 342.202453] name failslab, interval 1, probability 0, space 0, times 0 [ 342.223423] CPU: 0 PID: 26617 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 342.231308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.240654] Call Trace: [ 342.243243] dump_stack+0x1b2/0x283 [ 342.246878] should_fail.cold+0x10a/0x154 [ 342.251029] should_failslab+0xd6/0x130 [ 342.255007] kmem_cache_alloc_trace+0x2b7/0x3f0 [ 342.259678] btrfs_alloc_device+0xa4/0x6a0 [ 342.263927] ? btrfs_finish_sprout+0x5e0/0x5e0 [ 342.268515] __btrfs_close_devices+0x2b9/0xa30 [ 342.273096] ? __mutex_unlock_slowpath+0x75/0x780 [ 342.277938] ? find_device+0x100/0x100 [ 342.281839] ? btrfs_alloc_device+0x6a0/0x6a0 [ 342.286354] btrfs_close_devices+0x24/0x140 [ 342.290690] btrfs_mount+0x1cfe/0x2838 [ 342.294584] ? pcpu_find_block_fit+0x2ed/0x380 [ 342.299178] ? pcpu_alloc+0x37d/0xf70 [ 342.302981] ? btrfs_remount+0x10c0/0x10c0 [ 342.305338] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. [ 342.307222] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 342.307240] ? rcu_read_lock_sched_held+0x10a/0x130 [ 342.307249] ? pcpu_alloc+0xe1/0xf70 [ 342.307280] ? __lockdep_init_map+0x100/0x560 [ 342.307290] ? __lockdep_init_map+0x100/0x560 [ 342.307316] mount_fs+0x92/0x2a0 [ 342.342299] vfs_kern_mount.part.0+0x5b/0x3c0 [ 342.346795] vfs_kern_mount+0x3c/0x60 [ 342.350594] btrfs_mount+0x2a0/0x2838 [ 342.354410] ? pcpu_find_block_fit+0x2ed/0x380 [ 342.358994] ? pcpu_alloc+0x37d/0xf70 [ 342.362794] ? btrfs_remount+0x10c0/0x10c0 [ 342.367037] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 342.372488] ? rcu_read_lock_sched_held+0x10a/0x130 [ 342.377498] ? pcpu_alloc+0xe1/0xf70 [ 342.381219] ? pcpu_find_block_fit+0x380/0x380 [ 342.385798] ? __lockdep_init_map+0x100/0x560 [ 342.390303] ? __lockdep_init_map+0x100/0x560 [ 342.394797] mount_fs+0x92/0x2a0 [ 342.398178] vfs_kern_mount.part.0+0x5b/0x3c0 [ 342.402673] do_mount+0x3c9/0x25e0 [ 342.406216] ? copy_mount_string+0x40/0x40 [ 342.410444] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 342.415279] ? copy_mnt_ns+0x8a0/0x8a0 [ 342.419184] ? copy_mount_options+0x1ec/0x2e0 [ 342.423689] ? copy_mnt_ns+0x8a0/0x8a0 [ 342.427603] SyS_mount+0xa8/0x120 [ 342.431052] ? copy_mnt_ns+0x8a0/0x8a0 [ 342.434942] do_syscall_64+0x1d5/0x640 [ 342.438840] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 342.444039] RIP: 0033:0x45f57a [ 342.447223] RSP: 002b:00007f2401f3da68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 342.454930] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045f57a [ 342.462216] RDX: 00007f2401f3dae0 RSI: 00000000200001c0 RDI: 00007f2401f3db00 [ 342.469493] RBP: 000000000078bf00 R08: 00007f2401f3db40 R09: 00007f2401f3dae0 04:37:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ioctl$sock_ifreq(r1, 0x0, &(0x7f0000000080)={'caif0\x00', @ifru_addrs=@tipc=@name={0x1e, 0x2, 0x2, {{0x42, 0x1}, 0x1}}}) tkill(0x0, 0x3c) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) write$FUSE_LK(r2, &(0x7f0000000040)={0x28, 0x0, 0x7, {{0x6b0, 0x80000000, 0x1}}}, 0x28) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000200)=ANY=[], 0x1) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r3) ioctl$DRM_IOCTL_GET_MAGIC(r3, 0x80046402, &(0x7f0000000000)=0xfffff800) 04:37:57 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) setsockopt(r1, 0x2, 0x9, &(0x7f0000000080)="1846407b8a8c2ec40e907c2ff502fa7acf5ec5e2dc409419c94ae8683d2f08164f5fcbf4ad46e48a7442d962033b8c7c5ea95b2bbe0017c47dae5c6a5b06edd4737f67ffc959d6bc34c6ec4e3c46c124e7136961c9c517e9d27140acc496728386da46b8ac177a84cc618254973c274b2ca9833c8acc84bf166b181f12a7e0", 0x7f) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e00000004000000d00200009800000000000000680100009800000000000000380200003802000038020000380200003802000004000000000000000000000010000000e00000020000000000000000626f6e645f736c6176655f310000000000000000000000000000e2ffffff001f00000000000000000000000000000000000000000000000000000000000000000000000000000000700098000000000000000000000000000000000000000000280052454a45435400000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc18795000000000000000000000000000000000040000000000000000000000000000000000000010000000000000000000000a800d0000000000000000000000000000000000000000000380074696d650000000000554e8269000000000000000000000000000000000000000000ffffffff4f970000001b000000000000f9000000280052454a45435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000ffff000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000380071756f7461000000000000000000000000000000000000000000000000000100000000deffff460d0000000000000000000000000000280052454a45435400000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070009800000000000000000000000000000000000000000028000000000000000000000000000000001ec500000000000000000000000000feffffff"], 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="b48d411fcb680cf9a3d9a785b68541436ce378629aa7b20b7fbf9c92395ce102a37416969b8a1cce96d141eb3275b3eb917f71be01d0f3ee8394d2675df1c6a9ebbdfb21bfde2abec766847a2dbf7c1259916b8503bf12743608c4b7630265a73f98ec614046a55db870ae1431dc5845944e15a65e3e"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) shutdown(r3, 0x1) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r4, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r5, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) poll(&(0x7f0000000580)=[{}, {0xffffffffffffffff, 0x450}, {0xffffffffffffffff, 0x4400}, {0xffffffffffffffff, 0x9449}, {0xffffffffffffffff, 0x40}, {r4, 0x2}, {r5, 0x4}], 0x7, 0x2) 04:37:57 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000000)={0x9}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ioctl$EVIOCSKEYCODE(r3, 0x40084504, &(0x7f0000000040)=[0x0, 0x81]) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 342.476776] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 342.484041] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 04:37:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x8c, 0x4, 0x8, 0x401, 0x0, 0x0, {0x5, 0x0, 0xa}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x16}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_COOKIE_ECHOED={0x8, 0x3, 0x1, 0x0, 0x3e}, @CTA_TIMEOUT_SCTP_HEARTBEAT_SENT={0x8, 0x8, 0x1, 0x0, 0x96}, @CTA_TIMEOUT_SCTP_SHUTDOWN_ACK_SENT={0x8, 0x7, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_SCTP_SHUTDOWN_RECD={0x8, 0x6, 0x1, 0x0, 0xfffffc00}, @CTA_TIMEOUT_SCTP_CLOSED={0x8}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x3e}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0xffffff6e}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x80}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x88ca}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40}, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000002c0)="8da4363ac0ed02000af9fdffff01004d010000000000000000007a0000000000fff6f2a2299748aeb81e1b00b10efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) dup2(0xffffffffffffffff, r1) recvmsg$kcm(r1, &(0x7f0000000840)={&(0x7f0000000580)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000600)=""/236, 0xec}, {&(0x7f0000000700)=""/213, 0xd5}], 0x2}, 0x2160) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(r2, 0x111, 0x3, 0x1, 0x4) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x401, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r3, 0x40045402, &(0x7f00000000c0)) 04:37:57 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000640)='/dev/zero\x00', 0x400, 0x0) r2 = accept4(r1, &(0x7f0000000680)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000080)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000540)=ANY=[@ANYBLOB="997c6cf6ed4c0bb7dd87aba36b025872068e8fa5ca13e8f8ed54b4f0470f8480ca8406a3835c829471d30c1161f18182b41f73a517f6e2981b2ae13f53d51317c42366b92cddc859116c5a82af28c0da1fa605fea8eb970bcf18cb3228ab86b88b984193acb8527059f638aadd73bdc197cb3efff966cc23c8f7cd0dcd85ae73c171d82c8922b07b1f4a89ab047d4ad0e3797ba86a97c06d5fcaaf592a9cf1f3231d872fda4c281f141d6e709313f46d945930e5654414cdce5f0ff5f397a85632c0abeb5b40865cfabc58dd9d1410b7da312fe5bcf3fc58a5661ecd8655333b1259e9345677b393087307afa829737ac48a9c609f"], 0x1) [ 342.578620] input: syz1 as /devices/virtual/input/input597 [ 342.594491] net_ratelimit: 26 callbacks suppressed [ 342.594496] ip_tables: iptables: counters copy to user failed while replacing table [ 342.612895] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 04:37:57 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) setsockopt(r1, 0x2, 0x9, &(0x7f0000000080)="1846407b8a8c2ec40e907c2ff502fa7acf5ec5e2dc409419c94ae8683d2f08164f5fcbf4ad46e48a7442d962033b8c7c5ea95b2bbe0017c47dae5c6a5b06edd4737f67ffc959d6bc34c6ec4e3c46c124e7136961c9c517e9d27140acc496728386da46b8ac177a84cc618254973c274b2ca9833c8acc84bf166b181f12a7e0", 0x7f) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="b48d411fcb680cf9a3d9a785b68541436ce378629aa7b20b7fbf9c92395ce102a37416969b8a1cce96d141eb3275b3eb917f71be01d0f3ee8394d2675df1c6a9ebbdfb21bfde2abec766847a2dbf7c1259916b8503bf12743608c4b7630265a73f98ec614046a55db870ae1431dc5845944e15a65e3e"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) shutdown(r3, 0x1) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r4, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r5, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) poll(&(0x7f0000000580)=[{}, {0xffffffffffffffff, 0x450}, {0xffffffffffffffff, 0x4400}, {0xffffffffffffffff, 0x9449}, {0xffffffffffffffff, 0x40}, {r4, 0x2}, {r5, 0x4}], 0x7, 0x2) [ 342.667962] ip_tables: iptables: counters copy to user failed while replacing table [ 342.672644] ------------[ cut here ]------------ [ 342.680520] kernel BUG at fs/btrfs/volumes.c:890! 04:37:57 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x400000100002f}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00'}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0xffffffffffffff38, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000940)=ANY=[@ANYBLOB="4800000010000507000000010000000000000000", @ANYRES32=r4, @ANYBLOB="0100000000000000280012000c00010076657468"], 0x48}}, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, @private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4}) r5 = socket$inet6(0xa, 0x80003, 0x3) ioctl$sock_inet6_SIOCADDRT(r5, 0x890b, &(0x7f0000000140)={@empty, @rand_addr=' \x01\x00', @ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400003, r4}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r0, 0x5501) 04:37:57 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) setsockopt(r1, 0x2, 0x9, &(0x7f0000000080)="1846407b8a8c2ec40e907c2ff502fa7acf5ec5e2dc409419c94ae8683d2f08164f5fcbf4ad46e48a7442d962033b8c7c5ea95b2bbe0017c47dae5c6a5b06edd4737f67ffc959d6bc34c6ec4e3c46c124e7136961c9c517e9d27140acc496728386da46b8ac177a84cc618254973c274b2ca9833c8acc84bf166b181f12a7e0", 0x7f) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="b48d411fcb680cf9a3d9a785b68541436ce378629aa7b20b7fbf9c92395ce102a37416969b8a1cce96d141eb3275b3eb917f71be01d0f3ee8394d2675df1c6a9ebbdfb21bfde2abec766847a2dbf7c1259916b8503bf12743608c4b7630265a73f98ec614046a55db870ae1431dc5845944e15a65e3e"], 0x1) socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) shutdown(r3, 0x1) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r4, 0x40a85321, &(0x7f0000000140)={{0x1, 0xfc}, 'port0\x00', 0x9, 0x8, 0x0, 0x0, 0x7, 0x0, 0x2b9, 0x0, 0x1, 0x7}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r5, 0x0, 0xffffffffffffff12, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) poll(&(0x7f0000000580)=[{}, {0xffffffffffffffff, 0x450}, {0xffffffffffffffff, 0x4400}, {0xffffffffffffffff, 0x9449}, {0xffffffffffffffff, 0x40}, {r4, 0x2}, {r5, 0x4}], 0x7, 0x2) [ 342.710510] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 342.715976] Modules linked in: [ 342.719179] CPU: 1 PID: 26617 Comm: syz-executor.1 Not tainted 4.14.184-syzkaller #0 [ 342.719587] ip_tables: iptables: counters copy to user failed while replacing table [ 342.727045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 342.727051] task: ffff88808b08a580 task.stack: ffff888052c98000 [ 342.727063] RIP: 0010:__btrfs_close_devices+0x793/0xa30 [ 342.727068] RSP: 0018:ffff888052c9f748 EFLAGS: 00010246 [ 342.749351] ip_tables: iptables: counters copy to user failed while replacing table [ 342.750221] RAX: 0000000000040000 RBX: ffff888092e5b6c0 RCX: ffffc90005f34000 [ 342.750226] RDX: 0000000000040000 RSI: ffffffff828d7c53 RDI: 0000000000000282 [ 342.750231] RBP: dffffc0000000000 R08: 0000000000000001 R09: 0000000000000000 [ 342.750236] R10: 0000000000000000 R11: 0000000000000000 R12: ffff88809fb8b5c0 [ 342.750245] R13: ffff888092e5b788 R14: fffffffffffffff4 R15: ffff888092e5b6c0 [ 342.790500] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 342.797760] FS: 00007f2401f3e700(0000) GS:ffff8880aed00000(0000) knlGS:0000000000000000 [ 342.797766] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 342.797771] CR2: 0000000000d00978 CR3: 00000000948bb000 CR4: 00000000001406e0 [ 342.797779] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 342.797784] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 342.797790] Call Trace: [ 342.850686] IPv6: ADDRCONF(NETDEV_UP): veth11: link is not ready [ 342.852019] ? __mutex_unlock_slowpath+0x75/0x780 [ 342.852030] ? find_device+0x100/0x100 [ 342.852041] ? btrfs_alloc_device+0x6a0/0x6a0 [ 342.864719] input: syz1 as /devices/virtual/input/input599 [ 342.866917] btrfs_close_devices+0x24/0x140 [ 342.866928] btrfs_mount+0x1cfe/0x2838 [ 342.866939] ? pcpu_find_block_fit+0x2ed/0x380 [ 342.866949] ? pcpu_alloc+0x37d/0xf70 [ 342.893598] ? btrfs_remount+0x10c0/0x10c0 [ 342.897833] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 342.903279] ? rcu_read_lock_sched_held+0x10a/0x130 [ 342.908301] ? pcpu_alloc+0xe1/0xf70 [ 342.912016] ? __lockdep_init_map+0x100/0x560 [ 342.916511] ? __lockdep_init_map+0x100/0x560 [ 342.921001] mount_fs+0x92/0x2a0 [ 342.924362] vfs_kern_mount.part.0+0x5b/0x3c0 [ 342.928853] vfs_kern_mount+0x3c/0x60 [ 342.932650] btrfs_mount+0x2a0/0x2838 [ 342.936455] ? pcpu_find_block_fit+0x2ed/0x380 [ 342.941044] ? pcpu_alloc+0x37d/0xf70 [ 342.944838] ? btrfs_remount+0x10c0/0x10c0 [ 342.949074] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 342.954524] ? rcu_read_lock_sched_held+0x10a/0x130 [ 342.959587] ? pcpu_alloc+0xe1/0xf70 [ 342.963299] ? pcpu_find_block_fit+0x380/0x380 [ 342.967875] ? __lockdep_init_map+0x100/0x560 [ 342.972363] ? __lockdep_init_map+0x100/0x560 [ 342.976856] mount_fs+0x92/0x2a0 [ 342.980232] vfs_kern_mount.part.0+0x5b/0x3c0 [ 342.984725] do_mount+0x3c9/0x25e0 [ 342.988278] ? copy_mount_string+0x40/0x40 [ 342.992506] ? kmem_cache_alloc_trace+0x389/0x3f0 [ 342.997344] ? copy_mnt_ns+0x8a0/0x8a0 [ 343.001226] ? copy_mount_options+0x1ec/0x2e0 [ 343.005716] ? copy_mnt_ns+0x8a0/0x8a0 [ 343.009628] SyS_mount+0xa8/0x120 [ 343.013096] ? copy_mnt_ns+0x8a0/0x8a0 [ 343.017002] do_syscall_64+0x1d5/0x640 [ 343.020891] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 343.026090] RIP: 0033:0x45f57a [ 343.029272] RSP: 002b:00007f2401f3da68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 343.036976] RAX: ffffffffffffffda RBX: 000000000050a060 RCX: 000000000045f57a [ 343.044239] RDX: 00007f2401f3dae0 RSI: 00000000200001c0 RDI: 00007f2401f3db00 [ 343.051502] RBP: 000000000078bf00 R08: 00007f2401f3db40 R09: 00007f2401f3dae0 [ 343.058774] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000003 [ 343.066035] R13: 0000000000000c27 R14: 00000000004ce726 R15: 00007f2401f3e6d4 [ 343.073300] Code: c1 ea 03 0f b6 04 02 84 c0 74 08 3c 03 0f 8e 46 02 00 00 48 8b 04 24 c7 80 10 01 00 00 00 00 00 00 e9 2b f9 ff ff e8 8d 29 cd fe <0f> 0b e8 86 29 cd fe 0f 0b 48 89 cf e8 0c 63 f6 fe e9 f5 f8 ff [ 343.092521] RIP: __btrfs_close_devices+0x793/0xa30 RSP: ffff888052c9f748 [ 343.129002] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 343.164095] ip_tables: iptables: counters copy to user failed while replacing table [ 343.174862] input: syz1 as /devices/virtual/input/input600 [ 343.198126] ---[ end trace 71a6916d1a12670f ]--- [ 343.205233] Kernel panic - not syncing: Fatal exception [ 343.211579] Kernel Offset: disabled [ 343.215193] Rebooting in 86400 seconds..