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", 0x1000}, {&(0x7f0000000500)="daa5205c82b0c14a74cbaf027a054b527ffea46cb16045c750aa10b47027c0a3895880f25d1f6ddcbf050f9976f7e16a0a513261db10a13836d3cebdaa91153e38342bea8fab4bfb1f0f75a9b36f93821912830b7348f4a7a39a855f9a0b064d82c47c8d82320df236", 0x69}, {&(0x7f0000000580)="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", 0xfe}, {&(0x7f0000000680)="ced53a047afa3393eeb82fc4c8e340ed7113486728b7655c6f6b638cb4489f302dec93d6176355d8bd88e9a04f7d2efcc45eed5cf743a5e9acf9e4436499dc635602b785c30ad66e01b1d6a082f911608c189843072171042722421fcf2b94573f5646c4c5e809cdb8db7fe9e922c4e70f36c4e9ce9a54ebabef43f713b1f51c415fe80742e9f2c77adc053c", 0x8c}], 0x8, &(0x7f00000007c0)={0xd0, 0x10d, 0xffffffff, "83fd35cb7b5857fea333200303ba3ef813cd205e01c3424564c6b5076e1e8c33300df7ffdf49a8490786f18c96602da0cf7c0e34d8babc3f700ed55da66ee57f3d160ac97a66fee5af44a80ee4f7710606aeeb0a796014eda9add8b68ba27d0bc9b8386b310e2de3331283e5145414b502d72a1b264c715f93846c575301cb7835d3615938cfdb1e9999899376fda8a2375a71f331456c25c70202f20023b8a7f815f9309d90477700df02b6edde549c7fc9c433e869a4857c02508d097bf3"}, 0xd0, 0x20000080}, {&(0x7f00000019c0)={0x27, 0x0, 0x0, 0x7, 0x0, 0xde5, "d297847aebf662aceb566907a856bd71de8aeb7315734e632ae9f3687563e10daec2c6b42f4b4f3dc72db8aa892886ca46f370c37857d996f20e3413b22886", 0x34}, 0x60, &(0x7f0000001a40)=[{&(0x7f00000001c0)="eb5c65f7f089e740a2a5562451934b22123311a89c16fcccb1b549bf749f413bf9746731cf12eb52c3fdabbab3f92dd9ab9a07b5559c5b09b2c6267aa9", 0x3d}], 0x1, &(0x7f0000001a80)={0x98, 0x88, 0x3f, "414ce7dd89eb7ca706c5d7334e5cfff3908c94e6d926e047f2b6404eaf4795ab1f97d5b756646e559d4349f8a1fbdde4269721c0deea41bc0c01c5b68d3494120353351b1229c85001bda4a8ff7635e47cc1abb8b0af846e89559f60bd7a241de465fb896d0508ecf1cbfeb269ed498510e4897bf9e7d8278f8c695428163d6e27"}, 0x98, 0x4}, {&(0x7f0000001b40)={0x27, 0x1, 0x1, 0x0, 0x7ff, 0x400, "6e0cf3c110e9e06e4b902ffd3d7b53d7c38014d21c22e8ec6f03d86afa277c845cb55932079ec5e0f7ccd033691f322a8e3855d635ec66db4e525f9529b3bf", 0x28}, 0x60, &(0x7f0000001c40)=[{&(0x7f0000001bc0)="c6b7e9b2c7c74d37ac5e49fbb963101021e4b3add98c420f65b007061087950b5fe16eecb65998205562c305474223b9a661760cd2fde3ef5badf19cef9358567aa3919edc65416fe8b5b230f3a67ab16886a4a2eb", 0x55}], 0x1, &(0x7f0000001c80)={0x30, 0x116, 0x4, "a866170938f33d45ef9d731c382c6cce88e5473ae08b1108bc"}, 0x30}, {&(0x7f0000001cc0)={0x27, 0x0, 0x0, 0x1, 0x4, 0x8, "1876b8d6036a332bcd2b4c7c815970d4b81b3602308944867669d668ae1632663c3babed23bfe3d5442e63d90a4bd8c9b6a07bc631f93f3d8258dd56fd416d", 0x34}, 0x60, &(0x7f0000002f80)=[{&(0x7f0000001d40)="286fb21e61db5e5b37be81b74348dd6e9554772bbe4c99ce7389111914c47503fd46255620909c53897666b6cecd1e9180a4d5fb60ead5e57e38d0728b9d6249545517789f745ca091ed512a3a6284320238d86bcb31fdffd90214f3d80365d6154e0df658568c7c03874256550234568bcbb511dc769e0a4e8cfd5940d8e22f23edfaff7db430d43b", 0x89}, {&(0x7f0000001e00)="925af54ef4932370e44cb475a76a942c5f5e157a2d13066b58fb737eb423808ff32c32f1435e975234967d7c5692c2925006e1cb896a6cd3af24787d8d919ec73ed07f829794833825bad8dbaa2f007a6af22a81205ec6b7d4c5904b4ee03908f329935f627850e0b5a86c7a789ae789c3933c67d2f72846d16f8d016e42d545f77a3acb3039f4e5ebbf856b9d6ca7e111b7", 0x92}, {&(0x7f0000001ec0)="7a78727fb3d995f2875945e5ef1704710939e7660a700b9e19a663f44a21f65500b9a81783d3c15582113b6db319e6a509af4a803d3a3d985ebe84935a94aec03a8dafa0b897d84d2c61a91d8cc2e3cfb3c4136a2415bcf04993981d0d", 0x5d}, {&(0x7f0000001f40)="5218edbe3abf99c4b19c0e7a248b8f09b02f09642ebc36e4c31f84f173", 0x1d}, {&(0x7f0000001f80)="4d2b43c5460fbabde98e4ed3c1d4224c2bf6f5c606ec0f6e477bd70a96bed1cda99f063bea48ae70fc0c73fad7ab83b60281c1467a5e5d7656a2b870a5e888ba8bd1c927c32ef513d69bce0350396561ab70cf74122b0484482846a30eb69b9246574819e8055d402e07c8d36c5cc8e963ea40bc8a46916ba26ea37043f6bc25a00eac0022c1b6f5e2f21d4ae71fbd3e8fe0b4ad2ba1fc54d65d9e7349c9224f49d3f088e1d0a105de5629bcd1a01f37c3aa99aaaf9eed805d0b63915e3c425657281025de9871fb1a1501cd70c9290338654bfb39860a625e46756e938fc02af409e5a307789e3256ff62653c9f6c8bf34d79d8931f3ed2952428abdd6de0e52128ce7ec1ce4e2436ed5ae675a6cb1addb8f775c345e8bcd1dd66513898ea7059214f4c5382f097b09ed1d93eed499c83ba7c7dd9f5973a6d554c4cdc07ce71b102fe76774e9ae7eee8341365f3dc1bdefbb615dc38d560a803fb2d19cb67786717c9cae790df2705d71b73d600f9fa2a998cdf97655bef03c057cfb537e53355369a653407d3220a6aac73efc68d50a8d93367d9fd6be5f65c5d107569401c0447b57a3e77efdd8ddf50c707a82b9a9f2a8998f45c493cec6819bcf93873165f097c0837b10d3056a202ddcc2a6d7b4a3c14d0ab4936dea2fb27b9dc9826a47baae5ffd5cf7992bba42b65859700ca63dc70f0141317b8d8baf3ac8732f56c459c65fdab5475c0e3d092dbc5c312ea956ba80cb9fe66ace2ba81b57a246705a88c59af0c9c93151e7afaf2141c679d356d8c73621073392a48bcdfc5250b9bb57178b63c73ba49d77cd071d86c117ea1bb672c33ae335e0772d9a8dc47f72a4721c0fc2596f5bfeff6d6bd023b18936f5ddecfb7f6ff27a3dce1b231a8cea39a30d4762845d558fc76ba2e7a39eee8b4177d15c4927d29c5c2da515b788119227200f695cf114281c45fae49dacaeb8cd3bbc8a543fb3706d3835f7da33a72f1e844719d529c7743b53c8618c222d601a0c6064ec91daf9efa1246d4884f0d89f73c3691613f18d1bf460fd99ad6b685305811a0d2234fef5a18742ea7e64a9d536451c0b518f60f0276c44da669b817de46149b99d5d2cb4761f11808196a13a59086a42bfa80c2e488f17ea427a06bf488933617fef15b94e88d82d4465ca71b1194ec0043c9388daef87f32b1ffe92e490cd67b454f6eff27addfb85132a6703a28fb82d2694b62584f4fa862d5e33e9784420e52c79c56480f56ecac72b5bea93152a88eafc675b620a07b44515e16aeae6bc07f43ae48c3963648aa9feab38ef4645f7a6c11fad5404438945f14d988dd2f6b2fba467df2787ab1533103569ea259846a010f2147595f779d640b7dc8dbd6f9419f379b84f1befef5780d9c06fb0e21eb271a4b6d020c62d9f8e6bd5f1634fd4735752fd0bc7819b6dbfd3aaa97888fb0b12e3f221f1d5a41867526ec58ad09f2055e29be70fdc0bdc9c293e67ec5a9c92c74ce252d1b858364a627753bd0db0a9c7ce99d6489a549a34a51f45e62afa9ba9686f96e24839eaa38170b25a703b91c842b3a362a749ef69c4e2cf5604b3b291f00dbed71f2a3e69d4f7cf327622eb524cc17d273b7ae0b623ceea320d523714196495c2bbe8ae2e041320c42c5e1b8f882547b46ab16f9c2d7cceb21260956bf7fba9b0347c74b5a52e0c2a297bd82deeaa3b2883c62db81d5d6ad73252a1eb01c3bf4b49244c28fe125569958ac0eddf0d478022d1b3795dff4f020ac523d16f2cafe2bace6a98f8ab1cb8d8c4ab1eaf59dc97a8d7bfc6be7b4f4e54640c8fad5de1997420543afb9024fda84c6b685b19ea0c257cc336eb99789ab4a8136ba9bafd7321f97bf6a889a3547e25968268714f9b66b930d5ce35e079d10f3db5cc3f977ff605cced3a363943086ff9914aefa28150bcd3bfe9c69ccdbbffac81efaf087dd932db5d5e363c88e361e077081f1f4f58b5cb68c2dd5201e21e3f099acbe96779a571a00ead025bb1ec77e052a24cb30721a32fef2d61e0c858f1a46a67ad4adf7abff280ce3a36667757756e62c9a5455796ebb947adb44750109e43639f35beb11451a185918bcc6ecc774f82b91e06105fa80381378fe27077283931174f3467f794d448e60b09fef0086d9890046d54bd15d1e7f162a08f85cacc036e1020eed8fd5f3c4e36014008646ec4d58cbea74089a4d5b5bd44585d5d8cc0bfe1860bcd8b137946e83eceab8d13e8d6dd52797a45c7083a956330a73b49489215b8f6479cbbbf99304e445680b2c7f7290b53c5a097d3bec23e1372dd936cd188357914362eaf517d6cdc459f1dc6aee489a5cef49bc622871586392d596af0d7a79ef03de0269a6fb28be5fda3711483cc03ea26cf44932d565d85d05ff99484ecf1d534909187d22c6a1134680dca4494cee474e550144efa290957832d49d8cf73c16bd3787a23d722b26d5fc09adaa09f6738209bb79eedf382e5ebd55574f6b43e53cb345553ddfe0fff4d80f57200a4041511a2faf86baf6ae7f41758c470e20a5233de022aee78ad7464f72be1e64ea6e65aba138088b33b1a281e002eb10ac03e9bfa3f4b3805363c6ac440d2b339852b8a527b51ad52a01ab9b3cb819bbd1272f0e3b1136a1e5f469515e03afd68bcf617fafdfd944ac403de94616b596f9eb130ccd1570ea97bcdf77d7906f508a00fcfa74a06257037ef4a1b39d0ee05ac677e4f1a90bcbc18919ea8f65790d874be63d0906b6ef041a23d4ae10a9988e1146cf8879b9d4feec0c0027ae541c0b1befb3d6f33d1c8ebf0e3608b9387602c32ab11d8f7b0da901176926ca28e8aec8449358a6c42063c4d2949280480223f65e522e7698b65e3d58828986ca6a9d41d712d151dacdfa26a66eacbd4fcb0a694d34be9517fc324d95acdbc9e1c17cdc399e182498aff16e0d8042ceaa30aa0486bec45dfff452a8a9ce12c163f00a2d3cfd38a21bbbf3d7f7d7213854aaade6964605d8550ad6b1db349c838d648d2e45af2466192ffd91b59f3360129c6660c2266210f3dacbf22c8b4112002a9e93386e68a15bf6c07088ea76eff12c283c379168f78d4c10d5bc820e88c5a684b737fb8e48dd163e751da30beaf4dd875206e0d10eeafc580f47a2463fc6e5f2978f81bbac5bf002d723d918ab06e55f6d05e5caacc10175809b7925515494664b808cda8fe8dea07f97c677a14418ec8dcbad3a54cf82803efce4dcce4086a58feaa78503db7014643cf2cbd755e7bde74bef8ff3177be040a78313f6093d1358be4e79ad37a892aa7f694a67c11dd73913c1405697c3d5c76a172eedd7a0a42c0d4238b23d3723b066fe25622da7d546e081527682fcbbe7af062f414394ecfe00c5f58c924bb856f250c0e491ae0ab06c26d2d24da30644e1275e51c5fc0acb0c635e6b9b278b6d740d8e2c23ad2d8853dc631c22af59861dcdf8a122897fe0e15f4683cdb84ebb71f93a284496cdb4c5730cc4eac20ba8c67ca6bbc180ade8d1b6bfaa53973c96f98db9fbd5bfd005a35c972c96f2ace14ffa6a88fb91e65b6779862d04c5806a214f163331af5bde307136e65aa967b96a272bf0aecb64d3cbd4b4f043d39ca412abf48567cf98ec5f73213ed8da5d206464a11ff36102ad9b21e3cc10a63bee76b03d4b6d0c013d09dcdef4bbe1a9a914a634725070e61ccd6c680477fb88a85bfd9876f0fb97037f3cb8d0699c757c33ef85f0cdcae8ac59b2d32d437c2262565cc47e0d4dfe3a33bf5b0d88c4994d03ce1aa1a50e8a444e854b6a823f1214c523f608826f019089d0c15e60edcf343c86cff11c2ddb6a858b7f7fd71586505e3f064c4cd06f1626e7379c8da46929ef0d7cc88dd1c51363e9d925f4e854c047f9dcb95727e16f0e34c7b3841e8969223aa0ba25745309740cfef322576335ccc5e95bb524cd1dedd0701479149a3dec30d8dbd9b66693d9beba14fc991e855c761120ce351d6bb39ce39eed9ce3e44658eaba6b5967276e1b1f7c2edab181fa7c0fa70552cf079365cea4ce8526d7679c0192e0d35882cae46bc6d25b6041708b47788b3cfdb1ca07c03787f839848c38ccd9fc968b82ab043f94417d00b16efec6dad78ab2349ce9a6eba823bccae56a52cebc20a6bd89ad6c92b51a6f18b74d35dcbf7d479e068fdbe32d57067d2bf311cda8269c0ed2c283fe96839e363362e9fc98f274bbecd801017b93fd35578e8049e138cf70db1c73cae846fb5b7ab0f20e769882323a36bc26c9fa2c35e8a54aa2b662f2edd36d9f62db0f8cfd76b067c36853fda6e6d82820a27bdd8103c5670ce53404af7c34543eccc7d00b3626581d72a76a2b06e683a4d60741e4010331d3a07b1def21734736352932dc720054c07a3b5f0b830547b66fdbbc017b64050b38ebae37801a93d2694fef47267ecf33413cb188f301cac66f3a14cb689c7cf643ef0fc8867ef8040a249c4c2f81be33a89482ebf6cc43186f9e9d64150f1eb93cd9384d557fb6b692e412337a23b6bfdabe5eaf9967a127735fc483beebc0864ca599150a6e9453deb600617bc36902c940291b4a8b92ec9b0bffd225b852b7c6819fce6dc005447d9ef554921c0c8d97e072022f3629fc8f8193fe299452971c01dcd1b785a03e66db0ff259deadcd12b7f27cbd95cb0050ab44c88445a184f143be83326558ff3628cc3cc00911b3dc544a2b97b4d0e1e235f1c019b3eee6ee38bbce15df0b778c2bc789dddebd89fa81eb2c24e827cc55bf93541712bb7a35cd45d41781f8690dd31189c665c0ba2f06089b07f12e0ce7038cdb77ff59a9e9a8cf8b47ae15c65f8dc071417abc4a2b615ac365691de5a0ee08e3a51a3b298d10bcf106154972f2211f98e125b6230c0be1ccb32323843cb8bb7acf7cb5969332402894052e7482d4a0350f06634bc34957641ccaa51b4c183a8d99479d669854c2d5208a20d46a9bbc6dd0ec93294279b53bb714abae683a68dbbee4eac9ad3d9dfbaf9cc9de17fe994b4b5f701115649fe2609368ce966c593be66bab56f3aec5c53f41946283efe1782a6e413a7666feaa5b3466d493335e24ca4053f3ebabc526480b7eb928dd916b710bc2657e716af504d106d571b960af2e288173ebed6fbf99c44b02dce2bd09047ed523ce32742bad3fa29be5eb54144e2e72a5ee34b585cf5c30fad4b80fc302d01ccc5154d4d671ca53eccea172c275724d5dc649517c37aca0530fd2ca7ae4f9dab664ed1b40f64dccb94eaf229bfde630ef0eba4362e646f68dd32c00e2f89faff7d344bb342a5ecb9dae979f09d18bfca73bd312dde214ceb040e8646a0e587b45fb1b3fb8a163a28f720800d27cefa6d0037ac70bbb6dca3e927a6de3fe75a4c5880bec376351c43d3ddc8258360be6bdb7af79a951f5e7478496cdd4ff4f6d75961dca1051d12d2f6d82c107317c2508bc16346c6b6079e4728888f041d7ceead45daef55d71070e3abcdbbb00c3a3de665a42217ba5106cb181acb98edcf5932ade6a2c5465c49bad20aa424fa603c6668cb5a791053fd8c4b227141e60e14ffa395f4c39a03d1330c6782876f1b60b040c23e9b57d41df17962a50a032fb48dfb27575655e78f613a227e18c9f741084aac132c2efb6da8c5f38e901bda15ff517564a541453dd915f0878e15249989fa3d002e240252b2b6f09e0838ed628099697774700fa6f9e48cc09844a810855b70c45ceebd595b192a0e2f73312b2dbe4467a2fdff106f64df43d5fb40c37f8c93481", 0x1000}], 0x5, &(0x7f0000003000)={0x28, 0x10f, 0x9, "335fbf23671c9cb606ca59f2eb9b72a698"}, 0x28, 0x40000}, {&(0x7f0000003040)={0x27, 0x1, 0x1, 0x7, 0x6, 0x81, "3da3b4e374a6d80abc92243933e941f0a3a96ee9c7488a8e99d5b190e17a2c653711dbf7d9d20c22d7f2557154ccfbc05fa758b85966f0c132e9343856347c", 0x33}, 0x60, &(0x7f00000030c0), 0x0, &(0x7f0000003100)={0x20, 0x10a, 0x0, "39b06054d8d1ab2c6062c24243f8d5"}, 0x20, 0x4000000}], 0x5, 0x20000000) 12:56:01 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:01 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8001}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 12:56:01 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) recvfrom$inet(r0, &(0x7f0000000100)=""/48, 0x30, 0x12002, 0x0, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000280)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r4, 0x0, 0x70bd2b, 0x25dfdbfd, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000001}, 0x1) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x0, 0x2) 12:56:01 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:01 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 178.669759] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 178.686708] BTRFS error (device loop1): superblock checksum mismatch 12:56:01 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:01 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:01 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 178.760819] BTRFS error (device loop1): open_ctree failed 12:56:01 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xffffffff, 0x20840) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f00000000c0)={0x2, 0xffffffffffff0000}, 0x2) alarm(0x400) 12:56:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f00000021c0)='./file0\x00', 0x0, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(r2, &(0x7f0000001840)=[{{&(0x7f0000000080)=@nl=@kern={0x10, 0x0, 0x0, 0x80000100}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000100)="511ebd9f439207222b5ddf4081c47d7b0c8df4086ec7f77f04f85bbf7cc7632eacc5a6e7bab4736b468cee6be7557eeb41d5a3fb9fbe18ed2364cc22fb88b17ba406d9da7677f0fd81fc218f0344ef9b99b71f0705363e24864a4d614c1a4492f785540e1af69b0ceab2a0e6ba5d61767e5523a40fd27b9e7b7a76b7dea406404737eaa874dfc6fdd9bcae60ea0d4fe958352e5ce60ce801d84c8a36db827917cb94cc3773cea580a64ace90393d34c26c6d4335a8a8949687f8", 0xba}, {&(0x7f00000001c0)="bfedacd17d444cf39bf437a23ac9e0fbeaf0a0ca9f74fc294ece7fc859cc9f885020ae58e0b273812561631a3240cf22d8d88ac928be698a228ae6", 0x3b}, {&(0x7f0000000200)="5913fab071d51a57166556e3308fc8d37c4735170b053a467ac8791f2248b36111a0e8645434d67f398ef08f32bd49787c7da9b4c0ecccb9bc444f6a5e37e042f5e4c30837b22fbab0db993dd4d71e30864046888414cf707212432ff6f38d8d4813db1326a67d750b35471642e1e429f375de879f901af256c163ddc581ce673bd7a175d0cce2", 0x87}, {&(0x7f0000000440)="a6d7ddd3eba7ab311d44795c642552a5076f51a74d4e61d5bd0c5442b0911dd0bc4edb08b5195399704339182ac4cdfec45fdfd1bf513c661689a2bccb6aa0d068f5f9ba581552186bd9d0a654ab7812e35e86225c7345c6e8f6679109d4be111e46655b80ba131748e6deb5149af69b7c38713cd9b61c8388882902f1fe6bac5de6424acb0ebc3c5715e590f25a8e6f3570bbb682284f070d731cec22996eee9df7bf020741c6db436e2bdfd38d4bd950980e2bf66d0c7b8b021390543cb901cc23eb70b68ae38cffe003aad6a7bb0983c7ab61c241a4185100d9a2d26eb4041a655a53d2cd0e0d915720b49b85e3d32cc61a3a", 0xf4}, {&(0x7f0000000540)="bbd80d34653701ac0b35cf24516f3a4e91568db7a56fdd20500d93fb429f0da233e299e97f353f9cca9604f14dc8dc51a5c559a60b62b896530ee1d4255616656ddd023bbe6d39dfc39ad1499172a50b9ac78c08f7df707a734b0771733010f3f71eac200891fd2057d8e13843d1bd5d5215d24f9dbf65bacafa201fb2e5b695959160b172814b0dc540fcdfbc0b6af059b84bf4974526a61341f36e3bd78d4a7c2a03e662d4", 0xa6}, {&(0x7f00000002c0)="636d12f67f63233af7ae3dbc611fc3bcbd1dc019cea7ca16fbf1c70b92460f703ab4b3416cc68fe55315", 0x2a}], 0x6, &(0x7f0000000300)}}, {{&(0x7f0000000b80)=@ax25={{0x3, @default, 0x1}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000c00)="362d243cae0eb4e36ef771e68bf633d514d4625e8463b2b9214f7098fa011ef446fc7593070494651f129a8d3fe75f20b9ba8de26b1a72254ee8bb67adb8f0a852dffa8cf77eda11f02db9ebff", 0x4d}], 0x1, &(0x7f0000000c80)=[{0xa0, 0x105, 0x6, "44f57d9356b1c4fa43a15f5318f8ae7dad109759ea797164204a28da5c1adb41103b9709852ee3a227c72989859133921b5f6915ff2fdd367718d528d4cb394f05d9cb78dc374f4ad22420ce9e0d48d007e35b07c002e6f60f093aaec7502aa6b655fbaa3b0e4c513189ea906e69c4290c315f3f46901f31e203227840d3e1be13fcdaa7dba688e18ba8ac"}, {0x50, 0x103, 0x0, "ba6a24c2cefc491bb44cf4f32201a878905b4382a86ad99c8446964e4c4928ae583bd424e43fb6507bbfb1659cc65e847eaf646c718a7bd0bf34"}, {0x78, 0x19c, 0x2, "03bd8e77f11ff29d38158f1b293d8239442e5b173e9fe8950a7f26a4ac6c4554dfca4ce91e8184d9a09ba9644119a5848b005ef50563512ae3ca585ecf3012c5b1c252473fd43ac73dc8c899c172b4466a7a6abd0f24aa25173fc4caae392cb876"}], 0x168}}, {{&(0x7f0000000e00)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x4, 0x3, 0x4, 0x3, {0xa, 0x4e21, 0x7, @mcast1, 0x5}}}, 0x80, &(0x7f0000001440)=[{&(0x7f0000000e80)="6276033b382ea42913c22d612bc7173ede80fdfeac4aea2b0323d55ef669775073ae4c2927b34d21888768fcf7e9e3036362145de3e0ceab18310ad3d7663076f8d985d5e7c5bbbfb0949eea3cc0bf3d448b08aa487215f8f1e5fd0d5d1a91bba32da858a493efe91920b2f74260a488c31ebf780d04b482c49d6efacd2c552d90a8bb3a019c2d16f1d9ac796ce5f26dfceea9f4cc5dd1d0a9f36394aebae08f670fd0d471bd38a3772ae83db9804576fc4c2b02bf9f5a45c319ca4527715ad96279af9c", 0xc4}, {&(0x7f0000000f80)="4e542060dda0b8a5ca8b57dd07e717a9a8c524375163511093437429f6e5a5a49a951ca74ac976759caa9b6a3aaa1059b345f785abefc2c6f22fedd6cc58959da46af1d7c9ba18545d5c6cfb321fdb566c539c", 0x53}, {&(0x7f0000001000)="bee376a7f4802cdbe2c203012bf7a098456f501bec8b84787286724257267645c7f0c65e6a231644d9f0d7e6c6f85bfe7d1d8571a314932239f745a9400208af65cdf09d84d298ca7954191b6a25d1ef1c2d8e954a094ee1861f97960aadaa808c781105dbdbf93377287750c1e689ae1920494f925033ca5de0b0bf5cb349fdb37b40b94517584c0832f6b5e8a9b30f6e6c462c2e", 0x95}, {&(0x7f00000010c0)="2022a51402a5b8fdee2d98f9269a68dab4b17aa7c7d759bd19914d779a8e3eb713bfd588984ebcf5de588e6096d704ac9383eefda5ee833b82d3946de410d25a27bf491f201c0640cfdac7c68d66c3997a40", 0x52}, {&(0x7f0000001140)="b9d8f22f9700ba6cb69e65190852ead56c4286c93cfe8274abc0fccd148225caefa9a26e16577c1d6b38f20c271af0fcabe2d13f727764a5d2a09a8b572adff4986b90286084b3b15154939d1b075394a5cf9e1f4180fb75de4cc1c7630a07d7a22ed0c7a4ac709a837ee3b5a4573cf0c91c3a666ca03de27430022fa8a81fff07a493648fdc731a38beda012341a95b94bdf0df901922d46838f8861d90455e47f00abdf1c0ccc2f05fca620123dbb2f607cda1290f74d48713e8410a3bc5c7f9e819a177f1b6b99fa76d8f36761715c2a486134622f532d490dae529b0af3411bba1e84c547d0a8aa4627d642de260399d3d1b123b", 0xf6}, {&(0x7f0000002200)="819093ca3773075ed6868645d713f28f2662f3c00486443ce14a4d09f97a69099f20b9685c724bb30cfb2c94c856607c92d7a676d9a75c1b53fbb20259cca51351dd96a7bd379847745947dc1c13cfe07db1f43f9d21659f882d561a8f72897daaea304286f82a5e60e8f37d9eecf7a7fe281833b6a74e9638ecb33e4ca0f0c75f61a5b8a58334916161aab6888cc867eca388a2eaff46754d6c832bee4796307c98cad80908a1b6933a0d6502bc36688a72f0cbc6d14766f656d7ad8e449e5abbd81f7b1c8e0184e623fb30bf5a7d23699908d9a0467271797491b27dcc91b3d21f96068737fe9f71bea65c96b446659feeba96e90d627e0f6e1d28069a9462d7ad947319158c13490baa623e6912930aa2b238df3919c05bc5b41e3ffdae5a69da146e67cc5d9ef9fadb9a809409a7c1b3df8ef0f5c007a8eb53baf45e2e6428255b94737e96df56d5cf476f3ddd776e789ce0c7de539e8743330fa3aa7a9379f7f161b994db3d91b7c557d5fc2828e2c3f2822d5c656de42925f2ff1297b7a4cc3c9a598196f839a7020bba690c28b96b89c0a8a22f1763a0d4221b2d5f690178fbb381de98b20675cd08de9f99eac41ab4d12b9ead7155b27c8d61779a832a52d5fad29e747537bdfa831e29c81d3d707d77b70d571dbf4c909c6ea2cfae259841b0f99f4e1705dd046d2697054f8dd342d7b0e3ccbc90504fc07e6b1c7e5e250b4bdb47545288cd5fddf5c88bf42d39aeb74fcc0c93e1ea35bad613f0257c4caceefea63201d9fd3ca5d4f89d56c7f9118a857d8e01240d41fd8fb2689982a7dc903e25077ba99038a837fee9d3c6a58a8877d3b8331d72e80aebadf65f080143d354ce3c29250d880a239539a0f56db8f6e7fdd0bd87dfc0bed23e05c8499b2b4ff5780f716811beed485f8e298f4a421642b59ce9f3eba95bd75f7c5d06501347f741e9a370aa7cf136eb0ddc1af6b798d5e77d20df5c8f5c7a671c43d4f45d3aca56fc0d5a492f1a79581f99ab42868ca22135ac62eafc46230ef0277fe32823fbec9fb87f690318293609bc51ae3a2bb040159b848908f2b4bcc881e858ac4cdf51995ff69db5517cb5d3a7f04ef1d21d23ae4ba8607aee22942346cc4db5cb465050f2b6dd1bf515533659be84264d357118ac766bafb97266ab6f765d0099c2841dffc0cb69d8b1d51708873d3dc69da0a316eac6b93f43cc61c0805a19a49e03e7013ec8d42774fd400101ba3a220d6d8e98eed92bc708d1f0a37b09db20c2449bcab863794152dbe6c77b282a1b44b580b85dbccbb24c77c4b74feadfb595d895f3bfc2331899b5d7ebd6a330da254adf71e6a4b91f9bb07f86d40c57702db0250fd8a5b46459a38fff06c7778a972fc4e1377f3b2f2d1010c365e7dddf0d38196e5364f5b6b02f37aa9309a3d1c52a030259538b1f45889f0b344c62bc0948f21b105191e7924da78c9c9c2ad8ea8cc3ef12732a16c81738fef9c649c4709299e509a3e39817eab261b74ac56dd99d6d103f47798997e4015cf200351fec83881d8a7bd9d65177b63943b835b07d8f40ad4f0f8be843ce54752e9289180df2f32ce349a4af08cfc08efa2f126871aa96c9ec7482ab3a6423bc4daea938c93f6f68952b7f00c0a528b89c8d94619e5046c0d7f96008f3bb74686e58b968414b312949966403b1354a8a5cd97356894d0bb365a7cd1ec58f14dfec197684a96274047e6fafdcb5d45174f38c023f6efe6dacee986386a35f6bd99b32166d02a7a12cf3f56d848fbc39a00ea7fd1f94a9210d5afdc0cd162d8d3dfaa6519a12afce74acd545c10b5365b902ebe437a48669d278a0ae0c4eaf907c81f9d7f52fe79a1e38428ea36fe8b0e3407f52ebe5a53ffbcf05ea07a707123244e06dc0597856ec79435fa3bfa1a0530b2d2be55f011f0da6936e8d9219f99e91f004140216ef374b0560079d177545c41f65a63bbb3d9b8c5e37c7432b168ddbaffa58b8c29d4da6076997ff71bee24174fbdea9e2ece5d345e5f1666b159e169c2757e5bc50068b41d112de0bc3fca5ab1e5709e5621bf003d5a8d012f6cae5757e1159704e4a7b3ace411b0690159a263c84f238fb63deaa37b7aea578cd7ecfadc5830ac8251067d9b6618926e701c64e5a22825fffe9bea7bafb5373888aed5d92f72a9de1d08d155a82ee1863e02a8176e5f220b51866f5e0728ad939c55a5b12e7c99541772c0508afdeae9743f9836e24f3c9d19d7371bcb480ac15cb1e5e5f24ff13935fc5bb9a36deb1a53ce8b133eb5d7aaf400462a52c5fadd49f6dea352e511d305f387a00db3aa5963abcc8efa1c50601aa751c291fd5156e0b0de3d539d4a1463f70f74fb2f68ccdd8a01cd3f526d2dc942090017b01ceb0e27694e76232ff7660ac1c36691ca459574b4da4e72569a016162915e03381f18f2ec42b49fc11466594b2dd7790a1f0f9f7deefbcf0393bbefde609a63fc2dec4435f06c361a0918e5dabf75dd65d155a12304b16cacaa01f7170cd71d6f1943fbb2f8fa654aca9954dc259ef45ddd062fe43e6e003dd03889eabdbea97ce057d57af2ad959f79e24c843aab5c3fecdc6c899ca10557684d9dab3a9671bb74ac959668615c620bcc70bf80078ee20babdc93df309460d6e901f93d1c8c41cac4b8d82c4e2bad1278585c66ef89119b0bf84a58ebc972395d10e44c9af6cb6278f11b1f8d73ce33e4439198c12cfb856ee5ef9c97b78d0704c29779f56c428d1ad4561764c4c134b1ff4c350a31b54d9de0e5cf3e9813fa60acf3aaf4f62bb36495b604fbbd65cb4a5761ec72d56794511f4d5ffe787989ea49c5cf6088d1e7c9ff44f96b1593de0422895e57b64210453bf2208e8b04674d7744f1163737573b2816a150766d055e2f1834fd835d2973f5d123874086f9cac6af6926be610c246e00f9d572f4e583d56dfc7e17bad682cb9dba163d4bdd5495b7ff24f2e907d9c738d1dd4d87b86ebb39014328d02b91117b4890975c5097b6fc5f353ec76aba71a5b351da727defba57a16c0e027fdd7cd0368b7026fea8e7b6638f8d2cadf0a1b968d5752d89bc2d616f4a75e04fa201380d6eca00e81b2b5f5ce0cbee584754cbe1dc88f0b2f3607c3ae7d086964b95f794dd3c7fc53508299efb051f0f347c8438b4506b29fdf84cf16e9f5f8f5f2124b0115c1d8072ac1a03d9c43c58453f4c90fd488ced70e9ceb0eed955bf61dbcc845bc8335d200d32a10e64915037ae7a7843ae826a721f3aab82e07ccccbeff25513a7106e76c0c0764825a2761c603895b35864fd4315f486d230cd60aba24cfcc8d916a0c5624608506a45971ac8bc09f0203654b33f452ddc9ad43eb8fcdbfa4e79e799bf75b8102ea2421417440a65addb61e5b573dc8b53931bcd9a9eb003c39faaaaf7ca78164ad8ee5a55486f8ddc2aea193b2d1251bfcf7a091a8a3e6a6e2cdd6b275757f7d105fa9cd54869a959c0c5dd58daab66ebc2c78a24db340c863d6fd9b4fc9d98b729ab5b5f23c245b07a4ee81d916f09180ca01af78ec57ff22699c83ad244d7f83a01c8807a30a223df9001c40444db20d559ab3e34cbe4487a5f91a00863b42d21667083c7f321592cfce55c6c324cd2c3b23f311d7db90067a8f30765ca2fa1ae93e15281e4ee0279626ac5e8bd334bbfb9f38559c0370e3ce24f4718d5651fb418975ff09ba8125ca71ad35eb09dbe927a8ac30cf94a84f49783cc08206b5513e20f56cf9e2c60ab8f45b8c7baa5938bdbc619f86791b634d52cbc64ed0349b4af402bab988586b8753e8065b6f62df5af6125e30285bb17f83ebef32c475498c743c0535c1ba7f5e53c166068ab20a1218bae5080fa30b6216d844529e0a5a33d71fbca9e85d6f8ab4f941c9e0996c9a978c82f6a4db5e778f7cfc3f4fe8644ba90bcb0e79ae51fb045e59c318f5de879a3c9b8779f6c34c7ab3d236125a70f2d90f00a26a87d393d52f21c434b94b3b7b2068b5cd05dc8e231fd760b3d51e1c2e6bbc55622197b8196eb546728cef13df3028732063a2009e516efec96f778080f32d1fabd8f9b1a633905d9b43e65638a732c84f77045b9c71805ffcf025ff2b2394d754cf9076f19a306a3b35bd1d0bdef4924b1c37119f616793e02db45f1e826528e2aea1b222842a0ebbf3417155ae26898515e9d594aa0c66e1750739cba39d1ed02a5f17cbb7e0420f8d228d77040ac4d9a859f9f94b1de70975d62c548dfa8c63ed5a29be6d160c08d83c170c800bbde521581a3a31a0c22d8d27523fec137bd36689ff0b414e225b4be004dd51afb1b55c7c27ae7ad3d94029548855eec3361d16032021075d89a4cf86e99526c2406ace5dd12f24f9fb50a75301f06d5c8c11d5aacb0ffd35c7f2349f1fcca7581454858a333cc79202c6f52c0c9be7d432965e5ca21cde95bcb1d6c511346440eb64337df2cba6b9cba06d594e5f742764dde147d3b06335a52d282b48f33cfb6f685a4920a768f6d264561ffc3333fd427372b35ebdfdec3bc89b285398731f6899c57dc6a69412805fb734cae755b8e10aaadf5a82c9961641cb9dafe5fc7331c72074d7548b39e7f860cc4282e4feec8ae4604d5585c6c7414132928ef41474a7c73aadf584bbe640a3223019c63a931550a8ab02408d0f250de81e649e1c3bd684e50deafa731397a5d75541e287706c35bad0e915815e8b4b3c6d423af7d3da287919f9655afc93ff025e0951cfab9dda5812ca70eed994bc41ea8d736301676f4c39470c3c84b0567f482b97b5d1c2a6818f92958aabf8a47dc649376e4e2959aad755ef15a81621c89e213406aa7237c65222ed6bee85eca9d46ec72af46ab9706bf287c3e97a4b455ab4b0925e900013638e5cae685e5469ff2d5ba61da6157351af2bfcb5aa401ba847c593ca41927623f937f1adc4460e6d72191d08590f067ccc0329920667cac8d379d4c7005896657284f5751cb57ed72176764909c2f500afbd19a6f5f5a05015f31cf622497a5d311f9277d9811578df4050bfa8ff263d560fa76e852c46b4c202bdec66359cb0c4cb3c83a0ba324f594ba66118c52eb31b06fc8ad3627890fb3dc75ac0345237870f7262d4d0160fdf140fb4cdf6f493436b321c67bc0f81d7a0ee3668f16f577b962e98d0905a5c9adb496b2e3fcd300a666fcbd44d2cd2b50c6d8c652c7acbdeb378b9779c0a5dc5e3757078d009f5771ce8bb95d8ed9942cb543bc914848068284eb51d196b11010cc4e6e41a344f2a205f755e8b6005e6018e3d7c02b8903044e7ad8c6f51500c87b0f7febe8542c9b303921b1d946de1997efaeaa1e2b6e002a856bb32b0be05cee93d224a783ece68575acb3cb2b10a1fb9eabbbc20b2fd9cf8e1411d4939c4355cb6bc9f0f20f143a0f22f0e4cfccd98225b6a885aa806ec25e93922dc2bb03533840cda0df03cfeb234e46cfcb4345737304579138439e2ce3ecc05f506840fb16e22fbe147bb43f6b305f60130d619a7250576a2f7d4d07b58294fda7320f3dbc4bb4eff5a51eea9c63da7e69b3e214bb5a1e80fb7458bc4fa1710bb6f0cacdf47b4de45733139af0cb97afa13af958f124bd1e2d46566f67d78d7c37b0ca5cdbbab164dcc8ca5adff0c9c6297a9b7de878c65aac6e5b5cb581adb52a93c5550b79626d90e7f45edfdce550e72841331232fc411a82f35a1887ec4f203350c8ee8b45a0cd53da4eb23a1008c646e972d793e36ae069a7dd1b6af353bdf0db13d60002f0ecfdefa52a2215dc690fe57", 0x1000}, {&(0x7f0000001240)="33c30858e3f165393d7bbf16eaa07c6b700426ac2f7f2c5004ebafa585fc34dda3407f753173ceea63441e2baba040f33b79c2415289c3336d550afaa106d4b79c5912674ebacf351b", 0x49}, {&(0x7f00000012c0)="27d94f242bb3f8067b3f01846f039d75dde041fa58ffc4258e724a806ff73fe6e583647acf9c2bbd4116975d8fa1b6add307a07b0615cc83a39b84dcd089da28bf4a5c084064263f98825d3987599a1bfbdc35ad1a6dc863bb3d7d9066f9fc72f2230cc65a96b42d5580a0a546ad07b6a9", 0x71}, {&(0x7f0000001340)="11f2b8c1f8ff659ad9b3d456fa84aaf338ba89c417f037606c5e34ce894858fc38da75fe8c5a083c0d128e70327e11947286d927faf22f410f3a21e19beeb962b8bf3f14c5a7de1273aed318af4efe5ccf758cbb5b750d83cdab5d5995e48a1d4d27e52954863b5e00c2f07e8ec31f7f55e10ee8cd8c3f0b9d144e3ee5955cfd14ee775f3934cbe17ca6193f5658c374c7bc4a560741eade82183c79948244d77ed4b9e52b647923619bb4d2a962ed1c08493bc2d7c357b77d242b971d16c8de8e53d50e8c7fe29c529625c65e42299c5c4dd10f7957a17bde0060f3cfe44fd2aa3738", 0xe3}], 0x9, &(0x7f0000001500)=[{0xa8, 0x10c, 0x1, "83ac74bfb70d827b257601381ebea8c4f5d612db40f15098b060b6bab496f09593288423f17104b8df95ed6369e50ccf7bd60c20efba94680f24e76bda9c45f36e4a05671aab8b66a59ea4bb454eb90b763e396c8ef2520c0b93b97676325285e03cc63e8402c3763321e633e64ad37dc26e77a5c25de3f4d275d1e069e87d98e52a2364891577273ceb643187ab0801552d5c7c8bb983"}, {0xa8, 0x114, 0x7, "8b0ce3cc71b1dc5629a70da4713ff4a1f637cf152e486c7a275a412e261910edb5dca580e96457b57d0e10413acfde3f905c88be6c36a6aebafb9c50d6375e090458519528974fb34ff25d91c7cc33fac5f56fb51fca498cbceabf7287cc1e087b86a33db437bc751bb0b170566e39baf08270994d2a5702eb1cb6e71da22223949102cf1d5688ad275117638ebc366c9ca9f508c7"}, {0xe0, 0x13f, 0x6, "ef68bf0366b6d1f20ddb13682258291ccc9f9b17ae695b80650df366c10f93f753b99b702057e73596d2f5883684675e50e6f53d2d6bf4c6b57cf73bbcb295446130aaa069b2407ad1bf9f21f1e31db4354e79d56305bd9c73db0683767ee9c54bae685ebdee35a84d4a4bf8921990efc9d77b2554bf3d51706cc48b70a455ef47d2b79bc40ba42e3bdcc1ced56fa0b6b540ff8fd0fdef5d95726b708cf976b14bcf4ada356b945b1df2d0b0cf5d623030f50c9de81f90a7c18240c6bc60b5270ed42638060911f6865040886918"}], 0x230}}, {{0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000001740)="19b95c55c339be337111810f8010484d05346a01b1e867105b9d3925ffbe77ddc2d0e6d3c9ea7a05811e2f70c089c963e5060314c04619f407aa1ec4e2eae14dfa264e559f829bcb75a4d44e92cdd7bad5572d505678e8335811a743580a74500610ed7b5e1bf6e7f93b3d47f33d495e223a3a709dc29ce6f6511ba468489c843caea5af", 0x84}], 0x1, &(0x7f0000003200)=[{0x1010, 0x19d, 0xfffffffffffffff7, "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"}, {0x20, 0x104, 0x8, "ae6b82fa8d7533466af55166657f"}, {0xc8, 0x114, 0x8, "7f82989efb61d8b7b50eb096700651984bc9af0a319905fb51e2f9fec742dd88a2cbeae2eaeb415a39d94f725eef6acb7c979ae356f9edb478d47eda5084bac05fe500dc54b7335ccbb32a69d6f4b60f7e5554e2db1e007d4fe0548a2c7b5c861322eb709b7cf8293ac583b9a6ada81d53995d1b3ba22fcfa747ef5659eb5096c372b7363f6a9c0c5f7591c3da4fb92a3d493a5d3ec352e80959d97c32628a012cfba16410a8261e893918142ad8bf11dfcc3ae329ebe8"}], 0x10f8}}], 0x4, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x24, 0x0, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000600)='/dev/snd/controlC#\x00', 0x4c1, 0x1) munlockall() shutdown(0xffffffffffffffff, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r3, 0xc4c85513, &(0x7f0000000680)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x8000000000]}) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x4000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x5) 12:56:01 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:01 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:02 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 179.084740] audit: type=1400 audit(1562504162.038:81): avc: denied { name_bind } for pid=9838 comm="syz-executor.3" src=20003 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 179.210799] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 179.226094] audit: type=1400 audit(1562504162.078:82): avc: denied { node_bind } for pid=9838 comm="syz-executor.3" src=20003 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 179.252442] BTRFS error (device loop1): superblock checksum mismatch [ 179.300545] BTRFS error (device loop1): open_ctree failed 12:56:02 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:02 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:02 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") r1 = getpgrp(0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x8100, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="09000000000000000000fcba"]) getpeername$packet(r2, &(0x7f0000001740)={0x11, 0x0, 0x0}, &(0x7f0000001780)=0x14) perf_event_open$cgroup(&(0x7f0000000200)={0x0, 0x70, 0x200, 0x3f, 0x5, 0x6, 0x0, 0x4, 0x88021, 0x4, 0x1, 0x81, 0x80000001, 0x7, 0x0, 0x5, 0xdb, 0x56a9, 0x4, 0xf0, 0xffffffffffff534c, 0x6, 0x0, 0x5, 0x4a1ec52e, 0x7, 0x4, 0x7, 0x9, 0x8000, 0x5, 0x5, 0x9, 0x0, 0xffffffff, 0x7, 0x3, 0x4, 0x0, 0xffffffffffffff00, 0x1, @perf_bp={&(0x7f0000000180), 0x1}, 0x801, 0x7fff, 0x2, 0x7, 0x200, 0x68312c42}, r2, 0xd, r2, 0x1) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000017c0)={@local, 0x59, r3}) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) getsockopt$netlink(r2, 0x10e, 0x2, &(0x7f0000000080)=""/138, &(0x7f0000000140)=0x8a) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 12:56:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xffffffff, 0x20840) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f00000000c0)={0x2, 0xffffffffffff0000}, 0x2) 12:56:02 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:02 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:02 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 179.510138] net_ratelimit: 18 callbacks suppressed [ 179.510144] protocol 88fb is buggy, dev hsr_slave_0 [ 179.515193] protocol 88fb is buggy, dev hsr_slave_1 [ 179.576415] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 179.596536] BTRFS error (device loop1): superblock checksum mismatch [ 179.650388] BTRFS error (device loop1): open_ctree failed 12:56:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f00000021c0)='./file0\x00', 0x0, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmmsg(r2, &(0x7f0000001840)=[{{&(0x7f0000000080)=@nl=@kern={0x10, 0x0, 0x0, 0x80000100}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000100)="511ebd9f439207222b5ddf4081c47d7b0c8df4086ec7f77f04f85bbf7cc7632eacc5a6e7bab4736b468cee6be7557eeb41d5a3fb9fbe18ed2364cc22fb88b17ba406d9da7677f0fd81fc218f0344ef9b99b71f0705363e24864a4d614c1a4492f785540e1af69b0ceab2a0e6ba5d61767e5523a40fd27b9e7b7a76b7dea406404737eaa874dfc6fdd9bcae60ea0d4fe958352e5ce60ce801d84c8a36db827917cb94cc3773cea580a64ace90393d34c26c6d4335a8a8949687f8", 0xba}, {&(0x7f00000001c0)="bfedacd17d444cf39bf437a23ac9e0fbeaf0a0ca9f74fc294ece7fc859cc9f885020ae58e0b273812561631a3240cf22d8d88ac928be698a228ae6", 0x3b}, {&(0x7f0000000200)="5913fab071d51a57166556e3308fc8d37c4735170b053a467ac8791f2248b36111a0e8645434d67f398ef08f32bd49787c7da9b4c0ecccb9bc444f6a5e37e042f5e4c30837b22fbab0db993dd4d71e30864046888414cf707212432ff6f38d8d4813db1326a67d750b35471642e1e429f375de879f901af256c163ddc581ce673bd7a175d0cce2", 0x87}, {&(0x7f0000000440)="a6d7ddd3eba7ab311d44795c642552a5076f51a74d4e61d5bd0c5442b0911dd0bc4edb08b5195399704339182ac4cdfec45fdfd1bf513c661689a2bccb6aa0d068f5f9ba581552186bd9d0a654ab7812e35e86225c7345c6e8f6679109d4be111e46655b80ba131748e6deb5149af69b7c38713cd9b61c8388882902f1fe6bac5de6424acb0ebc3c5715e590f25a8e6f3570bbb682284f070d731cec22996eee9df7bf020741c6db436e2bdfd38d4bd950980e2bf66d0c7b8b021390543cb901cc23eb70b68ae38cffe003aad6a7bb0983c7ab61c241a4185100d9a2d26eb4041a655a53d2cd0e0d915720b49b85e3d32cc61a3a", 0xf4}, {&(0x7f0000000540)="bbd80d34653701ac0b35cf24516f3a4e91568db7a56fdd20500d93fb429f0da233e299e97f353f9cca9604f14dc8dc51a5c559a60b62b896530ee1d4255616656ddd023bbe6d39dfc39ad1499172a50b9ac78c08f7df707a734b0771733010f3f71eac200891fd2057d8e13843d1bd5d5215d24f9dbf65bacafa201fb2e5b695959160b172814b0dc540fcdfbc0b6af059b84bf4974526a61341f36e3bd78d4a7c2a03e662d4", 0xa6}, {&(0x7f00000002c0)="636d12f67f63233af7ae3dbc611fc3bcbd1dc019cea7ca16fbf1c70b92460f703ab4b3416cc68fe55315", 0x2a}], 0x6, &(0x7f0000000300)}}, {{&(0x7f0000000b80)=@ax25={{0x3, @default, 0x1}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000c00)="362d243cae0eb4e36ef771e68bf633d514d4625e8463b2b9214f7098fa011ef446fc7593070494651f129a8d3fe75f20b9ba8de26b1a72254ee8bb67adb8f0a852dffa8cf77eda11f02db9ebff", 0x4d}], 0x1, &(0x7f0000000c80)=[{0xa0, 0x105, 0x6, "44f57d9356b1c4fa43a15f5318f8ae7dad109759ea797164204a28da5c1adb41103b9709852ee3a227c72989859133921b5f6915ff2fdd367718d528d4cb394f05d9cb78dc374f4ad22420ce9e0d48d007e35b07c002e6f60f093aaec7502aa6b655fbaa3b0e4c513189ea906e69c4290c315f3f46901f31e203227840d3e1be13fcdaa7dba688e18ba8ac"}, {0x50, 0x103, 0x0, "ba6a24c2cefc491bb44cf4f32201a878905b4382a86ad99c8446964e4c4928ae583bd424e43fb6507bbfb1659cc65e847eaf646c718a7bd0bf34"}, {0x78, 0x19c, 0x2, "03bd8e77f11ff29d38158f1b293d8239442e5b173e9fe8950a7f26a4ac6c4554dfca4ce91e8184d9a09ba9644119a5848b005ef50563512ae3ca585ecf3012c5b1c252473fd43ac73dc8c899c172b4466a7a6abd0f24aa25173fc4caae392cb876"}], 0x168}}, {{&(0x7f0000000e00)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x4, 0x3, 0x4, 0x3, {0xa, 0x4e21, 0x7, @mcast1, 0x5}}}, 0x80, &(0x7f0000001440)=[{&(0x7f0000000e80)="6276033b382ea42913c22d612bc7173ede80fdfeac4aea2b0323d55ef669775073ae4c2927b34d21888768fcf7e9e3036362145de3e0ceab18310ad3d7663076f8d985d5e7c5bbbfb0949eea3cc0bf3d448b08aa487215f8f1e5fd0d5d1a91bba32da858a493efe91920b2f74260a488c31ebf780d04b482c49d6efacd2c552d90a8bb3a019c2d16f1d9ac796ce5f26dfceea9f4cc5dd1d0a9f36394aebae08f670fd0d471bd38a3772ae83db9804576fc4c2b02bf9f5a45c319ca4527715ad96279af9c", 0xc4}, {&(0x7f0000000f80)="4e542060dda0b8a5ca8b57dd07e717a9a8c524375163511093437429f6e5a5a49a951ca74ac976759caa9b6a3aaa1059b345f785abefc2c6f22fedd6cc58959da46af1d7c9ba18545d5c6cfb321fdb566c539c", 0x53}, {&(0x7f0000001000)="bee376a7f4802cdbe2c203012bf7a098456f501bec8b84787286724257267645c7f0c65e6a231644d9f0d7e6c6f85bfe7d1d8571a314932239f745a9400208af65cdf09d84d298ca7954191b6a25d1ef1c2d8e954a094ee1861f97960aadaa808c781105dbdbf93377287750c1e689ae1920494f925033ca5de0b0bf5cb349fdb37b40b94517584c0832f6b5e8a9b30f6e6c462c2e", 0x95}, {&(0x7f00000010c0)="2022a51402a5b8fdee2d98f9269a68dab4b17aa7c7d759bd19914d779a8e3eb713bfd588984ebcf5de588e6096d704ac9383eefda5ee833b82d3946de410d25a27bf491f201c0640cfdac7c68d66c3997a40", 0x52}, {&(0x7f0000001140)="b9d8f22f9700ba6cb69e65190852ead56c4286c93cfe8274abc0fccd148225caefa9a26e16577c1d6b38f20c271af0fcabe2d13f727764a5d2a09a8b572adff4986b90286084b3b15154939d1b075394a5cf9e1f4180fb75de4cc1c7630a07d7a22ed0c7a4ac709a837ee3b5a4573cf0c91c3a666ca03de27430022fa8a81fff07a493648fdc731a38beda012341a95b94bdf0df901922d46838f8861d90455e47f00abdf1c0ccc2f05fca620123dbb2f607cda1290f74d48713e8410a3bc5c7f9e819a177f1b6b99fa76d8f36761715c2a486134622f532d490dae529b0af3411bba1e84c547d0a8aa4627d642de260399d3d1b123b", 0xf6}, {&(0x7f0000002200)="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", 0x1000}, {&(0x7f0000001240)="33c30858e3f165393d7bbf16eaa07c6b700426ac2f7f2c5004ebafa585fc34dda3407f753173ceea63441e2baba040f33b79c2415289c3336d550afaa106d4b79c5912674ebacf351b", 0x49}, {&(0x7f00000012c0)="27d94f242bb3f8067b3f01846f039d75dde041fa58ffc4258e724a806ff73fe6e583647acf9c2bbd4116975d8fa1b6add307a07b0615cc83a39b84dcd089da28bf4a5c084064263f98825d3987599a1bfbdc35ad1a6dc863bb3d7d9066f9fc72f2230cc65a96b42d5580a0a546ad07b6a9", 0x71}, {&(0x7f0000001340)="11f2b8c1f8ff659ad9b3d456fa84aaf338ba89c417f037606c5e34ce894858fc38da75fe8c5a083c0d128e70327e11947286d927faf22f410f3a21e19beeb962b8bf3f14c5a7de1273aed318af4efe5ccf758cbb5b750d83cdab5d5995e48a1d4d27e52954863b5e00c2f07e8ec31f7f55e10ee8cd8c3f0b9d144e3ee5955cfd14ee775f3934cbe17ca6193f5658c374c7bc4a560741eade82183c79948244d77ed4b9e52b647923619bb4d2a962ed1c08493bc2d7c357b77d242b971d16c8de8e53d50e8c7fe29c529625c65e42299c5c4dd10f7957a17bde0060f3cfe44fd2aa3738", 0xe3}], 0x9, &(0x7f0000001500)=[{0xa8, 0x10c, 0x1, "83ac74bfb70d827b257601381ebea8c4f5d612db40f15098b060b6bab496f09593288423f17104b8df95ed6369e50ccf7bd60c20efba94680f24e76bda9c45f36e4a05671aab8b66a59ea4bb454eb90b763e396c8ef2520c0b93b97676325285e03cc63e8402c3763321e633e64ad37dc26e77a5c25de3f4d275d1e069e87d98e52a2364891577273ceb643187ab0801552d5c7c8bb983"}, {0xa8, 0x114, 0x7, "8b0ce3cc71b1dc5629a70da4713ff4a1f637cf152e486c7a275a412e261910edb5dca580e96457b57d0e10413acfde3f905c88be6c36a6aebafb9c50d6375e090458519528974fb34ff25d91c7cc33fac5f56fb51fca498cbceabf7287cc1e087b86a33db437bc751bb0b170566e39baf08270994d2a5702eb1cb6e71da22223949102cf1d5688ad275117638ebc366c9ca9f508c7"}, {0xe0, 0x13f, 0x6, "ef68bf0366b6d1f20ddb13682258291ccc9f9b17ae695b80650df366c10f93f753b99b702057e73596d2f5883684675e50e6f53d2d6bf4c6b57cf73bbcb295446130aaa069b2407ad1bf9f21f1e31db4354e79d56305bd9c73db0683767ee9c54bae685ebdee35a84d4a4bf8921990efc9d77b2554bf3d51706cc48b70a455ef47d2b79bc40ba42e3bdcc1ced56fa0b6b540ff8fd0fdef5d95726b708cf976b14bcf4ada356b945b1df2d0b0cf5d623030f50c9de81f90a7c18240c6bc60b5270ed42638060911f6865040886918"}], 0x230}}, {{0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000001740)="19b95c55c339be337111810f8010484d05346a01b1e867105b9d3925ffbe77ddc2d0e6d3c9ea7a05811e2f70c089c963e5060314c04619f407aa1ec4e2eae14dfa264e559f829bcb75a4d44e92cdd7bad5572d505678e8335811a743580a74500610ed7b5e1bf6e7f93b3d47f33d495e223a3a709dc29ce6f6511ba468489c843caea5af", 0x84}], 0x1, &(0x7f0000003200)=[{0x1010, 0x19d, 0xfffffffffffffff7, "ad479576c98af4590525de90107415e51489d0fa568fc411b00a626f273d00bfe71286e95398276519b3218342a489585e414be34d97dca11a71873bd8fe448af1eff7291034eaf8c8f14a557b011f6801bf4261abb38bd83d9a7ddddcc087de91986e0e29dadd814f034c5216f7c6d22cd029edc0cd2eefe7f89f54f8f9edb24bf82a6917bf3b0a1c601e84633d6f59027d90a7ab5088175d4f3faaf5cbacc9399f9ad0caabeb5a7ffc5030040f7e9b6484cd2bc41f3a75945a38bc34e13ed80f1ce8f5cda7bf6b48b5f55cf87bc1e25847068ae1bfcf956f6d020c3d7d89255323be75ef1dc6b063536c1265504a519a0e55590e200b0c284c033b0da1b38bd93f4912f5991662eff1b928809e7641ce1409a509c1deaef575453677450ae8db9cbf5462b4dfab06ed37cd64eef37db723cf397e98fa5810b91cd3c4bc7549f77f322e0101cd2b1bf0d58df87472209174657513d57f996026af398a244e6ab3fa525bf29b7d635363ef3d1b2d31f3a31d0812641922af39ebc758f64433a294faa6998d77836eee77c89c43558e5f1ebc8423dfc90b0a55f6968a18bf5b6129b34ced0adb817e23fa375e3a9d8c2f09ff5cfb85f2b9c080b7025a41fa96cedbecede6dca4f6f1d91974f1188aa47796438dfa76dd27cfb395ba2ac7f92ca94969a3a3c306bf8e0d4c30d3f31046739f59a4dda460dd5079c63973157a10916a8f160077d202f5ed7547298962403526a4b5eee6442ce43aa9c71055d0f4ee29026c1a4c4d19e822457b5624f3a425dfc296fb92a9a81df565107207d48bb51a9e1a2054220043f494f5cb7973824c70b14cb078c554a735da14f39e2d4f206726eb2f00072f84be3fb6bfada00963f384f5a8eab6ac2d6db6d3167a1bed190529065cab8b7e3b625a6e09fc809d91e4dfdef33169189de075b3a19b88df804e15e69458cac1d3fb9f4c118b38275d216b15f8a096b4bf19a1d7141fc17b1ec7780e85d5627409c3cd09195207cdc29f04d9aeb40a93deea796e6cea053cf06fc1aca5b9b1e74430d21a1e6736522f26d9104ef44c1e1cdd4cf6259f9fda7f133a296f888fba5c4ccaf63d829315741538bbda20b148975026327b0bc73b4f510f998295a6b074993006bf8b17b24d362f8c4dd91ce288562552b9d3ad18f8489d37861958590b71617775c2522526c470f728405f2e288ff7cf036c2cfe5b8bb9c442498f284499ef039491156e1d3471cbf4f0dfb624fa04762e05b788e400b3d8575dca61b31ba58337046d98a43dd46284f4a5e48ef57f2e32c672ca9511170ee0f5fe94338db602ac150da871f5b48bf96ad76422faaad8d736daa2db5773c607931ef9082208def34251b51f3bcf8a729ef812adf48b25005e85aa61bd459e672538788156b315b1c279655badf4e48c6fc5bc3d3bc65c33ddc3987ce273c71b2a75ca421715aa31c32ccee37f6f35ae61424f3b144f2537371962f061031e977f16a322b0c4184a05b03fd192df091060bd76630a545acdb8b8c0fcb6dad3505498aaefd586f945ca1a21b851ed7bdbe6f6a8d3d1aad48defd2e390b5db706efb43541c9ed6215966ac6224ff41a7ab87767463ed600059658504981fa18b184109c8d969765a9a22a9dd67a797ae6a0105e756182b178b0c9022b34257f5b6a7f5e9d823ea4aa7a548be3a465ec787a54aa5ca0ea2a9a1d9642e1097e0e38c01995c2361b16a85773f3d96604d1cb1bd404b67bef61e580e2f6aba48412c36fe1d34750862942181fb178e409b39cfd13ed559f70954b03aa2f9b47093893d573098b8dc87d8e86c0520bae7f86b68b1df34e4e3ef29caf23f4a965b8df40b11d64b13091e68773f05db01f53bb1d3a112f58d9b1f31025042a1af923f85c3c24701a6362572c2040be8e7d6c728c79c72b5883bccac98e5a49a34f37a5d036ba153f59ec8e757200447f9c871b6902043dba543d0522c21a1fcb43499c43d5137ea0d93f4208c7018d33ac7acee653524921efebc2f2e473ba12605df1dc7c35b1058b790a0d9dd32b6e72339803616d61d78d0f3edb6d3a4a34af40ba11116cd8e3fb911373ab64782628162d4d36cb7bd5727d8e06f3dff243d4939a4797b1ef3660c412d23c5a7d4a78fabc620dbe2ac29f436955b944b9028a54e7b2ecd6572630ffab569bee213ee69fc8cf315bb539362b55f0ec20fe1782daeffff86aae757ecc1e26b1ba75e8566e60093042383409e2e1fc6fce966984793a2d60b1a944b40b0d0f47cb59d4ea377ccf4887e853c6c935950859d87cb5b9de3533d67b4cc9ee6fd70c4b4881aa32829bf46bbdc6844c3ff1f7083f5a9fce70835a7c3658c6a5b1b57dd60728f933daa24fac79bf562eec1d84431148a149bfd43fee01367a5f802f94969f3f31480bb03be6c2fe2028c1d90acc0c26cc293a87b7a6bf2bc4ff14c536336c9a38b9cb628878a307ca0b96b9cc0badfa1030d7b16dd349027cd827202191a67ccd5f8a3a67f62750c9224cc3ab3e85a16ff85616d15c4bbd0143fde3aa45286d7876dd5217973308006b89b8fcdedf3aace4c898d8d71dfb545cd3ad64e00a541c5495fbc3fd211a54d0b19f09b8562a6c7921cffb138988ba23350a0c21378a73480627415e1748c5494610a96756a0ee12cb42424213661c4457bc556a6576ec3c7059432714b97bbc8b0f0af0e4ae3a798333a9591cee686ad3a3f244c84eae4adbbaa489c5100ab9b5e6b9a7e0f04cf18006c6cfb6dd11bd5b1c6e42d19ea523d6299b6b3684f345290e79ee39ee66d718426a51261cdaaeae43e95f4ba8bde7824c9bf5510368ca11e6ef45feafd3d50d9075f7198c470c045dcb493f5a74ef272b03a6f538fe4fcb0ba3dba416cabf2bf670190bb2d9d33fdaa6c6acf7e507fbb7843333d8bc301f6b1df489d7ae3287eecef07b2e9923ef352d64f4f740da320f5454bc8068d253c78d6733eee7a6ac3dadb33391ee77b2fdf986f2df2518eb2f8e15d628dc1388ee4ec533c1ef6b0af30da874583870afe20eda964d30b6e20c9e078b4991623533ed4381e851cc3c68c3f1ac938599d33cc980d94b0caa82c385d18d16d15a57337288be4cc7d8784c6c4dce792b17c90da2138cdb37b9c0c88ebf138da64742636636bf974873591a0016a7f073632c2559b26fd410f9730cae2827aa691aa0954c18a9db672e6aecb8d24e17a91a7f9fcce66ef7d3ae774d3cefa67fab331988a0dc91e0a434b3571904ed7f888e6f6f92331ae55ed66f67ed33072beb9bbc3aa6b2ed79212f9fa35e336ef8c7c105459e8a8eb291799500577208352a3fedbb30cb6f1538288b9fe29d6739688ff2856933d3f13e61e10423d5140cb42b4b6e2c7f3862c77b3fcc7bd9d2e76cc9f733337722bc38bccd128a30a084c3c2399cc0de054322094fcad3bbf2df96751faa23f797ae3cf7c80065e51c01743728ecf51fab45c42e6a7dd70f6a474a06546364ba132184de0fb99a839693c27138626508b47afe030c031aa2252fd1fe0397cddbbdabd3b8dcac3114c023bcfe7227164e50aa5da43d1c65cb0680053cce92ea0467481642d90f668de258c16ef13937ade6bbe963b54e0cf3ccc83d064f87cb826b37047a5e5eb24f99e0b4b18cd94ddc1181bc6718d9b9035fe1da89df9589e25b9b50b36c2ba8bf36d7c2d9b7e49b9d2a52979f0a0af770fe5f312e9da9047015e4045f438f46d7c66579239b96511d4aaea06a68611d2f97eddfe405e224d9771d7ab332b3ffafa28f178c251527bd5ed0eeb0ab8c13056f49a8a2f75701c5d5562d6418a42f904c5ba1fa3cad1157d67f54e92575b3a9770a7937252263e7fed05eaf4de893bd38366ac2f4a328987c029c8fc10d520edbcf047253474d0b45f521d00f9a1aa5ebc6921731e0eb5fc40f780021909dddb855cd803b3ba7ef895d44e067b2fdf2e1d7da6c70312b98512f208e8f455d35071d708a6ca34cc4891e75aa3c340d1081630f7f69b5ce8b19b3aa6d945e656a400d43d0d6d68badb0327b3f73c6f1d0bdc8fc7b2f2bbe33bdb2c9cb90250df6c6efe2427974db0a850e010edc46faadf0a9825ab73e759650ba18c7b66c9424575ee3d8932dc97bf299851fc245a4245b73898c2ebca51252a83d0a6690f76ea87a502cc1c3afa66fe04a73c0f2fe2b4a9979865e281270db0d7ea903fb3186c9a4eb947f95d0e55914e145ed494ad7a63b35c49551919c4ac65b9e6bc9b2669494f06206282a5b54b4cf59a25b4df293af913e0f1425424e67fe71aae3560d75823bb1b155d872fdf0f730008775b9ef3c9cf66d205b53255d8baf6e4ec2583a2bee3ecfd4fb4ec9d5fd304829c8f3c8c98ea8fcc1ac013f771171bd56e622405351031727817c26ed7c7709c573259dfcfbc607fd24ec581dd6a84be9820860b2f5bb1e0930158bc405a2db06a2e04f984ee37ba122b1b67e61b65ce94ac7662dafc1e282b0e0cd6534771678ac2e150c0070a1d109eafdaf00ade98b59040625fd6921b89ef0bdb35ba9361f403e366b5418116d50ca09078f548ec863fc7a7bc8173f52a83854ef6cc2384ac307ec32d8773ad0a31b94097f49a70a78d2b5762f3bb6ca3b18b9b5898e526b7964f5bc1125872dd5792c33656ae5b560ad4c3c42888510e9fa987bdc0715ca739269177c785ec2bdbef252ea1ca5c420fcb45863c218d1085a2383fcd997f1fbfa9e94fed2d1f87d67416665ce3d9a38a4b2dd3be1f049dcf1f66157211bc7fcc1f8e26a82f3f287457b9eed9e1797a33b8b5b8d2701afecbe499cfe4e6b49dc63e03b2f75fc39a18144ac5284e8383baa0dc022ab96c875abd03c28adfa59f9dc2a759d0987a10ddaa477c2c8d57be2fc2b68ece7573d8eba1d78ee8464db6c06cd02a12c84effc4cb3777eebce3406171e28adcd8cfc67e5c80a065b9b796654960cd68f45a4f908e26da7132edc7f2a56d01b6ba5044ca5b51919419f4b2ec4564f025df85bdc9db0f6cfe01f49da11ef55d8e2e926d4456976a7265dd3e0ab36c5c2a0b0a781c4f81714dff257414d3744bbfc1e3fb806d3d398c765e09bd737ea2d0913aa7d53107f2268935a68809f8ef7050b0c43c21c00b008297b9ccc44441b4b06158c1b69e4e2f21461d5625424a42be8dc75754662cefe258d4182681841fa476d03120bc53c5c8d2da2069fce69ff5ae7887b6741dcaabeb12c04738c792f7d42c9b522f1ade604d08c4a2f8b88a431091d34c810fecc9e58a170f9272ee4d47c19d6c7f4212a6df6d3ccc9c2bdcf35b5057810b92a49f2712445af5d1c297eafbe2e6439b06334d630dc7245deb9020695c66e26d4bd8bdafa84266740bd4caeef4a54c5b6f2cce85f34fa53a83406874c8a410c9ff5ff6f78108d336dfa5049e0dd4ce8cb25eec1d05b270edcf20358dfd6a464d95d1ac56f3d701fbbe6ccc15b5c00432d4fc1dec3514d5725d3c35ec327189a0d74d40ccf5e3cb0b47e22d0857005817b95cd8a28d90896dca06be000248735fbf8bc88043e89d0acf2ee969b67c8208f64b2568a05eadbda5adb5fb73696089ed44e7928309b9ea14bf7c85ec9d1cd001a34e765dee1bf7e69694a34c0167a22c9adf1a2752c9a1e7ca6b85e88c3a5af066441842cdc864e3094b12a6363b6428c744a6ac3f7e938ba08d7464a24734e12722e2b2215d208a2e1e45b8e5a8cd7aabd3ea26b421f4f566a1fe13a3e30efaa396ec725ed134e97facb590cb3335a2bde28ff1c379b703d1402d40001bff"}, {0x20, 0x104, 0x8, "ae6b82fa8d7533466af55166657f"}, {0xc8, 0x114, 0x8, "7f82989efb61d8b7b50eb096700651984bc9af0a319905fb51e2f9fec742dd88a2cbeae2eaeb415a39d94f725eef6acb7c979ae356f9edb478d47eda5084bac05fe500dc54b7335ccbb32a69d6f4b60f7e5554e2db1e007d4fe0548a2c7b5c861322eb709b7cf8293ac583b9a6ada81d53995d1b3ba22fcfa747ef5659eb5096c372b7363f6a9c0c5f7591c3da4fb92a3d493a5d3ec352e80959d97c32628a012cfba16410a8261e893918142ad8bf11dfcc3ae329ebe8"}], 0x10f8}}], 0x4, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x24, 0x0, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000600)='/dev/snd/controlC#\x00', 0x4c1, 0x1) munlockall() shutdown(0xffffffffffffffff, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r3, 0xc4c85513, &(0x7f0000000680)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x8000000000]}) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x4000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x5) 12:56:02 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:02 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:02 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xffffffff, 0x20840) [ 179.830128] protocol 88fb is buggy, dev hsr_slave_0 [ 179.830977] protocol 88fb is buggy, dev hsr_slave_0 [ 179.835241] protocol 88fb is buggy, dev hsr_slave_1 [ 179.840318] protocol 88fb is buggy, dev hsr_slave_1 12:56:02 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:02 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 180.019537] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 180.031936] BTRFS error (device loop1): superblock checksum mismatch [ 180.100581] BTRFS error (device loop1): open_ctree failed 12:56:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xffffffff, 0x20840) 12:56:03 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:03 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:03 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 180.310148] protocol 88fb is buggy, dev hsr_slave_0 [ 180.315320] protocol 88fb is buggy, dev hsr_slave_1 [ 180.413435] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 180.425248] BTRFS error (device loop1): superblock checksum mismatch [ 180.480445] BTRFS error (device loop1): open_ctree failed 12:56:03 executing program 3: clone(0x21100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000100)=ANY=[], &(0x7f00000002c0)='./file0\x00', &(0x7f0000000180)='h\x06\x00pl`s\x00\xefV\xaa^!\x97\xafK\x92\xc0\x9e\xae\xf5\xe4\xb2^4UG\xf9\xa9Mh>({g\x94\xce\x02\x19\x8b\xc2kh\x02\x94\xcc,\xfe\x92\x90\x90=2A\xe1B\xd5\xe4\x8b\x7fTL\xe6\x92\xeb\x00\x00\xa4;\xbcb\xc1\xc4\x1aN\xa3Y\xd6\xd4\x88<\xbaW\xc2\xa2\xd7\v\xdd\xe8\x98\xc3k\xea\xbd! \xff=w\x17\x06\x00\x00\x1d*h\xb4\xa0\x95\xc6\xe7\xbd\xd4\xaea|E\x96\xd1P\x92\v;\xf4\xb4U\xb3\xf1\xc8\x98\xc8\xdf)\xdb\'\x8a\f\x9cB\x8a\xf7\xb1\x90^\xb9\x84\xcc\x87\xfb\xb6\x1b3\xd4T\xee\xe1Sg\x87@\fh\xcd\xdb\xb9\xff\xc4bz,;\xea\xab\xc5\x10\xf9\xd5fHJ\x0f\"\x8b\xf2\xfb\x1f\xddtl;H\xdeG@\\W\xaf', 0x1, 0x0) 12:56:03 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:03 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:03 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:03 executing program 0: r0 = eventfd2(0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_mreqsrc(r1, 0x0, 0x28, &(0x7f0000000000)={@remote, @initdev, @remote}, &(0x7f0000000080)=0xc) r2 = dup(r0) r3 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) ftruncate(r3, 0x7fff) sendfile(r2, r3, 0x0, 0x8000fffffffe) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f00000000c0), 0x4) 12:56:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) [ 180.710158] protocol 88fb is buggy, dev hsr_slave_0 [ 180.715298] protocol 88fb is buggy, dev hsr_slave_1 12:56:03 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:03 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:03 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 180.785037] BTRFS error (device loop1): unsupported checksum algorithm 22813 [ 180.824345] BTRFS error (device loop1): superblock checksum mismatch 12:56:03 executing program 3: r0 = socket(0x0, 0x8000a, 0x3) write(r0, &(0x7f0000001540)="240000001a00d17da53a7436fef7001d0a0b49ffed000000800028000800030001000000", 0x24) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000240)=0x650d, 0x4) sendmsg$nl_xfrm(r1, &(0x7f000014f000)={0x0, 0xfffffffffffffecf, &(0x7f00000bfff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000002000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xb8}}, 0x0) read(r0, &(0x7f0000002580)=""/4096, 0x1000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') setsockopt$inet6_tcp_int(r0, 0x6, 0x6, &(0x7f0000000200)=0x99d, 0x4) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x802000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="a54c0000", @ANYRES16=r2, @ANYBLOB="001228bd7000fedbdf250d000000080006000800000008000500800000002400020008000900ffffff7f0800080007000000080005000800000008000e004e20000076266bd5b62756c22a2196edb5c0fe91b921584742f4aaadb5a457cb564d372fd0852f47ab1fb530171c9c664402d8e744dc906381787348543c3e8a1a2255a6714437e375ed528912d99029a6ff36cd3d796476bdde2995fdf6444bf9eaf05e67a427de1bb8d991d463febaf39e68a84ea7c2886924909f4b3523b5c6422f62ef2f073584a4b5bed3f20213c0d6b17213ff4408babe8f84b975fe76bd85451e87dbd5d55fba47"], 0x48}, 0x1, 0x0, 0x0, 0x4000010}, 0x20000800) 12:56:03 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:03 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x8002}) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) getpgid(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getpgrp(0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) splice(r3, 0x0, r2, 0x0, 0x1000000000000003, 0x0) inotify_init1(0x0) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) sendto$packet(r3, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) 12:56:03 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 180.912896] BTRFS error (device loop1): open_ctree failed 12:56:03 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:03 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:04 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 12:56:04 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:04 executing program 3: mkdir(&(0x7f0000000100)='./file0/bus\x00', 0x4) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x4040, 0x0) creat(&(0x7f0000000500)='./file0/bus\x00', 0xcebb6074bb566d03) r0 = open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0x0, 0x0) fcntl$lock(r0, 0x26, &(0x7f0000000040)) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x800000020011, r0, 0x0) 12:56:04 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:04 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:04 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:04 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 12:56:04 executing program 3: r0 = eventfd2(0x0, 0x0) r1 = dup(r0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x220141042, 0x0) ftruncate(r2, 0x280080) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@dev, @in=@multicast2}}, {{@in=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000040)=0xe8) r3 = getpgrp(0x0) sched_setscheduler(r3, 0x2, &(0x7f0000000000)=0x7) sendfile(r1, r2, 0x0, 0x2008000fffffffe) read$eventfd(r0, &(0x7f0000000100), 0x8) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7, 0x1b, 0x2}, 0x7) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000080)) write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="2321202ef2ed042f"], 0x8) 12:56:06 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init1(0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000600)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x3, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @rand_addr=0x1f}, @ib={0x1b, 0x0, 0x0, {"23ce0e9d9488c12f0a77bd74dd38fca2"}, 0x4a7, 0x6, 0xfffffffffffffffc}}}, 0x118) syz_open_dev$usb(0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) syz_mount_image$minix(0x0, &(0x7f0000000540)='./file0\x00', 0x756, 0x0, 0x0, 0x2020002, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0xfffffffffffffcd5, 0xfffffffffffffffb) syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x0) socket$unix(0x1, 0x5, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) 12:56:06 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:06 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:06 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:06 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 12:56:06 executing program 3: unshare(0x8000400) r0 = eventfd2(0x0, 0x0) preadv(r0, 0x0, 0x0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x40000000010000, 0x0) write$vnet(r1, &(0x7f0000000800)={0x1, {&(0x7f0000000700)=""/71, 0x47, &(0x7f0000000780)=""/83, 0x3, 0x1}}, 0x68) sendmsg$rds(r1, &(0x7f00000006c0)={&(0x7f0000000040)={0x2, 0x4e24, @broadcast}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000080)=""/192, 0xc0}, {&(0x7f0000000140)=""/215, 0xd7}, {&(0x7f0000000240)=""/168, 0xa8}, {&(0x7f0000000300)=""/208, 0xd0}], 0x4, &(0x7f00000005c0)=[@mask_fadd={0x58, 0x114, 0x8, {{0x4, 0x4}, &(0x7f0000000440)=0x6, &(0x7f0000000480)=0x13, 0x1000, 0x7, 0xff, 0x3, 0x1, 0x2}}, @rdma_dest={0x18, 0x114, 0x2, {0x200, 0x3}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f00000004c0)=""/139, 0x8b}, &(0x7f0000000580), 0x10}}, @zcopy_cookie={0x18, 0x114, 0xc, 0x3}, @zcopy_cookie={0x18}], 0xd0, 0x40040}, 0x4000000) 12:56:06 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:06 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:07 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x2, 0x2) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000080)={0x0, {0x6, 0x8, 0xfffffffffffffbff, 0x6, 0x0, 0x6}}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$nfc_llcp(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f00000002c0)="178e75ea3c3c17872faacecf473f6ffdf13162eea0f80322fc9068ee6db739675eebb16a7162a3a4eb55d0b1c0bde6dab296ce5eae0c95b767a34364eb1669ae4bf741bd4a680055538f42518a681f37e7febd1513f97e8d3c6ff095463677503b88c60fe98f6ca17291852acb63a5ee2c0b07582937bf4da386e8ca1b9fed1f830e5bc4aa785ac9f07a8c909a84c0c9d1afd6cf2170707285356f114795058d0e2edf22f9b5637a5fe02fc32c3082f112d7ca2848fec2501d9b5859f1e13f9c378e2586e3e9784d4c3d27cf4afbeaa83ca655b90e0a5aab37c72d65977343249cb5a680c7a3bd291d9ea861091ebe3eb7d91b734f", 0xf5}, {&(0x7f00000003c0)="daed74bc49553c6985b380d8dc913b5dbb1109c782c887c05027887d886bf4ce7b68d1b05e0413373b22283fed558114fe3e69f0a4a6b14c6b79493d09a0c01293c08215a44c4386072b7985d1d040b48da18bb8bde1f72ae6bccf0717f36d15252c9236c79d69f2323178d7fd7e1c7d21c8deeddb0f2bb9b2fe37a04868ea2227ef2e8d4a63e6d9cd5bb2de693de9a3bd156fea73f439714d4114bb0b413c6451cc067ff24b26a0ff0beefbeef56692ac5c18d00f3b7444aa9e4741c687258f2d39c08242de785c6c664df033d5b398b6c3d70876eff444f6afa93a1647a2207b6926a1cdbdb332a4208d0972238bbacd6e009c", 0xf4}, {&(0x7f00000004c0)="a4de3f00d023f2fee5afd48ba9fa2460777f514a32e8e3302a6b6e097c2c0728455ed2b226e9b12e339592bc0193a6da70116559dace698e563325454f5e440f1e2f4ad94f649828bf55f29ddfdf9fe18447b470382c284693cad6d1ede5b1fc1ecca5e9941fb9dfc85c76b50256bdd60e", 0x71}, {&(0x7f00000000c0)}, {&(0x7f0000000540)}, {&(0x7f0000000580)="f4fcd976379a5a24951f19d000a1180d8ab64ca4147689a56469a902ec0dd578f7a1ee4b303e99709bba61eafff4504701795a00dca385698ffe5f240b9690f3931d90e711830d9ebd2102f56d82a3029cf25e07878bafcd70ae30d033299821b2648be6e8cda56773be7728f323561e9f8df3a7640e7752527453b27010939b08f9c0258d8784e27befaf7ae29510f03c7f4732f05f7fd2be62f986876d5ec6de97b7d97c16724f4a799330ab344ec5c3c8fa5d6ca35fd48458960f61fe7a70", 0xc0}, {&(0x7f0000000640)="fd7e4e1716671f", 0x7}, {&(0x7f0000000680)="14c61d608addc2a168acd4d5caa1f222c1465dfe53a6fd9dde985e6328bf2bf21c21813e931b4221", 0x28}], 0x8}, 0x24040844) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 12:56:07 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:07 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 12:56:07 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:07 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 12:56:07 executing program 0: syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, &(0x7f0000000380)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000f0000/0x4000)=nil, 0x4000, 0x0, 0x31, r0, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$DRM_IOCTL_GET_STATS(0xffffffffffffffff, 0x80f86406, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) 12:56:07 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:07 executing program 3: sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x40) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x5, 0x100) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000140)) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x14102e, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, r2, 0x0) sched_yield() ftruncate(r2, 0x0) 12:56:07 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:07 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:07 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:07 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d1", 0xca, 0x10000}], 0x0, 0x0) 12:56:07 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:07 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:07 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x2000, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) perf_event_open(&(0x7f000001d000)={0x2, 0xffffffffffffff7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0xfffffffffffffffe, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000080)={0x2, 0x4, 0x1, 0x92a06e8, 0x10, 0x1, 0x3, 0x6, 0x3f7c414c, 0xffffffffffffffc1}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x800) tee(r1, r0, 0x100000001, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x80, 0x0) syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x4f94, 0x4000) 12:56:07 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:56:07 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$setstatus(r0, 0x4, 0x2800) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000500)={'TPROXY\x00'}, &(0x7f0000002680)=0x1e) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) statx(r1, &(0x7f0000000080)='./file0\x00', 0x400, 0x40, &(0x7f00000000c0)) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 12:56:07 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:07 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:56:07 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:07 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:07 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x3, 0x3c8, [0x20000100, 0x0, 0x0, 0x20000328, 0x20000358], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/986]}, 0x452) [ 184.870145] net_ratelimit: 21 callbacks suppressed [ 184.870151] protocol 88fb is buggy, dev hsr_slave_0 [ 184.880228] protocol 88fb is buggy, dev hsr_slave_1 12:56:07 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 185.110142] protocol 88fb is buggy, dev hsr_slave_0 [ 185.115266] protocol 88fb is buggy, dev hsr_slave_1 12:56:08 executing program 0: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x12, &(0x7f00000003c0)=0x7f, 0x4) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20004008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$P9_RWRITE(r1, &(0x7f0000000480)={0xb}, 0xfd8d) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f00000000c0)={'icmp\x00'}, &(0x7f0000000100)=0x1e) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='syz_tun\x00', 0x21d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r1, r3, 0x0, 0x8000fffffffe) 12:56:08 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:08 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="5500000018007fafb72d1ca2a4a280930206000000a843096c2623690400080004000c0816000b0000001af028f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8", 0x4b}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendto$isdn(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="e60b0000090000009c3bad68e344eb129dcc3fea51b09a0e7dbe6fddb28279e4965e2fc5b0b0f337a470918b70e3e2341efd75af344547ebd5a6ee94f108701ae8a74dcb5e155ee9a89510a35c1c88908abbbf226a67785385736776548eac2d9668d1dda64e8f8d901ba799058e311b4ae0029feda99e20569c39a497116a91f4565afad4dba8967326cd9b8f56c97767e8f2f637ae84eaad7f414411f310f8a8d50ff41307bfe5e943da45ce2fe1b0b95f411cc8ab284b5e2f661f212af82e222d2ee1e4bde6a217ad13e3a6a2cd47293f8cdf2d663237ba7a3c27a862dee2"], 0xe0, 0x0, &(0x7f0000000000)={0x22, 0x5, 0x1, 0x7, 0x3}, 0x6) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x4924e82, 0x0) r1 = msgget$private(0x0, 0x20) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000380)=""/4096) 12:56:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:56:08 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:08 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:08 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040)=0x8, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000280)={0xffffffffffffffff}, 0x111, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000300)={0x5, 0x10, 0xfa00, {&(0x7f0000000080), r1, 0x3}}, 0x18) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f0000000340)=0x4, 0x4) r2 = syz_open_dev$usb(&(0x7f0000000380)='/dev/bus/usb/00#/00#\x00', 0x3, 0x200) ioctl$VIDIOC_SUBDEV_S_SELECTION(r2, 0xc040563e, &(0x7f00000003c0)={0x0, 0x0, 0x100, 0x1, {0x25, 0x6, 0x4, 0x200}}) sendmsg(r0, &(0x7f0000001c00)={&(0x7f0000000400)=@un=@abs={0x1, 0x0, 0x4e23}, 0x80, &(0x7f0000001900)=[{&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="81fbb59ac73eaccb02205d3cb2326db746d44c8a58a11d24c69dec3ff201a94a03dd99eccc88d0a7b918f599c50b288788c5d69a122850d3ec5d3d332a5bc3322ed2b608df91f4077d", 0x49}, {&(0x7f0000001500)="542c95ff7cc52a5ca7c39e53e3d424c8a9c5b67c2ee7f1bdb6b14b0fd5b57554eab5d4a02d80cd09e0dd691425beb2c73f5ef32c81f4dba6119751e5ddab1af79a704af4f6771e5746090e0f0a1171216e2a21034291dd868db577a4b4cdb65fec15f1f17c06a5a2fad4af68ca238a397f0e6509fa16059f3790bf61887d95aed8d7fc20a4b3f770c0c1b720fcd782330290992e59", 0x95}, {&(0x7f00000015c0)="ea05754d0271ee7378718644638ce69a55bb376b82e392e034ce2826f0714723716f2b7133eea0d7100ee9f0e51919239ae98038cdd12d383be24bfabd0f16669650854761e88dc5dc4f", 0x4a}, {&(0x7f0000001640)="122d3d41dc1f83cffb16a26ead67f565b4c93abd40a1ce5e69046cc0ebc2cf449da5bff9b82d0274e27b453530202efe61e4d800c16bde2028cc33f6719e9e209561f3a1daac940875149c135c0dc8bd5885c79a958e2645afc2b8299bed633148493ee4060da1543a84142277d170be7da807772091bdadb503b09887f345167ff2a5b7f4429b96e3ab2552003c4c1f6d6f17377178fc3e5cfbf08cc88704fb7b867549a1d2c0acfe2736e1cbc3bac4191969d6a5", 0xb5}, {&(0x7f0000001700)="a7c30c203f8b648077aac8bca2e4c73c309c5a431849c14ec892b30f7e199b4f650a4ca40f1f658fa9bcf6", 0x2b}, {&(0x7f0000001740)="b693f007a8f932163c9c52bd3963833a6fc26618d69842aae0160ec07e13ebaaacab8a130ec3e6f4b578f9f7f0f209714c1162a23462e1657e4dfaaefcfeff9a6a3c3a371b91b33544cbfa376dfea6842f", 0x51}, {&(0x7f00000017c0)="2d78a2e767034aec3d7a1ee6317b0d68be359fbca17cba822d7c728166ac", 0x1e}, {&(0x7f0000001800)="a83ce4958d93f297efea697a8382e2ec14ecce1c36e75129cfd90e8b1020d0d941b7764e35e9d94fcb15737591d27ead764e03222d073da957020418510b3795db27a069cdec764ff5a0859ebaf0233b4f7ff409f9d722970c9b86af6bc7f6c1a72bc0b931e2705f72e5b516c99dc831374242cdf65dfe387e33469994f390896f3409c5c7f46b8d88bfe6e4bfda9f8a5b0a191a7c9448f386a2a3da34299fe080f652baf094c27efa1aa4364644991a66317003964a58aa838839ac1e9afd8c7f492b57425f944cac2974f430a343d7038a0856ef941d206b", 0xd9}], 0x9, &(0x7f00000019c0)=[{0x30, 0x12b, 0x8, "d2577fde51015109590fc39da57619b1828d0066471a08d2440d0c6171"}, {0x98, 0x117, 0x25, "0f31494956cdb0d790b9c7e487eea3d8d6bb13badba74ae1fddb826d8c66050962e674af19c2da1136f3949d5d06741f14ed23b78efade8303960c8d65a84bf2e8ef5dc152b311e583c6cb4e7da94cd63de225524215069e1a3cdaeaf0dc1838789b7f36daeae88004a262cbcc4e61b82a88594de802b52cc1cfdc7c4018e389ac802932360ba2"}, {0xa8, 0x0, 0x7a0a, "02099295596250d95b6081ac43b016d409fd982306d2d0de0a51ba5af295f07b4012144d684f75ddbbf440a5c80a7920d413a4cbc5c4c45a3aefe7e622f097ffac8a0162bde005bf60850b7a40b6406c1b1e805691eea0b71928a19bbaa4b3b33797c46e37ad11d22d16962b01c1da6bab99e9cd7be707b304f8035fed8d7e44f753cbb072fbf5021ca380560d1a870df249a6f0662c"}, {0xb0, 0x10d, 0x0, "563cf9f7686ea2051c3b14dbb569dd39bc76510569430b9d3f5087d67d7df0b4e9a2fb4efd4a4e316abd39a55a180da36ce4dfaca54dfbbac91dd0afc6d168102ab5fdf37934354a7ac5b0bb4db5608a9259b830d920e8b3d5f30a2a164e16a9860043859f761564f619ab47ec08ecb89a162d1b08cd18cf1d08ac6cfce2f944696f7ed81c9b6ea63b89fc9cc08b4d7a7890489401e4696e446475"}], 0x220}, 0x40000) r3 = creat(&(0x7f0000001c40)='./file0\x00', 0x0) getsockopt$inet_tcp_int(r3, 0x6, 0x7, &(0x7f0000001c80), &(0x7f0000001cc0)=0x4) sendmsg$nfc_llcp(r0, &(0x7f0000003200)={&(0x7f0000001d00)={0x27, 0x1, 0x0, 0x2, 0x7fffffff, 0x20, "cbaccfba95e056590439fff74513426f18aaf6dbfb8e68437d126217bff5214054d31364cdfafa27786c2ac5a025ceb72e4f5de5caa145974002701ee43d5f", 0x1a}, 0x60, &(0x7f0000002140)=[{&(0x7f0000001d80)="d5fec6124756cb07ac1ac65fb820c7d3be64", 0x12}, {&(0x7f0000001dc0)="16e2d13cd44293f5b814f4b5ed4de2bb2e13da61bfd37fb62376eb2aeb3becf08817913cbe99d99edf04435b69155d4f3d678690fec8dbfa88d7a1c9ba6b840a50eef4beb1cd568e6c3e4b01be38316af6f2bef4e8568148eb33bde42ce973213be867bc07f4b484f50e74502fa55117707e248151ce11f6d7c1097a2e619d1fd6ea3f6825172e0116d36f36da356a065670708fdfed48b1e3cfb0d2c7bd206dcba63f370b8e8168fc397a10202f849d1dc286a010", 0xb5}, {&(0x7f0000001e80)="d079d84da4c20ad706ca529adec21e7e0043299d637a7cd526ffb5581ede0eb13b93938bab1b31146f6f4778ff818445f94a789a358c1cea7111b08e0b752b0a50b914acbfcb41fa4e09d0ffaf7ab3ed3664bf278a14342eab18fe75bd2a4fad7cc5073e5bddb40eba829f944067c54a9fe3124267e533545f2a1dae78d3758f08bd3e00d2ba1bc7934804c5e1859e5977798b8a6cb6ba82549e1f5e7bea72b0a77ae2b7e69ee4d7b7f1ad8811b805481a5444e79a2added557133e181b8b00139569806aae8d62b385931fa755cf82744ed6a8f7b71e63d96ec4e3582d15e1a09028b094d075073d46e3f", 0xeb}, {&(0x7f0000001f80)="5a4594dc14194146963c08394c7bc1072b41f44ab3f3a169c486828630cb05860eedbd3f053ae90774b45ba5c317e5d1c35ceb2c8bc9af078014ea555ef65d20aa095710c22da44716fa4a55c07c06d28d427ff7565bb6823400b61de16b24ebcc850e8ab80cf2d20db112f900acfb3de2f76a49c7d7e67f3674827e2b6243b7257626e8f0ccdf81ac6b3c0a", 0x8c}, {&(0x7f0000002040)="e1ac5c8aa2533026a44572d7d79f67d8c049c2f81a923cc6e40171929af41f8c413ebf214b37f04ca06bd06426dbf3a00fe02bc59c2fcf05c85913ea92536d5c916e29be057e2f23861b6504e7adf17b5b568f067db1021c07371392beea", 0x5e}, {&(0x7f00000020c0)="5680ffe5b725fbff7b372b8aab0002d95fcb5954044a417e724766926228e418d5457951c14102b567d12570f6546f758c214f699be399f3803404a7088199167ce6aec6b9339b87264a9e9a0ee92f14d2", 0x51}], 0x6, &(0x7f00000021c0)={0x1010, 0x105, 0xed, "e3a6d28ed807e28aeac4b4e2a08a8ccc0a883b8a7cfa07768b3a2052c23dbef1ca82d69cffe6d85ccffdaa147b6594df6e1abce23a94e72a5163545d7438d64a405168610aba739be811951cdb8482de05e327a6a7033c89bd428fb6838765aadd03ca9a7b0dc7510808de507b639aa499402e7523e072c10580ce16e8629b981eefbd5cf0ccda8aadb9d713958a2693d521db0e0dd047e51556db7a90229526c5f0ea5e4c457d84bd37ceca5c9684cbb661abcef98b7024dbb582d0d64ae827eb758a07453c0cebe926552938141a74e0ea60ef99bd395b6bdfa2bc435852780c1f77c677e87045cc6f1eb98e36a17dde913ec1d4195634a582c4bd37edd090ba8d2fdcdcbb63b06d4f8de145c4e87dca3eec666aec2124d08001bd1bec054dd436ca2fd430eea9df4fc1a2d8f209c477d97094dc0521c16443b105b93f7d7ab03176a70fc65d9631d1773fb3d32e346beb5ac071cce718e2ff0be0719c0089b09326a79dfd5ef30bf24346d464f28996aa89d925341ab92416baf1497c0f95e27c3799bfeab759413bf5519514c5df504366e345e199b90b5a25141e750e8575827e66b061006e8a5ac9b2522f896de60eb2e379df824468bfa9616551b6100cf420cc1a317bbdc44786e6f6b13e8836cba050a3740c11b4423940bc8c8176064f131ff418ed5ce28645a7a3f04acdd363af7d4329eb8c4c0383b077786664cf35123da68b3e523420b9f047e2edd36a1a588831e106a52edf96f473a8eccc969f8465b82c2d23d93752272e124175c360571a997014879c6083c649e074a2dbf4bf1e5a9538bd488b8e4fa0c729ac8e830ba501722c5cb03fa8fc99981112db3d7933c85457d1dd97e1ab6afd680b11ec1da2a2a574e92e2c4406849356bd0c6d4788c0fd91e9b6ce2a3656dd5b7daf9e5f722da61509bd96996a896c5e0630b8a4709db97d81cba1760098a05414699d28256aedeabeb019114c3ab7da6771b1a82ef140318a4c470f24c4fff550513a6a44ac8cf2813e935e6e49924a5c78f327911c7dffb9ca8b56cfcae2205698e25e20ef3cfd02b3be01d5c939160fbebec1fcc2c1ada8c31bcee047fb431cc67a030cc817b01a08b6f18f3b3009d949f4219ec43dccefcb8409cf088e1dcdb6f78e1e23f18898037cf3957f818a4e953a26ce0309b5e0f7ba1911fceb5e523419b59338b1cade3f0d48c53d7158e339bd5fe76165239aac3e20eec08216db50c7a4e41fe9782751de55fd98704b3c41db1cf1d3904e5438efce1cf98d57ce977d01238de1bef52d67d4e475d3580caf26456f388b3c47db34d54c3db8a0c9f28b79163d84d15f80d681e79c992904a78f44c522c8e0f6b0f360e5b12d417011fa8ace620bfa55a0073858a1d494d7cd88d3292f64e634bc33e4f3820f719b9fded76c72b5370b14f0a07444d96896d817480f82f0aa875d7c71530453a6fd1e70a23adb440515676d7c3331fd0c4f10e7461d3d44d474618e9de84179b93fa4e945c413d14f813105c4c55c8905231dca168336104d6a1f48239785ca4f5db145b86af7ee9602e47a6b918a62502e8746565c1f7703fffff9fd8fa72b45c3fe924690c8670a517943329496ad4fac7bd52c5c104c0c525fa305830fd9e60f9d98f5b561e718eab4bcb518fd6d2f32c2569b5cb8c69e0780bcb775ac9f7fe68fbbcc47e264e7ec8683306fe54ecb7c076bbe416a9456aef76281ece504a43af0c432e66a96b20e22f4fae47907eb4edd58834acbf3f4b023ca3d8e36fd5244762cfa00cf456da3ca559e6e5fe115a254444f7526ef3702ad8af0381498eed133013cb2fc6cae5ba16ec8ab0bdfba18afc79f937b0ccf525c76914133274e5e8a7b2bf3aa30c51308c0fce67a8cd53133cc7b6142128b1a0d88d48fa87de09e057beb06bf34130029201decd09cda0d1b72417b2ca597591db25ab38dcd7e16a88b521f73cf910bb5f08938bfb1048eb820310bcd9556d6d683133b23b47b06a30af34f4d99e50fcf5338850599277b49c467f9bf17c70fa5ceceb1045cc0634c78e9d40d83a4de14c981f5e60483b9a3eea22dac05fe942ba672f1f1fb2a1c43ab50dd2ae3bca88d4c5f195c3141e5160cb60577b8ebeafef111f371d1d682cbdf7c112c8ae92218f7aeb3628e09016abb9c328b0b8c48d89fa2db2600ab072dcd5a8cfaf74fb8d92e728dd13e9d956178c65f7bdc625f4f01537ad94c4fcc123995019f76616f5995cf3315c7fe1be65ea45b5791648247ecb37ff6ec2875100a38ed177a1e9f0aadfd19681113b9b54e8a6df66abc707c9a742240779af87dbdad1cc032bbfec69ae68cb09a1d8ffdefa98f644844f39952d8cbb179f0a877fde444dc1c1688dc9a4970c528d798d0ba8e29609b030458f2ebbe5054f6d8c1022e5fe75519ab8a11605814548a47aaa3d4094b1182a3d8115829202bc8814cea7f6b95b75778d85d3b089f40a8a6f17007612a37361c4b93d06ef34240de7e0cc218ec8fa3a0a7b30a0e60a10499d9673b34d8cb916aded06d5b52e27598bd37037e9773f812cc090e872af27cb373eb0ec52150a6471a5a1b589276798e5a935f31f62deb845349e5cd81c59b2d25968460f59426853a97230630670c7547e15f73a0c5352ed8e55b13610b8e7cb95f805edd4f7dcb2afae511b156e347baf10187d9a5c55dde45467f01fa8f49bf1c5129298f84187558db19b3fff8a80a29e354bf295b4cb39639535887aa2374f25e275667362310b029f2eda5c7dd14bcc04d5d749b2d2576dfbb5b2a61124b027d5b047eaf365ee5c4ed26936b33d3fcc248d8dc1c3894624a18da24b980a17df54d00eb8d2dfceb985ebc1a464cb1e4c055fa0f47056f8419d6081bbe8aa3e505812fb39f496e75650e6a20055011c33b49b87caaa53360c5535fd59c19875f64af83950823b93efbff83550ec05ec3c938a8def8349479747789d35c909b1198d6eae118e976643c579e5848660ca1a7b0eadeb63f7de94a859539697730e314eb7f2c0e0dcd7ac181130c13bc4914ec7a562d0756fa9c88b7504fec44c081517c643c04145f32bf20cc51c7a282551ef09f8bffdead458bf1e1b21adf06af843be524aca23966152f3f80fcbb2eade076a2750641d00dca9204015f7c2b9e2ab6b719e418c799981f33f522dfd0f81f3e8dbf7d75d044717587432268237c8c27911dd0b68a6c2dfc91cbcc317d86c1d16a177469c7465c5d8794b317063f0e21f0fe149ff75a43692afff3808cd144edd6485f295acece7962f468aff3e6cc865a3a2082b78b89e57f2757e80306cbf966db0de181f4479a402cfbff306624f370defa44c765e868bac9b2da9c5d2984668d81c09d80739cf8a2f121ce48d67f7c7c489410ea449d680ad126ae3462ab5f773fda16db02eb7490bf86a758da0dcbfd7421b015f41a2ec9dd47d71fb247aa4fc1585d44ff41e5687eec3807b51384c6103a76d04bbb58ee2761c0652225011a528488947a773bcefdb61aaf0cbec51f40303cb61f7be8e749196e2c25045c7d77c35d0d19991ac23ee2fc212149ce12d8f3ceac5e247480eb2d9206d04c50ed69834dc4bf86833cef4124dcae1839a13a841af13849034e71c7d4c68d6b958c2b3915d7169e948b113f820a2c496b857fbd0e1ebcf40ccd283cabb62ea5637773b4e501a4640a39a8f866f853cbe5f4080acc1a5204b58778ace4f1bb1e03b7e469c9e13bf083795455bfa2df593805d6f035028eddbdfdf203e409928efc26217bf4d53ea4720423598613e3e641679bf81912db864082511e49719182ebc431089b258d7eee8a5978586ff69c28c33937bd999c9e992dce8b8de0b8a0f23a058e23c056e1f5c2655845d551a1510f2820ff49168e844e8a47cb062a63ebcd753acdc46e6fcad52b099abfa98a406191d6f61d2ee6eae164c1371a12c1d4cdf085385a9d40d78e5ff1dc1742b670fc8fa2ea63f4ff0780f71eee0552508d40e20b92e4833c4b62cb9c66fe7d45857aa4f2d3adf64994b66ae238a248b909e9fb50027f9444372f364bb938ddbfc2342efe2112fd362fd66b257e27cabde3595ed0502978d998699f7eebf212ac1d1756dbc30d4a65ef77f9e027048fb6a2972f30be047cf1d226ade5e9b090edc91da8d8077ebbbeccc9ec265f510d4ac14f491ded60ac1cb23c8282846e650161e509f96d838d4747a164f6d682f45d2aa983d6b8303695408a4e9cd36460341c3bcf1679685dbfebc7e8148ca780b01990ea3ffc02358a1e43d4329fa513f5605fee2650c2de9c39a81c02294d0753d902b9ee1bf55e134e69ce9dc9ed2e9687e50766568416f52efef02057ff3c43d0c281183764da2fcd043712cdfbc3186fce701ec1b2606c23947c39c98c03d9c2fc3d0200ed47110bd399660359ec16cce1dccafc60a408c4235dc85289842eac2cb77bc2e09981731f1890012d40045e1dde78c288727b280a307344785ea73848516bb3d9abdef001b67ceb544efb3b21553d4f7bf888bffb63599c1755f4653cd28ddaace3c5f774c2521fb31df33ec95915373f6462a32be86673408d68b8454ed3daa87411c09cf62498b6db2c620099b9d8470ef493338d32a665f25d5a3eb7c4ecb70cd0c30f206e28708ec218b5890351d788750c6f621ea33128ffba9167894bdd40cd27922175711fea2f1612397688b794f8411df45c7d818e21d18c732b27ad650bb7945736f5a8a18d53f8e380614df25e7e584b0318f75eaee5e4093ee230222b414e9d17f97216433a53d3331f2ed432f36f94d081161ac0e4bc66142599a07b9724153ae0943ff42a3ccea2deb7e0a0026a3d0795547dce444129715d45c5bddef3a79772c2bde321dc3b2519aa2340955be3ee1e340e57e4377157bde3bf30b8f6461c9179d71728933af3a0d7e3139c6399417aea71004c9d9aa93faf19fdcb42a9d45885ecaa800f2112e0240d6488b97d1e29276c7ec4913158bd5539e01a401977e33653bc7a0316bf43a776d89aaf3680c036ba4f1161d27664fef33bb28ff1e78d09328ae4c48ad40dd924886e8b88f8f7657c14d99ae9f2a6be4cd4838fb9c8c0ddb5aa5ca0a3ed93856c51d3a0a9e3de7659ba1e3d38df8297d711a2538aeba82cedbf0ed40a5900c1cd5bd35e51c76400c6f046f442ee297e42229bc10d5dbeafaca2a6eb23bd993b8fcf7a87446c391cd810b7ac550607b9e7ada53a7d0b02596dec9db55feb24bdb2e9525a2c7024759b80e05fdf3c1361bb2e132fc2e7480b4bda38c0026eb761ec845315bf98a515a78443e00ffdd43a595632b4f39b6ebbeecf1e2b155c32b12b4107fcb5ee4db62d24f3d27ad4ec8c03fe663f3568737723a7a019cf81d4b5ddf8dc7e99b58e382bb8f94d91f06c266d6e4d5c025533dd29f9196a7709b6c86097669af565271a71ebd03397657d82eae52465b021aed392df157353c23ab5b2df0811c2602eb33b10e914658fa49f552f60f30fd2536c387170a84089b60b0ce48104712e1cd12ca850755e5637418ef4eef4d3c2e64f30dc037f6acaa6bd76833f901d8adf4cd07e2f1a174b6afe474664d1be3915daa92b099a2cb753fa176505f13d9502610853d0a6f3421b46e9f438f07126e23ab9d6d3b393ff6be793ae9ea8ff43fd63cc2f979fd5270758dd83a868509f2de50ad2c11282eeb4b4db5cc170bc89efeb8a3310479d73a2f86f0935ae9328b00b9a4f012ff8947e0fcc995a492e549c81ce07df12718c6594e696ef229a2a"}, 0x1010, 0x4}, 0x840) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000003280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f00000033c0)={&(0x7f0000003240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003380)={&(0x7f00000032c0)={0xa4, r4, 0x922, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2c2}, @IPVS_CMD_ATTR_SERVICE={0x80, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x8}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x22}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x9}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@mcast1}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}]}, 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0x8094) r5 = getpgid(0xffffffffffffffff) r6 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r5, r6, 0x7, r2, &(0x7f0000003400)={r0, r0, 0x1}) write$USERIO_CMD_REGISTER(r3, &(0x7f0000003440)={0x0, 0x7fff}, 0x2) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000003480)={0x1, 0x6, [@broadcast, @empty, @dev={[], 0xd}, @random="e87032c13054", @local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}]}) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f00000034c0)=0x2) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000003500)={'vxcan1\x00', 0x200}) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000003540)=0x9) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000003580)={0x6, 0x4}) ioctl$KVM_ENABLE_CAP(r3, 0x4068aea3, &(0x7f00000035c0)={0x81, 0x0, [0x6, 0x5, 0x7fff, 0x4]}) ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f0000003680)={0x4, &(0x7f0000003640)=[{0x2, 0x7, 0x48}, {0x8, 0x1, 0x0, 0x80000001}, {0x1, 0x9ee, 0x8, 0x7ff}, {0x8, 0xff4b, 0x2, 0x4}]}) setsockopt$IP_VS_SO_SET_STOPDAEMON(r3, 0x0, 0x48c, &(0x7f00000036c0)={0x3, 'rose0\x00', 0x3}, 0x18) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000003700)) ioctl$GIO_CMAP(r3, 0x4b70, &(0x7f0000003740)) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000003780)=0x1) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r2, 0xc0305616, &(0x7f00000037c0)={0x0, {0x9, 0x8}}) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000003800)=r5) 12:56:08 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:08 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:08 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 12:56:08 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 185.750131] protocol 88fb is buggy, dev hsr_slave_0 [ 185.755286] protocol 88fb is buggy, dev hsr_slave_1 [ 186.070193] protocol 88fb is buggy, dev hsr_slave_0 [ 186.070197] protocol 88fb is buggy, dev hsr_slave_0 [ 186.070243] protocol 88fb is buggy, dev hsr_slave_1 [ 186.075315] protocol 88fb is buggy, dev hsr_slave_1 12:56:09 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000300)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r1, 0x21, 0x70bd28, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x8]}]}, 0x1c}, 0x1, 0x0, 0x0, 0xc044}, 0x11) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, r2, 0x80a, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}, @TIPC_NLA_BEARER={0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x20000004) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@allocspi={0xf8, 0x16, 0x31d, 0x0, 0x0, {{{@in6, @in6=@ipv4={[], [], @multicast2}}, {@in6}}}}, 0xf8}}, 0x0) 12:56:09 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:09 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:09 executing program 3: semctl$GETPID(0x0, 0x0, 0xb, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f00000000c0)) r1 = socket(0xa, 0x2400000001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000100)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0xfffffffffffffd6e) getsockopt$inet6_buf(r1, 0x29, 0x10000000000030, &(0x7f0000034000)=""/144, &(0x7f0000e5f000)=0x90) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, &(0x7f0000000040)) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, 0x0, 0x44800) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) semget$private(0x0, 0x0, 0x204) 12:56:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 12:56:09 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x101000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2902000}, 0xc, &(0x7f0000000440)={&(0x7f0000000180)={0x294, r2, 0x121, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_BEARER={0xe8, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x2, @empty, 0xe14a}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @rand_addr=0x8}}, {0x14, 0x2, @in={0x2, 0x4e21, @remote}}}}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x21}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}]}, @TIPC_NLA_MEDIA={0x1c, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_LINK={0xe0, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x38}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc824}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1a1}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}]}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x48, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x100}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x400}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x294}, 0x1, 0x0, 0x0, 0x800}, 0x8040) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-pclmul\x00'}, 0x58) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f00000004c0), &(0x7f0000000500)=0x40) r3 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r3, &(0x7f0000003e80)=[{0xf0ff7f, 0x0, &(0x7f0000002a80), 0x261, &(0x7f0000000080)=[@op={0x18, 0x117, 0x2}], 0x18}], 0x4924944, 0x0) 12:56:09 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 12:56:09 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) write$input_event(r0, &(0x7f0000000240)={{0x77359400}, 0x17, 0x7fff, 0x5}, 0x18) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000300)={'nat\x00'}, &(0x7f0000000380)=0x78) ioctl$TCGETA(r2, 0x5405, &(0x7f00000003c0)) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) r3 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0xa) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000440)=0x1) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000480)={0x20, 0x4, 0x7}, 0x8) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) r4 = getpid() waitid(0x1, r4, 0x0, 0x40000008, &(0x7f00000004c0)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000580)={0x0}, &(0x7f00000005c0)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000600)={0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x794, 0x101}, &(0x7f00000006c0)=0x90) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000700)={r6, 0x8, 0x8, 0x1, 0x20, 0x7ff}, 0x14) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f0000000740)={0x1, 0x3, {0x3, 0x3, 0x7, 0x3, 0xffffffffffffff00}}) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f00000007c0)={0x0, 0x0, {0x0, 0x2ee, 0x1016, 0x7, 0x0, 0x6, 0x2, 0x7}}) tee(r1, r0, 0x2, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000840)=0x2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000880)={0x6, 0x3, 0xb99, 'queue0\x00', 0x6}) waitid(0x3, r5, &(0x7f0000000940), 0x80000004, &(0x7f00000009c0)) close(r2) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000a80)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) 12:56:09 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:09 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 12:56:09 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:09 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:09 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) write$input_event(r0, &(0x7f0000000240)={{0x77359400}, 0x17, 0x7fff, 0x5}, 0x18) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000300)={'nat\x00'}, &(0x7f0000000380)=0x78) ioctl$TCGETA(r2, 0x5405, &(0x7f00000003c0)) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) r3 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0xa) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000440)=0x1) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000480)={0x20, 0x4, 0x7}, 0x8) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) r4 = getpid() waitid(0x1, r4, 0x0, 0x40000008, &(0x7f00000004c0)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000580)={0x0}, &(0x7f00000005c0)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000600)={0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x794, 0x101}, &(0x7f00000006c0)=0x90) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000700)={r6, 0x8, 0x8, 0x1, 0x20, 0x7ff}, 0x14) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f0000000740)={0x1, 0x3, {0x3, 0x3, 0x7, 0x3, 0xffffffffffffff00}}) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f00000007c0)={0x0, 0x0, {0x0, 0x2ee, 0x1016, 0x7, 0x0, 0x6, 0x2, 0x7}}) tee(r1, r0, 0x2, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000840)=0x2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000880)={0x6, 0x3, 0xb99, 'queue0\x00', 0x6}) waitid(0x3, r5, &(0x7f0000000940), 0x80000004, &(0x7f00000009c0)) close(r2) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000a80)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) 12:56:09 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:09 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 12:56:09 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:09 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) write$input_event(r0, &(0x7f0000000240)={{0x77359400}, 0x17, 0x7fff, 0x5}, 0x18) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000300)={'nat\x00'}, &(0x7f0000000380)=0x78) ioctl$TCGETA(r2, 0x5405, &(0x7f00000003c0)) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) r3 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0xa) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000440)=0x1) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000480)={0x20, 0x4, 0x7}, 0x8) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) r4 = getpid() waitid(0x1, r4, 0x0, 0x40000008, &(0x7f00000004c0)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000580)={0x0}, &(0x7f00000005c0)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000600)={0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x794, 0x101}, &(0x7f00000006c0)=0x90) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000700)={r6, 0x8, 0x8, 0x1, 0x20, 0x7ff}, 0x14) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f0000000740)={0x1, 0x3, {0x3, 0x3, 0x7, 0x3, 0xffffffffffffff00}}) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f00000007c0)={0x0, 0x0, {0x0, 0x2ee, 0x1016, 0x7, 0x0, 0x6, 0x2, 0x7}}) tee(r1, r0, 0x2, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000840)=0x2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000880)={0x6, 0x3, 0xb99, 'queue0\x00', 0x6}) waitid(0x3, r5, &(0x7f0000000940), 0x80000004, &(0x7f00000009c0)) close(r2) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000a80)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) 12:56:09 executing program 3: r0 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) fallocate(r0, 0x3, 0x0, 0x8004) 12:56:09 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:09 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:09 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:09 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 12:56:09 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:09 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:10 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) write$input_event(r0, &(0x7f0000000240)={{0x77359400}, 0x17, 0x7fff, 0x5}, 0x18) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000300)={'nat\x00'}, &(0x7f0000000380)=0x78) ioctl$TCGETA(r2, 0x5405, &(0x7f00000003c0)) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) r3 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0xa) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000440)=0x1) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000480)={0x20, 0x4, 0x7}, 0x8) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) r4 = getpid() waitid(0x1, r4, 0x0, 0x40000008, &(0x7f00000004c0)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000580)={0x0}, &(0x7f00000005c0)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000600)={0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x794, 0x101}, &(0x7f00000006c0)=0x90) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000700)={r6, 0x8, 0x8, 0x1, 0x20, 0x7ff}, 0x14) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f0000000740)={0x1, 0x3, {0x3, 0x3, 0x7, 0x3, 0xffffffffffffff00}}) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f00000007c0)={0x0, 0x0, {0x0, 0x2ee, 0x1016, 0x7, 0x0, 0x6, 0x2, 0x7}}) tee(r1, r0, 0x2, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000840)=0x2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000880)={0x6, 0x3, 0xb99, 'queue0\x00', 0x6}) waitid(0x3, r5, &(0x7f0000000940), 0x80000004, &(0x7f00000009c0)) close(r2) setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f0000000a80)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) 12:56:10 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:10 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:10 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) write$input_event(r0, &(0x7f0000000240)={{0x77359400}, 0x17, 0x7fff, 0x5}, 0x18) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000300)={'nat\x00'}, &(0x7f0000000380)=0x78) ioctl$TCGETA(r2, 0x5405, &(0x7f00000003c0)) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) r3 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0xa) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000440)=0x1) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000480)={0x20, 0x4, 0x7}, 0x8) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) r4 = getpid() waitid(0x1, r4, 0x0, 0x40000008, &(0x7f00000004c0)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000580)={0x0}, &(0x7f00000005c0)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000600)={0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x794, 0x101}, &(0x7f00000006c0)=0x90) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000700)={r6, 0x8, 0x8, 0x1, 0x20, 0x7ff}, 0x14) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f0000000740)={0x1, 0x3, {0x3, 0x3, 0x7, 0x3, 0xffffffffffffff00}}) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f00000007c0)={0x0, 0x0, {0x0, 0x2ee, 0x1016, 0x7, 0x0, 0x6, 0x2, 0x7}}) tee(r1, r0, 0x2, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000840)=0x2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000880)={0x6, 0x3, 0xb99, 'queue0\x00', 0x6}) waitid(0x3, r5, &(0x7f0000000940), 0x80000004, &(0x7f00000009c0)) close(r2) 12:56:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 12:56:10 executing program 3: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x0, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x101, 0x0, 0x0, 0xe44e}, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, &(0x7f00000001c0)={0x0, 0x7f77775d, 0x3, @stepwise={0x3924, 0x6, 0x2, 0x0, 0x5}}) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000a00)={r0, @in={{0x2, 0x4e21, @multicast2}}}, 0x84) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000880)='./file0\x00', 0x0, &(0x7f0000000900)='system_u:object_r:auditctl_exec_t:s0\x00', 0x25, 0x0) r2 = getpgrp(0x0) mkdirat(r1, 0x0, 0x9) setpriority(0x0, r2, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) syz_mount_image$nfs(&(0x7f0000000040)='nfs\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0x3, &(0x7f0000000540)=[{&(0x7f00000002c0)="d55a1c8078b826a8c5096a503c4b26319d66ab1fb14859fb2bbc88695e39b85ff734b6a5c7cfdb8c0d8d87530e883456384b6d84146b0029b4218e5b9b51ea6ea2ee5bbf45cd8a694d4f41d8fe7df8616a4d5a44987f1eb32a015080c0bb24e140567cc119e866c2b6204f45e8633b90982789c8c6089f398b", 0x79, 0x10000}, {&(0x7f0000000380)="ffc2bc23ae009c0af04e386a3ca49ee3203db95ccf8659f2b70bb67bd99981ef8344fac22ba38ebf6baf02638c958ca8009adac348f80107ea138ab3547f61fe33edf04a2e905fe316902c1ee00caf9384840dff6450179804d9724426b366095b6a2e66c76cbe558742fb8992545dee9209481dc0", 0x75, 0x769}, {&(0x7f0000000680)="e69bb65d3f2dabc554273c8b8ca310449b1e58fc86f75ffcb341ece0b4d2e14884020d2619595ab0b941c2e7c83fb3d01555d876d4e8f82b37aa34bcffbb5f256779acd62b4119364b587041a825a071be450a3b448bb95471da29a7196db6669f745bb3d3e7b3aa82016fc0847d6bce2aa5fe9c6e717e356d367df1b361b374904d12a7d6f77f6718785dc96644bfbc35880d06bdbf6987c2f18ae325c1607b42b89e64418d06b1cfdb4d6c15b6f5cf6667c8f04b1646484b3a04aff5", 0xbd, 0x5}], 0x80, &(0x7f00000000c0)='!\x00') setxattr$security_capability(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000500)=@v3={0x3000000, [{0x0, 0x4}, {0x0, 0x2}]}, 0x18, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000005c0)=[&(0x7f0000000140)='\x00', 0x0, &(0x7f00000004c0)='\x00'], &(0x7f0000000100)=[0x0, &(0x7f0000000640)='!\x00']) syz_emit_ethernet(0x3e, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x8, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) capset(&(0x7f00000007c0)={0x19980330}, 0x0) 12:56:10 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:10 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:10 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:10 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) write$input_event(r0, &(0x7f0000000240)={{0x77359400}, 0x17, 0x7fff, 0x5}, 0x18) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000300)={'nat\x00'}, &(0x7f0000000380)=0x78) ioctl$TCGETA(r2, 0x5405, &(0x7f00000003c0)) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) r3 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0xa) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000440)=0x1) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000480)={0x20, 0x4, 0x7}, 0x8) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) r4 = getpid() waitid(0x1, r4, 0x0, 0x40000008, &(0x7f00000004c0)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000580)={0x0}, &(0x7f00000005c0)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000600)={0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x794, 0x101}, &(0x7f00000006c0)=0x90) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000700)={r6, 0x8, 0x8, 0x1, 0x20, 0x7ff}, 0x14) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f0000000740)={0x1, 0x3, {0x3, 0x3, 0x7, 0x3, 0xffffffffffffff00}}) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f00000007c0)={0x0, 0x0, {0x0, 0x2ee, 0x1016, 0x7, 0x0, 0x6, 0x2, 0x7}}) tee(r1, r0, 0x2, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000840)=0x2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000880)={0x6, 0x3, 0xb99, 'queue0\x00', 0x6}) waitid(0x3, r5, &(0x7f0000000940), 0x80000004, &(0x7f00000009c0)) 12:56:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 12:56:10 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:10 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:10 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 187.375729] capability: warning: `syz-executor.3' uses 32-bit capabilities (legacy support in use) 12:56:10 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) write$input_event(r0, &(0x7f0000000240)={{0x77359400}, 0x17, 0x7fff, 0x5}, 0x18) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000300)={'nat\x00'}, &(0x7f0000000380)=0x78) ioctl$TCGETA(r2, 0x5405, &(0x7f00000003c0)) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) r3 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0xa) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000440)=0x1) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000480)={0x20, 0x4, 0x7}, 0x8) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) r4 = getpid() waitid(0x1, r4, 0x0, 0x40000008, &(0x7f00000004c0)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000600)={0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x794, 0x101}, &(0x7f00000006c0)=0x90) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000700)={r5, 0x8, 0x8, 0x1, 0x20, 0x7ff}, 0x14) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f0000000740)={0x1, 0x3, {0x3, 0x3, 0x7, 0x3, 0xffffffffffffff00}}) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f00000007c0)={0x0, 0x0, {0x0, 0x2ee, 0x1016, 0x7, 0x0, 0x6, 0x2, 0x7}}) tee(r1, r0, 0x2, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000840)=0x2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000880)={0x6, 0x3, 0xb99, 'queue0\x00', 0x6}) 12:56:10 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:10 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 12:56:10 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'yam0\x00', {0x2, 0x4e23, @empty}}) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x30, r1, 0x805, 0x0, 0x25dfdbff, {{0x1, 0xffffffea}, 0x5, 0x7fec, 0x0, {0x14, 0x19, {0x0, 0x9}}}}, 0x30}}, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0xffffffffffffff01, 0x0) bind$llc(r2, &(0x7f00000000c0)={0x1a, 0x0, 0x9, 0x100000001, 0x41, 0x1, @random="d0d8317c32d3"}, 0x10) 12:56:10 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:10 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:10 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) write$input_event(r0, &(0x7f0000000240)={{0x77359400}, 0x17, 0x7fff, 0x5}, 0x18) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000300)={'nat\x00'}, &(0x7f0000000380)=0x78) ioctl$TCGETA(r2, 0x5405, &(0x7f00000003c0)) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) r3 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0xa) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000440)=0x1) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000480)={0x20, 0x4, 0x7}, 0x8) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) r4 = getpid() waitid(0x1, r4, 0x0, 0x40000008, &(0x7f00000004c0)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000600)={0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x794, 0x101}, &(0x7f00000006c0)=0x90) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000700)={r5, 0x8, 0x8, 0x1, 0x20, 0x7ff}, 0x14) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f0000000740)={0x1, 0x3, {0x3, 0x3, 0x7, 0x3, 0xffffffffffffff00}}) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f00000007c0)={0x0, 0x0, {0x0, 0x2ee, 0x1016, 0x7, 0x0, 0x6, 0x2, 0x7}}) tee(r1, r0, 0x2, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000840)=0x2) 12:56:10 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:10 executing program 3: sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x40) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000000)=0x6, 0x2) syz_init_net_socket$ax25(0x3, 0x0, 0x0) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, 0x0) r1 = semget(0x0, 0x5, 0x4a) semctl$GETALL(r1, 0x0, 0xd, &(0x7f0000000140)=""/90) ftruncate(r0, 0x208200) r2 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002012, r2, 0x0) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) open$dir(0x0, 0x0, 0x0) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f00000000c0)={'vcan0\x00', 0x1f5}) 12:56:10 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 187.619191] audit: type=1400 audit(1562504170.578:83): avc: denied { ioctl } for pid=10378 comm="syz-executor.3" path="socket:[35692]" dev="sockfs" ino=35692 ioctlcmd=0x8916 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 12:56:10 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:10 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) write$input_event(r0, &(0x7f0000000240)={{0x77359400}, 0x17, 0x7fff, 0x5}, 0x18) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000300)={'nat\x00'}, &(0x7f0000000380)=0x78) ioctl$TCGETA(r2, 0x5405, &(0x7f00000003c0)) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) r3 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0xa) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000440)=0x1) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000480)={0x20, 0x4, 0x7}, 0x8) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) r4 = getpid() waitid(0x1, r4, 0x0, 0x40000008, &(0x7f00000004c0)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000600)={0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x794, 0x101}, &(0x7f00000006c0)=0x90) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000700)={r5, 0x8, 0x8, 0x1, 0x20, 0x7ff}, 0x14) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f0000000740)={0x1, 0x3, {0x3, 0x3, 0x7, 0x3, 0xffffffffffffff00}}) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f00000007c0)={0x0, 0x0, {0x0, 0x2ee, 0x1016, 0x7, 0x0, 0x6, 0x2, 0x7}}) tee(r1, r0, 0x2, 0x0) 12:56:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, 0x0) 12:56:10 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:10 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) write$input_event(r0, &(0x7f0000000240)={{0x77359400}, 0x17, 0x7fff, 0x5}, 0x18) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000300)={'nat\x00'}, &(0x7f0000000380)=0x78) ioctl$TCGETA(r1, 0x5405, &(0x7f00000003c0)) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) r2 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0xa) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000440)=0x1) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000480)={0x20, 0x4, 0x7}, 0x8) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) r3 = getpid() waitid(0x1, r3, 0x0, 0x40000008, &(0x7f00000004c0)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000600)={0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x794, 0x101}, &(0x7f00000006c0)=0x90) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000700)={r4, 0x8, 0x8, 0x1, 0x20, 0x7ff}, 0x14) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000740)={0x1, 0x3, {0x3, 0x3, 0x7, 0x3, 0xffffffffffffff00}}) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f00000007c0)={0x0, 0x0, {0x0, 0x2ee, 0x1016, 0x7, 0x0, 0x6, 0x2, 0x7}}) 12:56:10 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:10 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:10 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) write$input_event(r0, &(0x7f0000000240)={{0x77359400}, 0x17, 0x7fff, 0x5}, 0x18) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000300)={'nat\x00'}, &(0x7f0000000380)=0x78) ioctl$TCGETA(r1, 0x5405, &(0x7f00000003c0)) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) r2 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0xa) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000440)=0x1) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000480)={0x20, 0x4, 0x7}, 0x8) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) r3 = getpid() waitid(0x1, r3, 0x0, 0x40000008, &(0x7f00000004c0)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000600)={0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x794, 0x101}, &(0x7f00000006c0)=0x90) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000700)={r4, 0x8, 0x8, 0x1, 0x20, 0x7ff}, 0x14) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000740)={0x1, 0x3, {0x3, 0x3, 0x7, 0x3, 0xffffffffffffff00}}) 12:56:11 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 187.980690] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 756082810144684242 /dev/loop1 [ 187.984180] audit: type=1804 audit(1562504170.728:84): pid=10399 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir349426129/syzkaller.sw0lzm/110/bus" dev="sda1" ino=16910 res=1 12:56:11 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 188.177289] audit: type=1804 audit(1562504170.998:85): pid=10399 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir349426129/syzkaller.sw0lzm/110/bus" dev="sda1" ino=16910 res=1 12:56:11 executing program 3: r0 = socket$inet(0x2, 0x0, 0x5) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000140)={'ip6gre0\x00', 0xf66a000000000000}) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x80000003, 0x8031, 0xffffffffffffffff, 0x0) clone(0x40100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000400)=ANY=[@ANYBLOB="0202200313000000000000000000000005000600571866720a000068c3b29e359eed6d00200000005500000000000000000000000000000005000900df0000002a00002000000000fe8000000000000007000000000000ff00000000000000000200010000ffff000000050d0000000005000500eb0000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000510000/0x2000)=nil) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f00000004c0)={0x8, "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", 0x1000}, 0x1006) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000001c0)={0x1f, 0x204, 0x1f, 0x0, 0x0}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000240)={0x1, 0x2, 0x1, 0xffffffffffffffff, r3}, &(0x7f0000000280)=0x10) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000100)='./file0\x00', r4}, 0x1ec) personality(0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000300)='y\x00', 0x2, 0x2) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x8000, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f00000000c0)=@gcm_128={{}, "48d5f14a6eac8816", "567cb34845911b7694920200bdb726bc", "ff289f90", "365310d703b7e67e"}, 0x28) ioctl$ASHMEM_GET_PROT_MASK(0xffffffffffffffff, 0x7706, &(0x7f0000000000)) ioctl$TIOCMIWAIT(r4, 0x545c, 0x0) 12:56:11 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:11 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:11 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) write$input_event(r0, &(0x7f0000000240)={{0x77359400}, 0x17, 0x7fff, 0x5}, 0x18) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000300)={'nat\x00'}, &(0x7f0000000380)=0x78) ioctl$TCGETA(r1, 0x5405, &(0x7f00000003c0)) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) r2 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0xa) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000440)=0x1) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000480)={0x20, 0x4, 0x7}, 0x8) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) r3 = getpid() waitid(0x1, r3, 0x0, 0x40000008, &(0x7f00000004c0)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000600)={0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x794, 0x101}, &(0x7f00000006c0)=0x90) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000700)={r4, 0x8, 0x8, 0x1, 0x20, 0x7ff}, 0x14) [ 188.204573] audit: type=1804 audit(1562504170.998:86): pid=10399 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir349426129/syzkaller.sw0lzm/110/bus" dev="sda1" ino=16910 res=1 12:56:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 12:56:11 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:11 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:11 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) write$input_event(r0, &(0x7f0000000240)={{0x77359400}, 0x17, 0x7fff, 0x5}, 0x18) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000300)={'nat\x00'}, &(0x7f0000000380)=0x78) ioctl$TCGETA(r1, 0x5405, &(0x7f00000003c0)) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) r2 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0xa) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000440)=0x1) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000480)={0x20, 0x4, 0x7}, 0x8) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) r3 = getpid() waitid(0x1, r3, 0x0, 0x40000008, &(0x7f00000004c0)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000600)={0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x794, 0x101}, &(0x7f00000006c0)=0x90) 12:56:11 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:11 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:11 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) write$input_event(r0, &(0x7f0000000240)={{0x77359400}, 0x17, 0x7fff, 0x5}, 0x18) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000300)={'nat\x00'}, &(0x7f0000000380)=0x78) ioctl$TCGETA(r1, 0x5405, &(0x7f00000003c0)) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) r2 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0xa) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000440)=0x1) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000480)={0x20, 0x4, 0x7}, 0x8) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) r3 = getpid() waitid(0x1, r3, 0x0, 0x40000008, &(0x7f00000004c0)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) 12:56:11 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, 0x0) 12:56:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 12:56:11 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:11 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:11 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:11 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) write$input_event(r0, &(0x7f0000000240)={{0x77359400}, 0x17, 0x7fff, 0x5}, 0x18) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000300)={'nat\x00'}, &(0x7f0000000380)=0x78) ioctl$TCGETA(r1, 0x5405, &(0x7f00000003c0)) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) r2 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0xa) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000440)=0x1) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000480)={0x20, 0x4, 0x7}, 0x8) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) r3 = getpid() waitid(0x1, r3, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:11 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:11 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) write$input_event(r0, &(0x7f0000000240)={{0x77359400}, 0x17, 0x7fff, 0x5}, 0x18) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000300)={'nat\x00'}, &(0x7f0000000380)=0x78) ioctl$TCGETA(r1, 0x5405, &(0x7f00000003c0)) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) r2 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0xa) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000440)=0x1) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000480)={0x20, 0x4, 0x7}, 0x8) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:11 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:11 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 12:56:11 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918", 0x65, 0x10000}], 0x0, 0x0) 12:56:11 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) write$input_event(r0, &(0x7f0000000240)={{0x77359400}, 0x17, 0x7fff, 0x5}, 0x18) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000300)={'nat\x00'}, &(0x7f0000000380)=0x78) ioctl$TCGETA(r1, 0x5405, &(0x7f00000003c0)) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) r2 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0xa) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000440)=0x1) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000480)={0x20, 0x4, 0x7}, 0x8) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:11 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:11 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:12 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:12 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) write$input_event(r0, &(0x7f0000000240)={{0x77359400}, 0x17, 0x7fff, 0x5}, 0x18) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000300)={'nat\x00'}, &(0x7f0000000380)=0x78) ioctl$TCGETA(r1, 0x5405, &(0x7f00000003c0)) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) r2 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0xa) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000440)=0x1) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000480)={0x20, 0x4, 0x7}, 0x8) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") setsockopt$inet_buf(r0, 0x0, 0x9, &(0x7f0000000140)="4efd032b63d41b48407eb50a99e9e73e23ed38208d68fae122ad111e5aeff66921fdcac21bdb4933832843074765928eda23bbff58649278d50e09b05e7dd5c70467d44dc7774c6848c221a635afbd38be6ca811139ba57be454eac1646633f5726cd879f26085b79a232a5f7f85896888f0fbf5ae2f1b8d0ca4cb161159a1501befb9243717901cbe", 0x89) syz_emit_ethernet(0x56, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000008004a0000480000000000009078ac1414bbac1e00000710060000000000e00000010000000089030000000000000000000000000000000000000000000000000000000000000000000072917f502eb30136968e349e403f8d5e7807b07395741f82f72e01aac47947f3f13ed9f182ef7d9e3ce7392d40be97816e8dd120989ee6f5e99e236da49a674fc9dc4a20769abd25e6136792c8abb2da4339e938850d8708529b995802faac11b253ea326989ca2959b299903e2cf269991a594d1007c924"], 0x0) 12:56:12 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 12:56:12 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:12 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:12 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) write$input_event(r0, &(0x7f0000000240)={{0x77359400}, 0x17, 0x7fff, 0x5}, 0x18) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000300)={'nat\x00'}, &(0x7f0000000380)=0x78) ioctl$TCGETA(r1, 0x5405, &(0x7f00000003c0)) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) r2 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0xa) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000440)=0x1) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000480)={0x20, 0x4, 0x7}, 0x8) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) r3 = getpid() waitid(0x1, r3, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:12 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, 0x0, 0x0) unshare(0x40401fc) fcntl$getown(0xffffffffffffffff, 0x9) syz_genetlink_get_family_id$tipc(0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x90}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, r1, 0x4, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffffffff}, @IPVS_CMD_ATTR_DEST={0x18, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x50}, 0x4000051) sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 12:56:12 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 12:56:12 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:12 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:12 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:12 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) write$input_event(r0, &(0x7f0000000240)={{0x77359400}, 0x17, 0x7fff, 0x5}, 0x18) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000300)={'nat\x00'}, &(0x7f0000000380)=0x78) ioctl$TCGETA(r1, 0x5405, &(0x7f00000003c0)) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) r2 = open(&(0x7f0000000400)='./file0\x00', 0x0, 0xa) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000440)=0x1) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000480)={0x20, 0x4, 0x7}, 0x8) r3 = getpid() waitid(0x1, r3, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:12 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:12 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:12 executing program 3: time(&(0x7f0000000000)) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x6) socket$pppoe(0x18, 0x1, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x400, 0x0) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000100)=ANY=[]) 12:56:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 12:56:12 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) write$input_event(r0, &(0x7f0000000240)={{0x77359400}, 0x17, 0x7fff, 0x5}, 0x18) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000300)={'nat\x00'}, &(0x7f0000000380)=0x78) ioctl$TCGETA(r1, 0x5405, &(0x7f00000003c0)) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) open(&(0x7f0000000400)='./file0\x00', 0x0, 0xa) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000440)=0x1) r2 = getpid() waitid(0x1, r2, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:12 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:12 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:12 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:12 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000080)={0x7, {{0x2, 0x0, @multicast1}}}, 0x108) bind$inet(r0, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0x2a, &(0x7f00003f3fd5)=ANY=[@ANYBLOB="fb4b437ca3bbaaaaaaaaaabb785ce7738931265700000011907800000002e000000107374e2300089078"], 0x0) 12:56:12 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:12 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) write$input_event(r0, &(0x7f0000000240)={{0x77359400}, 0x17, 0x7fff, 0x5}, 0x18) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000300)={'nat\x00'}, &(0x7f0000000380)=0x78) ioctl$TCGETA(r1, 0x5405, &(0x7f00000003c0)) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) open(&(0x7f0000000400)='./file0\x00', 0x0, 0xa) r2 = getpid() waitid(0x1, r2, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:12 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f87357", 0x4c, 0x10000}], 0x0, 0x0) 12:56:12 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r1, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r1, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r1, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x3a9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000000e40)=[{{0x0, 0x4, 0x0}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f00000023c0)=""/4096, 0xfe19}], 0x1}}], 0x2, 0x0, 0x0) 12:56:12 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:12 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) write$input_event(r0, &(0x7f0000000240)={{0x77359400}, 0x17, 0x7fff, 0x5}, 0x18) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000300)={'nat\x00'}, &(0x7f0000000380)=0x78) ioctl$TCGETA(r1, 0x5405, &(0x7f00000003c0)) ioctl$DRM_IOCTL_AGP_ACQUIRE(r1, 0x6430) r2 = getpid() waitid(0x1, r2, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:12 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:12 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:12 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:12 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) write$input_event(r0, &(0x7f0000000240)={{0x77359400}, 0x17, 0x7fff, 0x5}, 0x18) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000300)={'nat\x00'}, &(0x7f0000000380)=0x78) ioctl$TCGETA(r1, 0x5405, &(0x7f00000003c0)) r2 = getpid() waitid(0x1, r2, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 12:56:12 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:12 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:12 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 189.990145] net_ratelimit: 17 callbacks suppressed [ 189.990151] protocol 88fb is buggy, dev hsr_slave_0 [ 190.000203] protocol 88fb is buggy, dev hsr_slave_1 12:56:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'generic-gcm-aesni\x00'}, 0x58) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x3c, &(0x7f0000000040)=0x6, 0x4) setsockopt$sock_int(r1, 0x1, 0x25, &(0x7f00000000c0)=0xfff, 0x4) setsockopt$inet6_int(r1, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) sendmmsg(r1, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x0) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x3a9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r2, &(0x7f0000000e40)=[{{0x0, 0x4, 0x0}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f00000023c0)=""/4096, 0xfe19}], 0x1}}], 0x2, 0x0, 0x0) 12:56:13 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) write$input_event(r0, &(0x7f0000000240)={{0x77359400}, 0x17, 0x7fff, 0x5}, 0x18) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000002c0)) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000300)={'nat\x00'}, &(0x7f0000000380)=0x78) r1 = getpid() waitid(0x1, r1, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:13 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 12:56:13 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:13 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:13 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:13 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) write$input_event(r0, &(0x7f0000000240)={{0x77359400}, 0x17, 0x7fff, 0x5}, 0x18) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000002c0)) r1 = getpid() waitid(0x1, r1, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:13 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 190.230120] protocol 88fb is buggy, dev hsr_slave_0 [ 190.230156] protocol 88fb is buggy, dev hsr_slave_1 [ 190.235286] protocol 88fb is buggy, dev hsr_slave_1 12:56:13 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001", 0x33, 0x10000}], 0x0, 0x0) 12:56:13 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:13 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) r1 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000280)={{{@in=@local, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) pipe(&(0x7f0000000180)={0xffffffffffffffff}) setsockopt$inet_dccp_int(r3, 0x21, 0x15, &(0x7f00000001c0)=0x7ff, 0x4) setresuid(r0, r1, r2) r4 = perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r4, 0x0) 12:56:13 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) write$input_event(r0, &(0x7f0000000240)={{0x77359400}, 0x17, 0x7fff, 0x5}, 0x18) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x0, 0x0) r1 = getpid() waitid(0x1, r1, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:13 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:13 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, 0x0) 12:56:13 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) write$input_event(r0, &(0x7f0000000240)={{0x77359400}, 0x17, 0x7fff, 0x5}, 0x18) r1 = getpid() waitid(0x1, r1, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:13 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) write$input_event(r0, &(0x7f0000000240)={{0x77359400}, 0x17, 0x7fff, 0x5}, 0x18) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x0, 0x0) r1 = getpid() waitid(0x1, r1, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:13 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:13 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:13 executing program 3: r0 = dup(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x7f, 0x5, [0x8, 0x0, 0x6, 0xcc, 0x8]}, &(0x7f0000000040)=0x12) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000080)={r1, 0x5c0652ca}, &(0x7f00000000c0)=0x8) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000200)=0x32) r2 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_S_DV_TIMINGS(r2, 0xc0845657, &(0x7f0000000140)) 12:56:13 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:13 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) getdents64(r0, &(0x7f0000000200)=""/6, 0x6) r1 = getpid() waitid(0x1, r1, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:13 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:13 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, 0x0) 12:56:13 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000001c0)) r1 = getpid() waitid(0x1, r1, 0x0, 0x40000008, &(0x7f00000004c0)) [ 190.710134] protocol 88fb is buggy, dev hsr_slave_0 [ 190.715332] protocol 88fb is buggy, dev hsr_slave_1 12:56:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000", 0x40, 0x10000}], 0x0, 0x0) 12:56:13 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:13 executing program 3: r0 = syz_open_procfs(0x0, 0x0) r1 = getpid() r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = shmget$private(0x0, 0x1000, 0x2, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_LOCK(r3, 0xb) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000240)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="b400000000000000db00000000000000950000000000000049118f62bf8ebfda9c0d0b0cdd7bcaf9734a56282790bef2252b3863a30279b47a8f9ad8a4db349e5bfea350ef43fc98480357419883766fb10fb1655859a120ade06bf270ce98e5fc906983fb8097715034e2b3b4f39bd5bcbe7db3b9bbc7c7a4c77c603ab69fad337da30d7183685df458c67b5d7dee005ce23ee3df1889509ba80eb3f2bcbe0ae905f53cd650930d2c4aa30f9c93a0b3ef0bb1e8a7049a3e57ca73f2ecdc1d0492cbb893beb754d0d7df6695a8fecbd55c0ff01c0d"], &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248}, 0x48) write$P9_RLOCK(r0, 0x0, 0x0) shutdown(r0, 0x1) r4 = socket$inet6(0xa, 0x80f, 0x5) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f0000000080)) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f00000003c0)=""/128, &(0x7f0000000480)=0x80) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000540)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x2001000}, 0xfffffffffffffefe, &(0x7f0000000580)={0xffffffffffffffff}, 0x1, 0x0, 0x0, 0x40}, 0x4c040) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f0000000440)={0x0, &(0x7f00000003c0)}) sendmsg$nl_netfilter(r0, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)={0x118, 0x6, 0x1, 0x402, 0x70bd25, 0x25dfdbff, {0xa, 0x0, 0x7}, [@generic="6ca6764d98fc9f1b585241711fa56643a0cb10f949184dda11cd7d538c744169812d80df9c8a9c58b3e81eea2395fc40be809df990322110fc87dfa2b35acfe6e846e24cb1b756a2519aeaa119279e20ca6da3f3", @nested={0xc, 0x78, [@typed={0x8, 0x8, @fd=r2}]}, @generic="d8e568bce2e0085ed891ab410dc519ba2386704969722698bfc4e37acf7fc5d3f59807ce12a873836b097aed860cfcb1186a01f49e5d178242c409c326e781ef875a139edbc171f8b642f104cac537e3d71b1dc6a1b745fed26ec9c2fcd406bc7f27db68e4055c4a6f26be5097af768e181f6b3e8ca2f82ec5f1a0dbc6124e630cf69d2c71fe5811bcf60fbfc91cfd35c9ca65aaba52c0f4bf6877d6", @typed={0x8, 0x84, @pid=r1}]}, 0x118}, 0x1, 0x0, 0x0, 0x40040}, 0x40) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000380)={0x100000000}) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f00000000c0)=0x2) ioctl$VIDIOC_SUBDEV_G_CROP(r0, 0xc038563b, &(0x7f0000000100)={0x1, 0x0, {0x3, 0xff6c, 0x9, 0x15}}) 12:56:13 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:13 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:13 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x0, 0x8}, 0x10) r1 = getpid() waitid(0x1, r1, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 12:56:13 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000000c0)={0x5, 0x0, {0x1, 0x3, 0x3dc0, 0x3, 0xffffffffffff43f0}}) r1 = getpid() waitid(0x1, r1, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:13 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:13 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:13 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:13 executing program 3: syz_open_dev$admmidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) getsockname$tipc(r0, &(0x7f0000000080), &(0x7f0000000100)=0x6c2) 12:56:14 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 191.110139] protocol 88fb is buggy, dev hsr_slave_0 [ 191.115272] protocol 88fb is buggy, dev hsr_slave_1 12:56:14 executing program 0: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = getpid() waitid(0x1, r1, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:14 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 12:56:14 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:14 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/sockstat6\x00') ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000180)={0x5, 0x2d, 0x5, 0x610, 0x3, 0xfffffffffffffff8, 0x0, 0x91, 0xffffffffffffffff}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)=@newsa={0x104, 0x10, 0x1, 0x0, 0x0, {{@in=@multicast1, @in=@local}, {@in=@multicast1=0xe0000008, 0x0, 0x3c}, @in, {}, {}, {}, 0x0, 0x0, 0xa, 0x2}, [@coaddr={0x14}]}, 0x104}}, 0x0) 12:56:14 executing program 0: syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3, 0x400000) r0 = getpid() waitid(0x1, r0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:14 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:14 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 191.350125] protocol 88fb is buggy, dev hsr_slave_0 12:56:14 executing program 3: r0 = open(&(0x7f0000000280)='./file0\x00', 0x2000, 0x4) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f00000002c0), 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$TIOCCONS(r2, 0x541d) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000001000000000006115000000000000950000000000000095be0bf7ed3434d85b0be412590b5693364d12a5db69f7e59fa082f5618ad4d88e685c0d7b32a87f61aa0883608c985ed042fab411ea833c3f980b58ccfcff84c8dd3ea03d79e45d99d1fb545948cdedbf7f2aa2b5cb92b15453480e9ed5eec9e3c782324c1e789a78e1a4006452a4bb493e636ce482089958671dfbfe3243e96d87bb8ff16daa10a004e8f4dbc0833782d097463ca826959012d44bd4a98b39e716ada93ff5828cf6e9b4"], &(0x7f0000000100)='GPL\x00'}, 0x48) 12:56:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 12:56:14 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:14 executing program 0: r0 = getpid() waitid(0x1, r0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:14 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:14 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:14 executing program 0: r0 = getpid() waitid(0x0, r0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000900)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0775db", 0x4) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)={{r1, r2/1000+10000}}) r3 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r3, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r3, &(0x7f0000003ac0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000080)=""/67, 0x43}], 0x1}}], 0x1, 0x0, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x41, 0x1d7) r5 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x3ff, 0x40) renameat2(r4, &(0x7f00000001c0)='./file0\x00', r5, &(0x7f0000000240)='./file0\x00', 0x1) 12:56:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2", 0x49, 0x10000}], 0x0, 0x0) 12:56:14 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:14 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:14 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:14 executing program 0: r0 = getpid() waitid(0x0, r0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:14 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:14 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:14 executing program 3: mkdir(&(0x7f0000000440)='./file1\x00', 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f00000006c0)={{}, {0x1, 0x4}, [{}, {0x2, 0x1}, {0x2, 0x1}, {0x2, 0x2}], {0x4, 0x3}, [{}], {0x10, 0x2}, {0x20, 0xa1f5626f4abca5b9}}, 0x4c, 0x3) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000240)='./file1\x00', r0, &(0x7f0000000840)='./file0/f.le.\x00') ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000000)=@get={0x1, &(0x7f0000000180)=""/166, 0x9}) 12:56:14 executing program 0: r0 = getpid() waitid(0x0, r0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:14 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 12:56:14 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:14 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:14 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:14 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 12:56:14 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:14 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:14 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 12:56:15 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:15 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:15 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:15 executing program 3: r0 = add_key(0x0, &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1, 0x8000) getpeername$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x1c) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000480)="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", 0x5, r0) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r2, r2}, &(0x7f00000002c0)=""/234, 0xea, &(0x7f00000001c0)={&(0x7f0000000080)={'crc32-generic\x00\xf0\xff\xff\xff\x7f\x00\x00\x00\x00\x01\x00'}, 0x0, 0x2}) 12:56:15 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:15 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 192.193744] overlayfs: filesystem on './file0' not supported as upperdir 12:56:15 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:15 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:15 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:15 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:15 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:15 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:15 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:15 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:15 executing program 3: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x80000006}]}, 0x10) setsockopt$sock_int(r0, 0x1, 0x1b, &(0x7f00000002c0), 0xa7) 12:56:15 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 12:56:15 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:15 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:15 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000180)={0xbe0004, 0xfffffffffffffffd, 0x2, [], &(0x7f0000000140)={0x99097b, 0x8, [], @ptr=0x2}}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x8000009, 0x0, 0x0) 12:56:15 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:15 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:15 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:15 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:15 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 12:56:15 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000440)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r2 = accept$alg(r1, 0x0, 0x0) write(r2, &(0x7f0000000100), 0xfff4) readv(r2, &(0x7f00000007c0)=[{&(0x7f00000001c0)=""/104, 0xfe40}], 0x1) 12:56:15 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:15 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:15 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:15 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 12:56:15 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:15 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:15 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:15 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:15 executing program 3: unshare(0x20000000) clone(0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x40000000, 0x0) r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) close(r0) 12:56:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 12:56:16 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:16 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:16 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:16 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:16 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:16 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:16 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 12:56:16 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:16 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000480)=""/191) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x400, 0x0) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) readlink(0x0, 0x0, 0xfffffffffffffe78) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') ioctl$TIOCGISO7816(r0, 0x80285442, &(0x7f0000000080)) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0xfffffffdfffffffc) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000340)='./file0\x00', 0x100000000000009) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 12:56:16 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:16 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:16 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:16 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 12:56:16 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 193.400643] Unknown ioctl 43780 12:56:16 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 193.494709] Unknown ioctl -2144840638 12:56:16 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:16 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:16 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:16 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 193.708708] Unknown ioctl 43780 [ 193.721490] Unknown ioctl -2144840638 12:56:16 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000480)=""/191) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x400, 0x0) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) readlink(0x0, 0x0, 0xfffffffffffffe78) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') ioctl$TIOCGISO7816(r0, 0x80285442, &(0x7f0000000080)) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0xfffffffdfffffffc) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000340)='./file0\x00', 0x100000000000009) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 12:56:16 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:16 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:16 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:16 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:16 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:16 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 193.822594] FAULT_INJECTION: forcing a failure. [ 193.822594] name failslab, interval 1, probability 0, space 0, times 1 [ 193.848551] CPU: 1 PID: 11145 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 193.855707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.865101] Call Trace: [ 193.867764] dump_stack+0x138/0x19c [ 193.868472] Unknown ioctl 43780 12:56:16 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:16 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 193.871440] should_fail.cold+0x10f/0x159 [ 193.871478] should_failslab+0xdb/0x130 [ 193.871503] __kmalloc+0x2f0/0x7a0 [ 193.886426] ? __sb_end_write+0xc1/0x100 [ 193.890513] ? strnlen_user+0x12f/0x1a0 [ 193.894526] ? SyS_memfd_create+0xba/0x3a0 [ 193.898771] SyS_memfd_create+0xba/0x3a0 [ 193.902845] ? shmem_fcntl+0x130/0x130 [ 193.906755] ? do_syscall_64+0x53/0x640 [ 193.910741] ? shmem_fcntl+0x130/0x130 [ 193.914634] do_syscall_64+0x1e8/0x640 [ 193.918528] ? trace_hardirqs_off_thunk+0x1a/0x1c 12:56:16 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:16 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 193.923426] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 193.923446] RIP: 0033:0x4597c9 [ 193.923452] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 193.923465] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004597c9 [ 193.923470] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be6cc [ 193.923476] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 193.923481] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5ff973f6d4 [ 193.923488] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:16 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 193.987355] Unknown ioctl -2144840638 12:56:17 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000480)=""/191) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x400, 0x0) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) readlink(0x0, 0x0, 0xfffffffffffffe78) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') ioctl$TIOCGISO7816(r0, 0x80285442, &(0x7f0000000080)) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0xfffffffdfffffffc) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000340)='./file0\x00', 0x100000000000009) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 12:56:17 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:17 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:17 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:17 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:17 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:17 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 194.148063] FAULT_INJECTION: forcing a failure. [ 194.148063] name failslab, interval 1, probability 0, space 0, times 0 12:56:17 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:17 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 194.229076] CPU: 1 PID: 11172 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 194.236237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.245624] Call Trace: [ 194.248235] dump_stack+0x138/0x19c [ 194.251890] should_fail.cold+0x10f/0x159 [ 194.256064] should_failslab+0xdb/0x130 [ 194.260052] kmem_cache_alloc+0x2d7/0x780 [ 194.260072] ? __alloc_fd+0x1d4/0x4a0 [ 194.260088] __d_alloc+0x2d/0x9f0 [ 194.260108] ? lock_downgrade+0x6e0/0x6e0 [ 194.260121] d_alloc_pseudo+0x1e/0x30 [ 194.278240] Unknown ioctl 43780 [ 194.279478] __shmem_file_setup.part.0+0xd8/0x400 [ 194.279494] ? __alloc_fd+0x1d4/0x4a0 [ 194.291425] ? shmem_fill_super+0x8c0/0x8c0 [ 194.295777] SyS_memfd_create+0x1f9/0x3a0 [ 194.299952] ? shmem_fcntl+0x130/0x130 [ 194.303861] ? do_syscall_64+0x53/0x640 [ 194.307854] ? shmem_fcntl+0x130/0x130 [ 194.311785] do_syscall_64+0x1e8/0x640 [ 194.311797] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 194.311822] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 194.311834] RIP: 0033:0x4597c9 12:56:17 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 194.328923] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 194.336650] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004597c9 [ 194.343946] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be6cc [ 194.351227] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 194.358513] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5ff973f6d4 [ 194.365815] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:17 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:17 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 194.391383] Unknown ioctl -2144840638 12:56:17 executing program 3: syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, &(0x7f0000000480)=""/191) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x400, 0x0) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) readlink(0x0, 0x0, 0xfffffffffffffe78) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) syz_genetlink_get_family_id$net_dm(&(0x7f0000000a40)='NET_DM\x00') ioctl$TIOCGISO7816(r0, 0x80285442, &(0x7f0000000080)) sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000b00)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0xfffffffdfffffffc) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') umount2(&(0x7f0000000340)='./file0\x00', 0x100000000000009) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') 12:56:17 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:17 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:17 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:17 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:17 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 194.590615] FAULT_INJECTION: forcing a failure. [ 194.590615] name failslab, interval 1, probability 0, space 0, times 0 [ 194.642936] CPU: 1 PID: 11209 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 194.650085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.659456] Call Trace: [ 194.662066] dump_stack+0x138/0x19c [ 194.665740] should_fail.cold+0x10f/0x159 [ 194.670950] should_failslab+0xdb/0x130 [ 194.670966] kmem_cache_alloc+0x2d7/0x780 [ 194.679090] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 194.684568] ? rcu_read_lock_sched_held+0x110/0x130 [ 194.689634] ? shmem_destroy_callback+0xa0/0xa0 [ 194.694326] shmem_alloc_inode+0x1c/0x50 [ 194.698404] alloc_inode+0x64/0x180 [ 194.702037] new_inode_pseudo+0x19/0xf0 [ 194.706028] new_inode+0x1f/0x40 [ 194.709489] shmem_get_inode+0x75/0x750 [ 194.713469] __shmem_file_setup.part.0+0x111/0x400 [ 194.718518] ? __alloc_fd+0x1d4/0x4a0 [ 194.722342] ? shmem_fill_super+0x8c0/0x8c0 [ 194.726692] SyS_memfd_create+0x1f9/0x3a0 [ 194.731284] ? shmem_fcntl+0x130/0x130 [ 194.735928] ? do_syscall_64+0x53/0x640 [ 194.740473] ? shmem_fcntl+0x130/0x130 [ 194.746476] do_syscall_64+0x1e8/0x640 [ 194.752546] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 194.757571] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 194.762753] RIP: 0033:0x4597c9 [ 194.765928] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 194.773654] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004597c9 [ 194.780919] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be6cc 12:56:17 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:17 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:17 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:17 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 194.788185] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 194.795466] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5ff973f6d4 [ 194.802737] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 194.819032] Unknown ioctl 43780 12:56:17 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:17 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 194.893223] Unknown ioctl -2144840638 12:56:17 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40, 0x0) sendmsg$rds(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000100)=""/245, 0xf5}], 0x1, 0x0, 0xffffffffffffffc0, 0x40010}, 0x10) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000280)={0x0, @bt={0x1, 0x4, 0x1, 0x2, 0x5d1, 0x80, 0xffffffffffffffff, 0x7, 0x8, 0x5eef, 0x9, 0x400, 0x1461, 0x6, 0x0, 0x30}}) sendmsg$rds(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x0, @broadcast}, 0x10, 0x0}, 0x0) 12:56:17 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:17 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:17 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:17 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:17 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:18 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:18 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 195.066001] FAULT_INJECTION: forcing a failure. [ 195.066001] name failslab, interval 1, probability 0, space 0, times 0 12:56:18 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 195.131680] CPU: 0 PID: 11247 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 195.138826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.148188] Call Trace: [ 195.150800] dump_stack+0x138/0x19c [ 195.154454] should_fail.cold+0x10f/0x159 [ 195.158712] should_failslab+0xdb/0x130 [ 195.162696] kmem_cache_alloc+0x2d7/0x780 [ 195.166848] ? shmem_alloc_inode+0x1c/0x50 [ 195.171085] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 195.176554] selinux_inode_alloc_security+0xb6/0x2a0 12:56:18 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 195.181662] security_inode_alloc+0x94/0xd0 [ 195.185998] inode_init_always+0x552/0xaf0 [ 195.190232] alloc_inode+0x81/0x180 [ 195.193859] new_inode_pseudo+0x19/0xf0 [ 195.197833] new_inode+0x1f/0x40 [ 195.201203] shmem_get_inode+0x75/0x750 [ 195.205184] __shmem_file_setup.part.0+0x111/0x400 [ 195.210112] ? __alloc_fd+0x1d4/0x4a0 [ 195.213916] ? shmem_fill_super+0x8c0/0x8c0 [ 195.218248] SyS_memfd_create+0x1f9/0x3a0 [ 195.222401] ? shmem_fcntl+0x130/0x130 [ 195.226292] ? do_syscall_64+0x53/0x640 12:56:18 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 195.230278] ? shmem_fcntl+0x130/0x130 [ 195.234180] do_syscall_64+0x1e8/0x640 [ 195.238071] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 195.242931] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 195.248124] RIP: 0033:0x4597c9 [ 195.251322] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 195.259038] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004597c9 [ 195.266319] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be6cc [ 195.273595] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 12:56:18 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 195.280863] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5ff973f6d4 [ 195.288136] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 195.295605] net_ratelimit: 21 callbacks suppressed [ 195.295609] protocol 88fb is buggy, dev hsr_slave_0 [ 195.305638] protocol 88fb is buggy, dev hsr_slave_1 [ 195.510143] protocol 88fb is buggy, dev hsr_slave_0 [ 195.515217] protocol 88fb is buggy, dev hsr_slave_1 12:56:18 executing program 3: syz_open_dev$sndmidi(0x0, 0x7, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000380)) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000180)) socket$caif_stream(0x25, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x300, 0x9}, 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:56:18 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:18 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:18 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:18 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:18 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:18 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:18 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:18 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 195.908028] FAULT_INJECTION: forcing a failure. [ 195.908028] name failslab, interval 1, probability 0, space 0, times 0 [ 195.969285] CPU: 0 PID: 11282 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 195.976441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.985899] Call Trace: [ 195.988505] dump_stack+0x138/0x19c [ 195.992146] should_fail.cold+0x10f/0x159 [ 195.996305] should_failslab+0xdb/0x130 [ 196.000298] kmem_cache_alloc+0x2d7/0x780 [ 196.004466] ? lock_downgrade+0x6e0/0x6e0 [ 196.008625] get_empty_filp+0x8c/0x3b0 [ 196.012519] alloc_file+0x23/0x440 12:56:18 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 196.016069] __shmem_file_setup.part.0+0x1b1/0x400 [ 196.016082] ? __alloc_fd+0x1d4/0x4a0 [ 196.016093] ? shmem_fill_super+0x8c0/0x8c0 [ 196.029148] SyS_memfd_create+0x1f9/0x3a0 [ 196.029162] ? shmem_fcntl+0x130/0x130 [ 196.029177] ? do_syscall_64+0x53/0x640 [ 196.041165] ? shmem_fcntl+0x130/0x130 [ 196.045067] do_syscall_64+0x1e8/0x640 [ 196.048964] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 196.053823] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 196.059151] RIP: 0033:0x4597c9 12:56:19 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:19 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 196.062323] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 196.070017] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004597c9 [ 196.077302] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be6cc [ 196.084575] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 196.091831] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5ff973f6d4 [ 196.099082] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:19 executing program 3: 12:56:19 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:19 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:19 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:19 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:19 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:19 executing program 3: 12:56:19 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:19 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 196.230145] protocol 88fb is buggy, dev hsr_slave_0 [ 196.235262] protocol 88fb is buggy, dev hsr_slave_1 [ 196.251072] FAULT_INJECTION: forcing a failure. [ 196.251072] name failslab, interval 1, probability 0, space 0, times 0 12:56:19 executing program 3: [ 196.305652] CPU: 0 PID: 11311 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 196.312837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.322201] Call Trace: [ 196.324812] dump_stack+0x138/0x19c [ 196.328467] should_fail.cold+0x10f/0x159 [ 196.332634] should_failslab+0xdb/0x130 [ 196.336624] kmem_cache_alloc+0x2d7/0x780 [ 196.340786] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 196.346252] ? check_preemption_disabled+0x3c/0x250 12:56:19 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:19 executing program 3: [ 196.351281] selinux_file_alloc_security+0xb4/0x190 [ 196.356330] security_file_alloc+0x6d/0xa0 [ 196.360579] get_empty_filp+0x130/0x3b0 [ 196.364560] alloc_file+0x23/0x440 [ 196.368119] __shmem_file_setup.part.0+0x1b1/0x400 [ 196.373054] ? __alloc_fd+0x1d4/0x4a0 [ 196.376861] ? shmem_fill_super+0x8c0/0x8c0 [ 196.381195] SyS_memfd_create+0x1f9/0x3a0 [ 196.385349] ? shmem_fcntl+0x130/0x130 [ 196.389240] ? do_syscall_64+0x53/0x640 [ 196.393222] ? shmem_fcntl+0x130/0x130 [ 196.397116] do_syscall_64+0x1e8/0x640 [ 196.401009] ? trace_hardirqs_off_thunk+0x1a/0x1c 12:56:19 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 196.405861] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 196.411052] RIP: 0033:0x4597c9 [ 196.414240] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 196.421956] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004597c9 [ 196.429225] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be6cc [ 196.436497] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 196.443762] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f5ff973f6d4 12:56:19 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:19 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:19 executing program 3: 12:56:19 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:19 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 196.451026] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 196.470136] protocol 88fb is buggy, dev hsr_slave_0 [ 196.470166] protocol 88fb is buggy, dev hsr_slave_1 [ 196.475211] protocol 88fb is buggy, dev hsr_slave_1 12:56:19 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:19 executing program 3: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 12:56:19 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:19 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 196.560607] FAULT_INJECTION: forcing a failure. [ 196.560607] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 196.648398] CPU: 1 PID: 11340 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 196.655543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.664895] Call Trace: [ 196.667505] dump_stack+0x138/0x19c [ 196.671155] should_fail.cold+0x10f/0x159 [ 196.675318] ? __might_sleep+0x93/0xb0 [ 196.679234] __alloc_pages_nodemask+0x1d6/0x7a0 [ 196.683922] ? __alloc_pages_slowpath+0x2930/0x2930 [ 196.688949] ? lock_downgrade+0x6e0/0x6e0 [ 196.693123] alloc_pages_vma+0xc9/0x4c0 12:56:19 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 196.697127] shmem_alloc_page+0xf6/0x1a0 [ 196.701212] ? shmem_swapin+0x1a0/0x1a0 [ 196.705206] ? cred_has_capability+0x142/0x290 [ 196.709805] ? check_preemption_disabled+0x3c/0x250 [ 196.714845] ? __this_cpu_preempt_check+0x1d/0x30 [ 196.719703] ? percpu_counter_add_batch+0x112/0x160 [ 196.724739] ? __vm_enough_memory+0x26a/0x490 [ 196.729252] shmem_alloc_and_acct_page+0x12a/0x680 [ 196.734209] shmem_getpage_gfp+0x402/0x28a0 [ 196.740055] ? _raw_spin_unlock+0x2d/0x50 [ 196.744213] ? shmem_add_to_page_cache+0x860/0x860 [ 196.749143] ? iov_iter_fault_in_readable+0x1da/0x3c0 [ 196.754343] shmem_write_begin+0xfd/0x1b0 [ 196.758499] ? trace_hardirqs_on_caller+0x400/0x590 [ 196.763518] generic_perform_write+0x1f8/0x480 [ 196.768098] ? page_endio+0x530/0x530 [ 196.771892] ? current_time+0xb0/0xb0 [ 196.775687] ? generic_file_write_iter+0x9a/0x660 [ 196.780525] __generic_file_write_iter+0x239/0x5b0 [ 196.785455] generic_file_write_iter+0x303/0x660 [ 196.790216] __vfs_write+0x4a7/0x6b0 [ 196.793929] ? selinux_file_open+0x420/0x420 [ 196.798347] ? kernel_read+0x120/0x120 [ 196.802244] ? check_preemption_disabled+0x3c/0x250 [ 196.807276] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 196.812746] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 196.817504] ? __sb_start_write+0x153/0x2f0 [ 196.821830] vfs_write+0x198/0x500 [ 196.825371] SyS_pwrite64+0x115/0x140 [ 196.829162] ? SyS_pread64+0x140/0x140 [ 196.833046] ? do_syscall_64+0x53/0x640 [ 196.837015] ? SyS_pread64+0x140/0x140 [ 196.840900] do_syscall_64+0x1e8/0x640 [ 196.844778] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 196.849625] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 196.854818] RIP: 0033:0x413717 [ 196.857999] RSP: 002b:00007f5ff973ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 196.865706] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 0000000000413717 [ 196.872971] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000004 [ 196.880232] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 196.887493] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 12:56:19 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:19 executing program 3: [ 196.894755] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:19 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 196.950753] protocol 88fb is buggy, dev hsr_slave_0 12:56:20 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:20 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:20 executing program 3: 12:56:20 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:20 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:20 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:20 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 197.132473] FAULT_INJECTION: forcing a failure. [ 197.132473] name failslab, interval 1, probability 0, space 0, times 0 [ 197.144195] CPU: 1 PID: 11381 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 197.151310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.160671] Call Trace: [ 197.163422] dump_stack+0x138/0x19c [ 197.167068] should_fail.cold+0x10f/0x159 [ 197.171223] should_failslab+0xdb/0x130 [ 197.175227] kmem_cache_alloc+0x47/0x780 [ 197.179331] ? __alloc_pages_slowpath+0x2930/0x2930 [ 197.184570] ? lock_downgrade+0x6e0/0x6e0 [ 197.188768] radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 197.194435] __radix_tree_create+0x337/0x4d0 [ 197.198897] __radix_tree_insert+0xab/0x570 [ 197.203413] ? __radix_tree_create+0x4d0/0x4d0 [ 197.208042] shmem_add_to_page_cache+0x5a4/0x860 [ 197.213092] ? shmem_writepage+0xbb0/0xbb0 [ 197.217352] ? __radix_tree_preload+0x1d2/0x260 [ 197.222047] shmem_getpage_gfp+0x1908/0x28a0 [ 197.226471] ? _raw_spin_unlock+0x2d/0x50 [ 197.230644] ? shmem_add_to_page_cache+0x860/0x860 [ 197.235623] ? iov_iter_fault_in_readable+0x1da/0x3c0 [ 197.240907] shmem_write_begin+0xfd/0x1b0 [ 197.245084] ? trace_hardirqs_on_caller+0x400/0x590 [ 197.250120] generic_perform_write+0x1f8/0x480 [ 197.254736] ? page_endio+0x530/0x530 [ 197.258569] ? current_time+0xb0/0xb0 [ 197.262401] ? generic_file_write_iter+0x9a/0x660 [ 197.267449] __generic_file_write_iter+0x239/0x5b0 [ 197.272412] generic_file_write_iter+0x303/0x660 [ 197.277277] __vfs_write+0x4a7/0x6b0 [ 197.281000] ? selinux_file_open+0x420/0x420 [ 197.285434] ? kernel_read+0x120/0x120 [ 197.289328] ? check_preemption_disabled+0x3c/0x250 [ 197.294353] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 197.299820] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 197.304580] ? __sb_start_write+0x153/0x2f0 [ 197.308916] vfs_write+0x198/0x500 [ 197.312456] SyS_pwrite64+0x115/0x140 [ 197.316253] ? SyS_pread64+0x140/0x140 [ 197.320138] ? do_syscall_64+0x53/0x640 [ 197.324117] ? SyS_pread64+0x140/0x140 [ 197.328001] do_syscall_64+0x1e8/0x640 [ 197.331884] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 197.336728] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 197.341912] RIP: 0033:0x413717 [ 197.345090] RSP: 002b:00007f5ff973ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 197.352805] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 0000000000413717 [ 197.360090] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000004 [ 197.367444] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 197.374707] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 12:56:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 12:56:20 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:20 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 197.382060] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:20 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:20 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:20 executing program 1 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:20 executing program 3: creat(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000001980)=[{&(0x7f0000000300), 0x0, 0x101}, {0x0}]) getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}}}, &(0x7f00000001c0)=0xe8) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000000), 0xa) truncate(0x0, 0x0) prctl$PR_SET_TSC(0x1a, 0x3) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x4, &(0x7f0000001a80)) 12:56:20 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:20 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:20 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:20 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:20 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:20 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 197.626700] FAULT_INJECTION: forcing a failure. [ 197.626700] name failslab, interval 1, probability 0, space 0, times 0 12:56:20 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 197.711463] CPU: 0 PID: 11413 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 197.719402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.728770] Call Trace: [ 197.731380] dump_stack+0x138/0x19c [ 197.735027] should_fail.cold+0x10f/0x159 [ 197.739193] should_failslab+0xdb/0x130 [ 197.743179] kmem_cache_alloc+0x2d7/0x780 [ 197.747346] ? vfs_write+0x25f/0x500 [ 197.751105] getname_flags+0xcb/0x580 [ 197.754906] ? check_preemption_disabled+0x3c/0x250 [ 197.754920] getname+0x1a/0x20 [ 197.763121] do_sys_open+0x1e7/0x430 [ 197.766844] ? filp_open+0x70/0x70 [ 197.770392] ? fput+0xd4/0x150 [ 197.773594] ? SyS_pwrite64+0xca/0x140 [ 197.777495] SyS_open+0x2d/0x40 [ 197.780778] ? do_sys_open+0x430/0x430 [ 197.784680] do_syscall_64+0x1e8/0x640 [ 197.788568] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 197.793420] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 197.798610] RIP: 0033:0x4136b1 [ 197.801802] RSP: 002b:00007f5ff973ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 12:56:20 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:20 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0xc1, 0x3, &(0x7f0000001980)=[{0x0, 0x0, 0x4e75}, {0x0}, {0x0}]) getpgrp(0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) [ 197.809513] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004136b1 [ 197.816865] RDX: 00007f5ff973eb0a RSI: 0000000000000002 RDI: 00007f5ff973eb00 [ 197.824225] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 197.831485] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 197.838834] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:20 executing program 1 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:20 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:20 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:20 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:20 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbe7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}, 0x20000200000000, 0x10002}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x2b5, 0xffffffffffffffeb, 0x0, 0x0, 0x0, 0x8}, 0x104) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 12:56:20 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 197.987880] FAULT_INJECTION: forcing a failure. [ 197.987880] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 197.999732] CPU: 0 PID: 11445 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 198.006841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.016207] Call Trace: [ 198.018835] dump_stack+0x138/0x19c [ 198.022565] should_fail.cold+0x10f/0x159 [ 198.026719] __alloc_pages_nodemask+0x1d6/0x7a0 [ 198.031385] ? fs_reclaim_acquire+0x20/0x20 [ 198.035703] ? __alloc_pages_slowpath+0x2930/0x2930 [ 198.040722] cache_grow_begin+0x80/0x400 [ 198.044783] kmem_cache_alloc+0x6a6/0x780 [ 198.048928] ? _raw_spin_unlock_irq+0x28/0x90 [ 198.053424] getname_flags+0xcb/0x580 [ 198.057404] ? finish_task_switch+0x178/0x650 [ 198.061892] ? finish_task_switch+0x14d/0x650 [ 198.066400] getname+0x1a/0x20 [ 198.069585] do_sys_open+0x1e7/0x430 [ 198.073300] ? filp_open+0x70/0x70 [ 198.076842] ? SyS_pwrite64+0xca/0x140 [ 198.080725] SyS_open+0x2d/0x40 [ 198.083994] ? do_sys_open+0x430/0x430 [ 198.087881] do_syscall_64+0x1e8/0x640 [ 198.091764] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 198.096607] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 198.101789] RIP: 0033:0x4136b1 [ 198.104970] RSP: 002b:00007f5ff973ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 198.112676] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004136b1 [ 198.119941] RDX: 00007f5ff973eb0a RSI: 0000000000000002 RDI: 00007f5ff973eb00 [ 198.127211] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 12:56:21 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:21 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 198.134482] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 198.141745] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:21 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:21 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:21 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:21 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:21 executing program 1 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:21 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:21 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:21 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setitimer(0x1, 0x0, &(0x7f00000000c0)) syz_read_part_table(0xc1, 0x9, &(0x7f0000001980)=[{&(0x7f0000000300)="e52074a0a707c99222fe948c8e21ceba613d28c0700c86f0f399310f30da", 0x1e, 0x101}, {&(0x7f00000004c0), 0x0, 0x4e75}, {0x0, 0x0, 0x3}, {&(0x7f0000000340)="16a70ae4c4f07dc01947deea96486ddb3af1014f68d3762fd99b894d4a642414b801eaf8a0ad", 0x26}, {&(0x7f00000006c0)="2a15a7ff6021d45c3db344731db16eb430f4d77c988ed947ae952225c5fb44ddbef673bd", 0x24}, {&(0x7f0000000700)}, {&(0x7f0000000780)="06ca73dd25f0305757996d63a51202fba2b6c8670f7a600580c8a896c1e666c5ed07152fcca756c7253288b197bba9ce5395bd655eb0b79f1069e9dcc1b00c3518d28bd66b689ed2b4c36ea3d723d9052c16545508151d684032455ac3b7a90a827eae207d5a2f0e9a2c58edfd33a4b908346b", 0x73}, {&(0x7f0000001840)="4c9749ce0a3b6417932de4e912475188ae52c447adb3b7ce4e2763eb1b453a90e48f166392bff835ba990c37b4f75b6d059ade9f104c9aed63f47dbc4bd400f94ff2fbe5268d4db4a462c293814f6cb1b627dfef570a1706b97f23fcb666a785c141d4232eeca0d5c17a81851871bda59313f37fe623c976803ab7e5ccf3abd74484a8fddc3ace010bbcd2ae3d83da0d5d14ce662764b8ac262ff798b75066a25a0dd96a5252e833c7f26ed336b920af4a5634d49b8a1a5d309f0a406003f00cf9e87338aa06bbd5bd07db3b6c8b9d60a12ffbaa53d186a6510f1841d7f3e78b12ef3e0c8e2d235b2bb2121e4ee239a0622861", 0xf3, 0x2}, {0x0, 0x0, 0x34d}]) getpgid(0xffffffffffffffff) getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000380)='./file0\x00', 0x40002, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@multicast2}}, {{@in=@remote}}}, &(0x7f00000001c0)=0xe8) open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000000), 0xa) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7fffffff) prctl$PR_SET_TSC(0x1a, 0x3) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x4, &(0x7f0000001a80)) socket$inet_tcp(0x2, 0x1, 0x0) 12:56:21 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:21 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:21 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:21 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:21 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 198.431741] FAULT_INJECTION: forcing a failure. [ 198.431741] name failslab, interval 1, probability 0, space 0, times 0 [ 198.513016] CPU: 1 PID: 11488 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 198.520155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.529528] Call Trace: [ 198.532141] dump_stack+0x138/0x19c [ 198.535785] should_fail.cold+0x10f/0x159 [ 198.539958] should_failslab+0xdb/0x130 [ 198.543950] kmem_cache_alloc+0x2d7/0x780 [ 198.548102] ? save_stack+0xa9/0xd0 [ 198.551747] get_empty_filp+0x8c/0x3b0 [ 198.560003] path_openat+0x8f/0x3f70 [ 198.564100] ? trace_hardirqs_on+0x10/0x10 [ 198.568344] ? check_preemption_disabled+0x3c/0x250 [ 198.573372] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 198.578045] ? find_held_lock+0x35/0x130 [ 198.578059] ? save_trace+0x290/0x290 [ 198.578073] ? __alloc_fd+0x1d4/0x4a0 [ 198.578086] do_filp_open+0x18e/0x250 [ 198.578096] ? may_open_dev+0xe0/0xe0 [ 198.585971] ? lock_downgrade+0x6e0/0x6e0 [ 198.585991] ? _raw_spin_unlock+0x2d/0x50 [ 198.586003] ? __alloc_fd+0x1d4/0x4a0 [ 198.586024] do_sys_open+0x2c5/0x430 [ 198.613170] ? filp_open+0x70/0x70 [ 198.616976] ? fput+0xd4/0x150 [ 198.620180] ? SyS_pwrite64+0xca/0x140 [ 198.624079] SyS_open+0x2d/0x40 [ 198.627362] ? do_sys_open+0x430/0x430 [ 198.631258] do_syscall_64+0x1e8/0x640 [ 198.635175] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 198.640042] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 198.645236] RIP: 0033:0x4136b1 [ 198.648425] RSP: 002b:00007f5ff973ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 198.656145] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004136b1 12:56:21 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:21 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:21 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:21 executing program 1 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:21 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:21 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 198.663422] RDX: 00007f5ff973eb0a RSI: 0000000000000002 RDI: 00007f5ff973eb00 [ 198.670697] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 198.677975] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 198.685253] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 198.764441] FAULT_INJECTION: forcing a failure. [ 198.764441] name failslab, interval 1, probability 0, space 0, times 0 [ 198.831710] CPU: 1 PID: 11512 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 198.838864] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.848237] Call Trace: [ 198.850851] dump_stack+0x138/0x19c [ 198.854491] should_fail.cold+0x10f/0x159 [ 198.858739] should_failslab+0xdb/0x130 [ 198.862720] kmem_cache_alloc+0x2d7/0x780 [ 198.866875] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 198.872337] ? check_preemption_disabled+0x3c/0x250 [ 198.877448] selinux_file_alloc_security+0xb4/0x190 [ 198.882466] security_file_alloc+0x6d/0xa0 [ 198.886713] get_empty_filp+0x130/0x3b0 [ 198.890698] path_openat+0x8f/0x3f70 [ 198.894606] ? trace_hardirqs_on+0x10/0x10 [ 198.900415] ? check_preemption_disabled+0x3c/0x250 [ 198.905637] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 198.910483] ? find_held_lock+0x35/0x130 [ 198.914648] ? save_trace+0x290/0x290 [ 198.918722] ? __alloc_fd+0x1d4/0x4a0 [ 198.922546] do_filp_open+0x18e/0x250 [ 198.926362] ? may_open_dev+0xe0/0xe0 [ 198.930267] ? lock_downgrade+0x6e0/0x6e0 [ 198.934924] ? _raw_spin_unlock+0x2d/0x50 [ 198.939081] ? __alloc_fd+0x1d4/0x4a0 [ 198.942989] do_sys_open+0x2c5/0x430 [ 198.946881] ? filp_open+0x70/0x70 [ 198.950774] ? fput+0xd4/0x150 [ 198.953987] ? SyS_pwrite64+0xca/0x140 [ 198.957883] SyS_open+0x2d/0x40 [ 198.961165] ? do_sys_open+0x430/0x430 [ 198.965060] do_syscall_64+0x1e8/0x640 [ 198.969121] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 198.973985] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 198.979275] RIP: 0033:0x4136b1 [ 198.982545] RSP: 002b:00007f5ff973ea80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 198.990258] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004136b1 [ 198.997820] RDX: 00007f5ff973eb0a RSI: 0000000000000002 RDI: 00007f5ff973eb00 [ 199.005100] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 199.012386] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 199.019677] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:22 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:22 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:22 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:22 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x40, 0x0) sendmsg$rds(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x2, 0x4e24, @empty}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000100)=""/245, 0xf5}], 0x1, 0x0, 0xffffffffffffffc0, 0x40010}, 0x10) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f0000000280)={0x0, @bt={0x1, 0x4, 0x1, 0x2, 0x5d1, 0x80, 0xffffffffffffffff, 0x7, 0x8, 0x5eef, 0x9, 0x400, 0x1461, 0x6, 0x0, 0x30}}) sendmsg$rds(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x0, @broadcast}, 0x10, 0x0}, 0x0) 12:56:22 executing program 1 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:22 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:22 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:22 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:22 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 199.128739] FAULT_INJECTION: forcing a failure. [ 199.128739] name failslab, interval 1, probability 0, space 0, times 0 [ 199.188507] CPU: 0 PID: 11533 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 199.195656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.205024] Call Trace: [ 199.207634] dump_stack+0x138/0x19c [ 199.211281] should_fail.cold+0x10f/0x159 [ 199.215451] should_failslab+0xdb/0x130 [ 199.219436] kmem_cache_alloc_trace+0x2e9/0x790 [ 199.224127] ? __lockdep_init_map+0x10c/0x570 [ 199.228662] ? loop_get_status64+0x120/0x120 [ 199.233081] __kthread_create_on_node+0xe3/0x3e0 [ 199.237848] ? kthread_park+0x140/0x140 [ 199.241837] ? __fget+0x210/0x370 [ 199.245319] ? loop_get_status64+0x120/0x120 [ 199.249734] kthread_create_on_node+0xa8/0xd0 [ 199.254238] ? __kthread_create_on_node+0x3e0/0x3e0 [ 199.259263] ? __lockdep_init_map+0x10c/0x570 [ 199.263763] lo_ioctl+0xcf7/0x1ce0 [ 199.263778] ? debug_check_no_obj_freed+0x2aa/0x7b7 [ 199.263789] ? loop_probe+0x160/0x160 [ 199.263826] blkdev_ioctl+0x96b/0x1860 [ 199.263836] ? blkpg_ioctl+0x980/0x980 [ 199.284051] ? __might_sleep+0x93/0xb0 [ 199.287949] ? __fget+0x210/0x370 [ 199.291431] block_ioctl+0xde/0x120 [ 199.295069] ? blkdev_fallocate+0x3b0/0x3b0 [ 199.299404] do_vfs_ioctl+0x7ae/0x1060 [ 199.303318] ? selinux_file_mprotect+0x5d0/0x5d0 [ 199.308088] ? lock_downgrade+0x6e0/0x6e0 [ 199.312243] ? ioctl_preallocate+0x1c0/0x1c0 [ 199.316659] ? __fget+0x237/0x370 [ 199.320125] ? security_file_ioctl+0x89/0xb0 [ 199.324553] SyS_ioctl+0x8f/0xc0 [ 199.327926] ? do_vfs_ioctl+0x1060/0x1060 [ 199.332081] do_syscall_64+0x1e8/0x640 [ 199.335976] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 199.340839] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 199.346042] RIP: 0033:0x459637 [ 199.349239] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 199.356967] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 199.364249] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 199.371529] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 199.378810] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 12:56:22 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:22 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:22 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:22 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:22 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:22 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 199.386092] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:22 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x80) r1 = socket$inet6_sctp(0xa, 0x805, 0x84) r2 = socket$inet_udplite(0x2, 0x2, 0x88) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x404200, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") accept(r0, 0x0, 0x0) shutdown(r0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 12:56:22 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:22 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:22 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:22 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:22 executing program 1 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:22 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:22 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:22 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:22 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 200.007639] FAULT_INJECTION: forcing a failure. [ 200.007639] name failslab, interval 1, probability 0, space 0, times 0 [ 200.024051] CPU: 0 PID: 11571 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 200.031197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.040575] Call Trace: [ 200.043213] dump_stack+0x138/0x19c [ 200.046877] should_fail.cold+0x10f/0x159 [ 200.051066] should_failslab+0xdb/0x130 12:56:23 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 200.055098] kmem_cache_alloc+0x2d7/0x780 [ 200.059320] ? trace_hardirqs_on+0x10/0x10 [ 200.063600] ? save_trace+0x290/0x290 [ 200.067583] __kernfs_new_node+0x70/0x420 [ 200.072021] kernfs_new_node+0x80/0xf0 [ 200.075931] kernfs_create_dir_ns+0x41/0x140 [ 200.080361] internal_create_group+0xea/0x7b0 [ 200.084885] sysfs_create_group+0x20/0x30 [ 200.089057] lo_ioctl+0x1176/0x1ce0 [ 200.092748] ? loop_probe+0x160/0x160 [ 200.096573] blkdev_ioctl+0x96b/0x1860 [ 200.100483] ? blkpg_ioctl+0x980/0x980 [ 200.104400] ? __might_sleep+0x93/0xb0 [ 200.108283] ? __fget+0x210/0x370 [ 200.111745] block_ioctl+0xde/0x120 [ 200.115380] ? blkdev_fallocate+0x3b0/0x3b0 [ 200.119708] do_vfs_ioctl+0x7ae/0x1060 [ 200.123607] ? selinux_file_mprotect+0x5d0/0x5d0 [ 200.128371] ? lock_downgrade+0x6e0/0x6e0 [ 200.132534] ? ioctl_preallocate+0x1c0/0x1c0 [ 200.136954] ? __fget+0x237/0x370 [ 200.140424] ? security_file_ioctl+0x89/0xb0 [ 200.144841] SyS_ioctl+0x8f/0xc0 [ 200.148217] ? do_vfs_ioctl+0x1060/0x1060 [ 200.152378] do_syscall_64+0x1e8/0x640 12:56:23 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 200.156277] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 200.161145] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 200.166348] RIP: 0033:0x459637 [ 200.169545] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 200.177272] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 200.184564] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 200.191842] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 200.199119] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 200.206392] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 200.390214] net_ratelimit: 17 callbacks suppressed [ 200.390220] protocol 88fb is buggy, dev hsr_slave_0 [ 200.400623] protocol 88fb is buggy, dev hsr_slave_1 [ 200.630164] protocol 88fb is buggy, dev hsr_slave_0 [ 200.635325] protocol 88fb is buggy, dev hsr_slave_1 [ 200.710137] protocol 88fb is buggy, dev hsr_slave_0 [ 200.715261] protocol 88fb is buggy, dev hsr_slave_1 12:56:23 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socket$packet(0x11, 0x0, 0x300) pipe2(0x0, 0x0) ioctl$VIDIOC_REQBUFS(0xffffffffffffffff, 0xc0145608, &(0x7f0000000180)={0x0, 0x6, 0x2}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, 0x0) prctl$PR_GET_FP_MODE(0x2e) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x1600, 0x3ef, 0x2000000, 0x3f00000000000000, 0x100000000000600, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) prctl$PR_GET_FP_MODE(0x2e) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000040)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @local, @local}) r2 = accept4(r0, 0x0, &(0x7f0000000000), 0x80000) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f00000001c0), &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r3, 0x800454cf, &(0x7f0000000080)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000140)={r4, r1, 0x0, 0x2}, 0x10) r5 = openat$null(0xffffffffffffff9c, 0x0, 0x40000, 0x0) connect$ax25(r5, &(0x7f00000002c0)={{0x3, @default, 0x3}, [@bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r5, 0xc0105303, &(0x7f0000000280)={0x7, 0x7fffffff}) 12:56:23 executing program 1 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:23 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:23 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:23 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:23 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 200.830456] FAULT_INJECTION: forcing a failure. [ 200.830456] name failslab, interval 1, probability 0, space 0, times 0 [ 200.858525] CPU: 1 PID: 11605 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 200.865665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.875013] Call Trace: [ 200.877610] dump_stack+0x138/0x19c [ 200.881245] should_fail.cold+0x10f/0x159 [ 200.885395] should_failslab+0xdb/0x130 [ 200.889370] kmem_cache_alloc+0x2d7/0x780 [ 200.893516] ? __mutex_unlock_slowpath+0x71/0x800 [ 200.898354] ? __lock_is_held+0xb6/0x140 [ 200.902415] __kernfs_new_node+0x70/0x420 [ 200.906559] kernfs_new_node+0x80/0xf0 [ 200.910442] __kernfs_create_file+0x46/0x323 [ 200.914863] sysfs_add_file_mode_ns+0x1e4/0x450 [ 200.919533] internal_create_group+0x232/0x7b0 [ 200.924117] sysfs_create_group+0x20/0x30 [ 200.928262] lo_ioctl+0x1176/0x1ce0 [ 200.931887] ? loop_probe+0x160/0x160 [ 200.935683] blkdev_ioctl+0x96b/0x1860 [ 200.939581] ? blkpg_ioctl+0x980/0x980 [ 200.943468] ? __might_sleep+0x93/0xb0 [ 200.947351] ? __fget+0x210/0x370 [ 200.950893] block_ioctl+0xde/0x120 [ 200.954515] ? blkdev_fallocate+0x3b0/0x3b0 [ 200.958834] do_vfs_ioctl+0x7ae/0x1060 [ 200.962719] ? selinux_file_mprotect+0x5d0/0x5d0 [ 200.967471] ? lock_downgrade+0x6e0/0x6e0 [ 200.971618] ? ioctl_preallocate+0x1c0/0x1c0 [ 200.976021] ? __fget+0x237/0x370 [ 200.979477] ? security_file_ioctl+0x89/0xb0 [ 200.983881] SyS_ioctl+0x8f/0xc0 [ 200.987239] ? do_vfs_ioctl+0x1060/0x1060 [ 200.991380] do_syscall_64+0x1e8/0x640 [ 200.995266] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 201.000112] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 201.005294] RIP: 0033:0x459637 [ 201.008472] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 201.016172] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 201.023438] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 12:56:24 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:24 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:24 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 201.030699] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 201.037957] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 201.045221] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:24 executing program 1 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 201.110134] protocol 88fb is buggy, dev hsr_slave_0 [ 201.115329] protocol 88fb is buggy, dev hsr_slave_1 12:56:24 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:24 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 201.205364] FAULT_INJECTION: forcing a failure. [ 201.205364] name failslab, interval 1, probability 0, space 0, times 0 [ 201.278164] CPU: 1 PID: 11625 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 201.285310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.294677] Call Trace: [ 201.297284] dump_stack+0x138/0x19c [ 201.300927] should_fail.cold+0x10f/0x159 [ 201.305091] should_failslab+0xdb/0x130 [ 201.309077] kmem_cache_alloc+0x2d7/0x780 [ 201.313231] ? wait_for_completion+0x420/0x420 [ 201.317840] __kernfs_new_node+0x70/0x420 [ 201.317855] kernfs_new_node+0x80/0xf0 [ 201.325905] __kernfs_create_file+0x46/0x323 [ 201.325922] sysfs_add_file_mode_ns+0x1e4/0x450 [ 201.334991] internal_create_group+0x232/0x7b0 [ 201.339592] sysfs_create_group+0x20/0x30 [ 201.343751] lo_ioctl+0x1176/0x1ce0 [ 201.347380] ? loop_probe+0x160/0x160 [ 201.351169] blkdev_ioctl+0x96b/0x1860 [ 201.355040] ? blkpg_ioctl+0x980/0x980 [ 201.358913] ? __might_sleep+0x93/0xb0 [ 201.362786] ? __fget+0x210/0x370 [ 201.366234] block_ioctl+0xde/0x120 [ 201.369865] ? blkdev_fallocate+0x3b0/0x3b0 [ 201.374169] do_vfs_ioctl+0x7ae/0x1060 [ 201.378043] ? selinux_file_mprotect+0x5d0/0x5d0 [ 201.382781] ? lock_downgrade+0x6e0/0x6e0 [ 201.386911] ? ioctl_preallocate+0x1c0/0x1c0 [ 201.391310] ? __fget+0x237/0x370 [ 201.394756] ? security_file_ioctl+0x89/0xb0 [ 201.399150] SyS_ioctl+0x8f/0xc0 [ 201.402499] ? do_vfs_ioctl+0x1060/0x1060 [ 201.406633] do_syscall_64+0x1e8/0x640 [ 201.410501] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 201.415349] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 201.420529] RIP: 0033:0x459637 12:56:24 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:24 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:24 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:24 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:24 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 201.423712] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 201.431402] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 201.438651] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 201.445906] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 201.453160] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 201.460408] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:24 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 201.510161] protocol 88fb is buggy, dev hsr_slave_0 [ 201.515334] protocol 88fb is buggy, dev hsr_slave_1 12:56:24 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:24 executing program 1 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:24 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:24 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 201.669344] FAULT_INJECTION: forcing a failure. [ 201.669344] name failslab, interval 1, probability 0, space 0, times 0 [ 201.703253] CPU: 0 PID: 11658 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 201.710406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.719765] Call Trace: [ 201.722372] dump_stack+0x138/0x19c [ 201.726014] should_fail.cold+0x10f/0x159 [ 201.730170] should_failslab+0xdb/0x130 [ 201.734145] kmem_cache_alloc+0x2d7/0x780 [ 201.738285] ? wait_for_completion+0x420/0x420 [ 201.742875] __kernfs_new_node+0x70/0x420 [ 201.747017] kernfs_new_node+0x80/0xf0 [ 201.750900] __kernfs_create_file+0x46/0x323 [ 201.755328] sysfs_add_file_mode_ns+0x1e4/0x450 [ 201.760022] internal_create_group+0x232/0x7b0 [ 201.764681] sysfs_create_group+0x20/0x30 [ 201.768858] lo_ioctl+0x1176/0x1ce0 [ 201.772871] ? loop_probe+0x160/0x160 [ 201.776696] blkdev_ioctl+0x96b/0x1860 [ 201.780594] ? blkpg_ioctl+0x980/0x980 [ 201.784503] ? __might_sleep+0x93/0xb0 [ 201.788405] ? __fget+0x210/0x370 [ 201.791878] block_ioctl+0xde/0x120 [ 201.795525] ? blkdev_fallocate+0x3b0/0x3b0 [ 201.799876] do_vfs_ioctl+0x7ae/0x1060 [ 201.803897] ? selinux_file_mprotect+0x5d0/0x5d0 [ 201.808688] ? lock_downgrade+0x6e0/0x6e0 [ 201.812858] ? ioctl_preallocate+0x1c0/0x1c0 [ 201.818285] ? __fget+0x237/0x370 [ 201.821752] ? security_file_ioctl+0x89/0xb0 [ 201.826168] SyS_ioctl+0x8f/0xc0 [ 201.829639] ? do_vfs_ioctl+0x1060/0x1060 [ 201.833794] do_syscall_64+0x1e8/0x640 [ 201.837692] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 201.842544] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 201.847824] RIP: 0033:0x459637 [ 201.851094] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 201.858810] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 12:56:24 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 12:56:24 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:24 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:24 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 201.866168] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 201.873439] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 201.880713] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 201.887982] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:24 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:24 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:25 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:25 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:25 executing program 1 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 201.988667] audit: type=1400 audit(1562504184.948:87): avc: denied { map } for pid=11668 comm="syz-executor.3" path="/proc/11668/oom_score_adj" dev="proc" ino=41151 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=file permissive=1 12:56:25 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) [ 202.135503] FAULT_INJECTION: forcing a failure. [ 202.135503] name failslab, interval 1, probability 0, space 0, times 0 [ 202.169799] CPU: 0 PID: 11692 Comm: syz-executor.1 Not tainted 4.14.132 #27 12:56:25 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:25 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:25 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:25 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 202.176948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.186315] Call Trace: [ 202.188954] dump_stack+0x138/0x19c [ 202.192605] should_fail.cold+0x10f/0x159 [ 202.196768] should_failslab+0xdb/0x130 [ 202.200749] kmem_cache_alloc+0x2d7/0x780 [ 202.204912] ? wait_for_completion+0x420/0x420 [ 202.209513] __kernfs_new_node+0x70/0x420 [ 202.213763] kernfs_new_node+0x80/0xf0 [ 202.217659] __kernfs_create_file+0x46/0x323 [ 202.222083] sysfs_add_file_mode_ns+0x1e4/0x450 [ 202.226763] internal_create_group+0x232/0x7b0 [ 202.231355] sysfs_create_group+0x20/0x30 12:56:25 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:25 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 202.235508] lo_ioctl+0x1176/0x1ce0 [ 202.239141] ? loop_probe+0x160/0x160 [ 202.242945] blkdev_ioctl+0x96b/0x1860 [ 202.246832] ? blkpg_ioctl+0x980/0x980 [ 202.250770] ? __might_sleep+0x93/0xb0 [ 202.254663] ? __fget+0x210/0x370 [ 202.258123] block_ioctl+0xde/0x120 [ 202.261756] ? blkdev_fallocate+0x3b0/0x3b0 [ 202.266094] do_vfs_ioctl+0x7ae/0x1060 [ 202.270004] ? selinux_file_mprotect+0x5d0/0x5d0 [ 202.274766] ? lock_downgrade+0x6e0/0x6e0 [ 202.274779] ? ioctl_preallocate+0x1c0/0x1c0 [ 202.274792] ? __fget+0x237/0x370 [ 202.283346] ? security_file_ioctl+0x89/0xb0 [ 202.283359] SyS_ioctl+0x8f/0xc0 [ 202.283368] ? do_vfs_ioctl+0x1060/0x1060 [ 202.283384] do_syscall_64+0x1e8/0x640 [ 202.283394] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 202.283411] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 202.283419] RIP: 0033:0x459637 [ 202.283424] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 202.283438] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 202.330771] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 202.338039] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 202.345313] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 202.352581] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:25 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:25 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:25 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 12:56:25 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:25 executing program 1 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:25 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:25 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:25 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 12:56:25 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 202.590911] FAULT_INJECTION: forcing a failure. [ 202.590911] name failslab, interval 1, probability 0, space 0, times 0 [ 202.604082] CPU: 1 PID: 11736 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 202.611200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.620556] Call Trace: [ 202.623154] dump_stack+0x138/0x19c [ 202.626783] should_fail.cold+0x10f/0x159 [ 202.630948] should_failslab+0xdb/0x130 [ 202.634917] kmem_cache_alloc+0x2d7/0x780 [ 202.639069] ? wait_for_completion+0x420/0x420 [ 202.643657] __kernfs_new_node+0x70/0x420 [ 202.647852] kernfs_new_node+0x80/0xf0 [ 202.651765] __kernfs_create_file+0x46/0x323 [ 202.656171] sysfs_add_file_mode_ns+0x1e4/0x450 [ 202.660843] internal_create_group+0x232/0x7b0 [ 202.665425] sysfs_create_group+0x20/0x30 [ 202.669570] lo_ioctl+0x1176/0x1ce0 [ 202.673202] ? loop_probe+0x160/0x160 [ 202.677006] blkdev_ioctl+0x96b/0x1860 [ 202.680894] ? blkpg_ioctl+0x980/0x980 [ 202.684781] ? __might_sleep+0x93/0xb0 [ 202.688665] ? __fget+0x210/0x370 [ 202.692902] block_ioctl+0xde/0x120 [ 202.696551] ? blkdev_fallocate+0x3b0/0x3b0 [ 202.700870] do_vfs_ioctl+0x7ae/0x1060 [ 202.704779] ? selinux_file_mprotect+0x5d0/0x5d0 [ 202.709536] ? lock_downgrade+0x6e0/0x6e0 [ 202.713709] ? ioctl_preallocate+0x1c0/0x1c0 [ 202.718111] ? __fget+0x237/0x370 [ 202.721567] ? security_file_ioctl+0x89/0xb0 [ 202.725973] SyS_ioctl+0x8f/0xc0 [ 202.729338] ? do_vfs_ioctl+0x1060/0x1060 [ 202.733486] do_syscall_64+0x1e8/0x640 [ 202.738835] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 202.743680] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 202.748863] RIP: 0033:0x459637 [ 202.752053] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 202.759756] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 202.767024] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 202.774307] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 202.781572] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 202.788837] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:25 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:25 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 12:56:25 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:25 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:25 executing program 1 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:25 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:25 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:26 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 203.006231] FAULT_INJECTION: forcing a failure. [ 203.006231] name failslab, interval 1, probability 0, space 0, times 0 12:56:26 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:26 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:26 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 203.076199] CPU: 0 PID: 11762 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 203.083377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.092740] Call Trace: [ 203.095352] dump_stack+0x138/0x19c [ 203.098992] should_fail.cold+0x10f/0x159 [ 203.103156] should_failslab+0xdb/0x130 [ 203.107140] kmem_cache_alloc+0x2d7/0x780 [ 203.111299] ? wait_for_completion+0x420/0x420 [ 203.115909] __kernfs_new_node+0x70/0x420 [ 203.120071] kernfs_new_node+0x80/0xf0 [ 203.123965] __kernfs_create_file+0x46/0x323 [ 203.128369] sysfs_add_file_mode_ns+0x1e4/0x450 [ 203.133034] internal_create_group+0x232/0x7b0 [ 203.137614] sysfs_create_group+0x20/0x30 [ 203.141759] lo_ioctl+0x1176/0x1ce0 [ 203.145385] ? loop_probe+0x160/0x160 [ 203.149201] blkdev_ioctl+0x96b/0x1860 [ 203.153132] ? blkpg_ioctl+0x980/0x980 [ 203.157047] ? __might_sleep+0x93/0xb0 [ 203.160945] ? __fget+0x210/0x370 [ 203.164420] block_ioctl+0xde/0x120 [ 203.168075] ? blkdev_fallocate+0x3b0/0x3b0 [ 203.172431] do_vfs_ioctl+0x7ae/0x1060 [ 203.176436] ? selinux_file_mprotect+0x5d0/0x5d0 [ 203.181397] ? lock_downgrade+0x6e0/0x6e0 [ 203.185612] ? ioctl_preallocate+0x1c0/0x1c0 [ 203.190043] ? __fget+0x237/0x370 [ 203.193819] ? security_file_ioctl+0x89/0xb0 [ 203.198255] SyS_ioctl+0x8f/0xc0 [ 203.201627] ? do_vfs_ioctl+0x1060/0x1060 [ 203.205781] do_syscall_64+0x1e8/0x640 [ 203.209671] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 203.214524] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 203.219711] RIP: 0033:0x459637 12:56:26 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) [ 203.222893] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 203.230602] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 203.237962] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 203.245232] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 203.252507] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 203.259866] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:26 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:26 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:26 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:26 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:26 executing program 1 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:26 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:26 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:26 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:26 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:26 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:26 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 12:56:26 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:26 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:26 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) [ 203.573716] FAULT_INJECTION: forcing a failure. [ 203.573716] name failslab, interval 1, probability 0, space 0, times 0 12:56:26 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:26 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 203.669186] CPU: 1 PID: 11808 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 203.676333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.685699] Call Trace: [ 203.685726] dump_stack+0x138/0x19c [ 203.685747] should_fail.cold+0x10f/0x159 [ 203.685765] should_failslab+0xdb/0x130 [ 203.700093] kmem_cache_alloc+0x2d7/0x780 [ 203.704248] ? wait_for_completion+0x420/0x420 [ 203.708851] __kernfs_new_node+0x70/0x420 [ 203.713013] kernfs_new_node+0x80/0xf0 [ 203.716911] __kernfs_create_file+0x46/0x323 [ 203.716925] sysfs_add_file_mode_ns+0x1e4/0x450 [ 203.716942] internal_create_group+0x232/0x7b0 [ 203.730604] sysfs_create_group+0x20/0x30 [ 203.735232] lo_ioctl+0x1176/0x1ce0 [ 203.738867] ? loop_probe+0x160/0x160 [ 203.742673] blkdev_ioctl+0x96b/0x1860 [ 203.746595] ? blkpg_ioctl+0x980/0x980 [ 203.746614] ? __might_sleep+0x93/0xb0 [ 203.746624] ? __fget+0x210/0x370 [ 203.746638] block_ioctl+0xde/0x120 [ 203.757839] ? blkdev_fallocate+0x3b0/0x3b0 [ 203.757852] do_vfs_ioctl+0x7ae/0x1060 [ 203.757867] ? selinux_file_mprotect+0x5d0/0x5d0 [ 203.757881] ? lock_downgrade+0x6e0/0x6e0 [ 203.778659] ? ioctl_preallocate+0x1c0/0x1c0 [ 203.783082] ? __fget+0x237/0x370 [ 203.786552] ? security_file_ioctl+0x89/0xb0 [ 203.790970] SyS_ioctl+0x8f/0xc0 [ 203.794347] ? do_vfs_ioctl+0x1060/0x1060 [ 203.798503] do_syscall_64+0x1e8/0x640 [ 203.802374] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 203.807206] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 203.812378] RIP: 0033:0x459637 [ 203.815632] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 203.823323] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 203.830601] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 203.837856] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 203.845124] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 203.852482] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:26 executing program 1 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:26 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 12:56:26 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:26 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:26 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:26 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:26 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:27 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 12:56:27 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:27 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 204.019884] FAULT_INJECTION: forcing a failure. [ 204.019884] name failslab, interval 1, probability 0, space 0, times 0 [ 204.084189] CPU: 1 PID: 11845 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 204.091343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.100710] Call Trace: [ 204.103324] dump_stack+0x138/0x19c [ 204.106974] should_fail.cold+0x10f/0x159 [ 204.111135] should_failslab+0xdb/0x130 [ 204.115121] kmem_cache_alloc_trace+0x2e9/0x790 [ 204.119804] ? kernfs_put+0x35e/0x490 [ 204.123611] ? sysfs_add_file_mode_ns+0x1e4/0x450 [ 204.128490] ? devm_device_remove_groups+0x50/0x50 [ 204.133427] kobject_uevent_env+0x378/0xc23 [ 204.137750] ? internal_create_group+0x49a/0x7b0 [ 204.142507] kobject_uevent+0x20/0x26 [ 204.146299] lo_ioctl+0x11e7/0x1ce0 [ 204.149924] ? loop_probe+0x160/0x160 [ 204.153718] blkdev_ioctl+0x96b/0x1860 [ 204.157598] ? blkpg_ioctl+0x980/0x980 [ 204.161486] ? __might_sleep+0x93/0xb0 [ 204.165364] ? __fget+0x210/0x370 [ 204.168829] block_ioctl+0xde/0x120 [ 204.172453] ? blkdev_fallocate+0x3b0/0x3b0 [ 204.176770] do_vfs_ioctl+0x7ae/0x1060 [ 204.180652] ? selinux_file_mprotect+0x5d0/0x5d0 [ 204.185418] ? lock_downgrade+0x6e0/0x6e0 [ 204.189566] ? ioctl_preallocate+0x1c0/0x1c0 [ 204.193974] ? __fget+0x237/0x370 [ 204.197435] ? security_file_ioctl+0x89/0xb0 [ 204.201844] SyS_ioctl+0x8f/0xc0 [ 204.205203] ? do_vfs_ioctl+0x1060/0x1060 [ 204.209351] do_syscall_64+0x1e8/0x640 [ 204.213233] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 204.218075] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 204.223259] RIP: 0033:0x459637 [ 204.226441] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 12:56:27 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 204.234152] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 204.241418] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 204.248687] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 204.255973] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 204.263241] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:27 executing program 1 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:27 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:27 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 12:56:27 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:27 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 12:56:27 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:27 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:27 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:27 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 204.514154] FAULT_INJECTION: forcing a failure. [ 204.514154] name failslab, interval 1, probability 0, space 0, times 0 [ 204.546555] CPU: 1 PID: 11882 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 204.553738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.563239] Call Trace: [ 204.565880] dump_stack+0x138/0x19c [ 204.569917] should_fail.cold+0x10f/0x159 [ 204.574145] should_failslab+0xdb/0x130 [ 204.578262] __kmalloc+0x2f0/0x7a0 [ 204.582024] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 204.587876] ? kobject_uevent_env+0x378/0xc23 [ 204.592425] ? rcu_read_lock_sched_held+0x110/0x130 [ 204.597480] ? kobject_get_path+0xbb/0x1a0 [ 204.601845] kobject_get_path+0xbb/0x1a0 [ 204.605956] ? devm_device_remove_groups+0x50/0x50 [ 204.611052] kobject_uevent_env+0x39c/0xc23 [ 204.615417] ? internal_create_group+0x49a/0x7b0 [ 204.620236] kobject_uevent+0x20/0x26 [ 204.624335] lo_ioctl+0x11e7/0x1ce0 [ 204.628002] ? loop_probe+0x160/0x160 [ 204.631917] blkdev_ioctl+0x96b/0x1860 [ 204.635923] ? blkpg_ioctl+0x980/0x980 [ 204.639879] ? __might_sleep+0x93/0xb0 [ 204.643974] ? __fget+0x210/0x370 [ 204.647457] block_ioctl+0xde/0x120 [ 204.651104] ? blkdev_fallocate+0x3b0/0x3b0 [ 204.655540] do_vfs_ioctl+0x7ae/0x1060 [ 204.659625] ? selinux_file_mprotect+0x5d0/0x5d0 [ 204.664417] ? lock_downgrade+0x6e0/0x6e0 [ 204.668602] ? ioctl_preallocate+0x1c0/0x1c0 [ 204.673048] ? __fget+0x237/0x370 [ 204.676558] ? security_file_ioctl+0x89/0xb0 [ 204.681083] SyS_ioctl+0x8f/0xc0 [ 204.684449] ? do_vfs_ioctl+0x1060/0x1060 [ 204.688603] do_syscall_64+0x1e8/0x640 [ 204.692493] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 204.697347] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 204.702536] RIP: 0033:0x459637 [ 204.705739] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 12:56:27 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 204.713466] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 204.720754] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 204.728035] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 204.735886] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 204.743165] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:27 executing program 1 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:27 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:27 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:27 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 12:56:27 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:27 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 204.937606] FAULT_INJECTION: forcing a failure. [ 204.937606] name failslab, interval 1, probability 0, space 0, times 0 [ 204.952533] CPU: 0 PID: 11920 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 204.959652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.968999] Call Trace: [ 204.971592] dump_stack+0x138/0x19c [ 204.975217] should_fail.cold+0x10f/0x159 [ 204.979353] should_failslab+0xdb/0x130 [ 204.983322] kmem_cache_alloc_node_trace+0x280/0x770 [ 204.988416] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 204.993857] __kmalloc_node_track_caller+0x3d/0x80 [ 204.998803] __kmalloc_reserve.isra.0+0x40/0xe0 [ 205.003487] __alloc_skb+0xcf/0x500 [ 205.007112] ? skb_scrub_packet+0x4b0/0x4b0 [ 205.011447] ? netlink_has_listeners+0x20a/0x330 [ 205.016202] kobject_uevent_env+0x781/0xc23 [ 205.020524] ? internal_create_group+0x49a/0x7b0 [ 205.025297] kobject_uevent+0x20/0x26 [ 205.029100] lo_ioctl+0x11e7/0x1ce0 [ 205.032725] ? loop_probe+0x160/0x160 [ 205.036519] blkdev_ioctl+0x96b/0x1860 [ 205.040399] ? blkpg_ioctl+0x980/0x980 [ 205.044292] ? __might_sleep+0x93/0xb0 [ 205.048171] ? __fget+0x210/0x370 [ 205.051623] block_ioctl+0xde/0x120 [ 205.055251] ? blkdev_fallocate+0x3b0/0x3b0 [ 205.059559] do_vfs_ioctl+0x7ae/0x1060 [ 205.063433] ? selinux_file_mprotect+0x5d0/0x5d0 [ 205.068175] ? lock_downgrade+0x6e0/0x6e0 [ 205.072324] ? ioctl_preallocate+0x1c0/0x1c0 [ 205.076728] ? __fget+0x237/0x370 [ 205.080182] ? security_file_ioctl+0x89/0xb0 [ 205.084586] SyS_ioctl+0x8f/0xc0 [ 205.087934] ? do_vfs_ioctl+0x1060/0x1060 [ 205.092081] do_syscall_64+0x1e8/0x640 [ 205.095993] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 205.100842] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 205.106041] RIP: 0033:0x459637 [ 205.109211] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 205.116901] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 205.124159] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 205.131596] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 12:56:28 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:28 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:28 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:28 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 12:56:28 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 205.138873] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 205.146142] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:28 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 12:56:28 executing program 1 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:28 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:28 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:28 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:28 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 12:56:28 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:28 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:28 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 205.392778] FAULT_INJECTION: forcing a failure. [ 205.392778] name failslab, interval 1, probability 0, space 0, times 0 12:56:28 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:28 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 12:56:28 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 205.474287] CPU: 0 PID: 11951 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 205.481650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.491029] Call Trace: [ 205.493640] dump_stack+0x138/0x19c [ 205.497280] should_fail.cold+0x10f/0x159 [ 205.501451] should_failslab+0xdb/0x130 [ 205.505437] kmem_cache_alloc_node+0x287/0x780 [ 205.510037] __alloc_skb+0x9c/0x500 [ 205.513670] ? skb_scrub_packet+0x4b0/0x4b0 [ 205.517996] ? netlink_has_listeners+0x20a/0x330 12:56:28 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 205.522757] kobject_uevent_env+0x781/0xc23 [ 205.527090] kobject_uevent+0x20/0x26 [ 205.530905] lo_ioctl+0x11e7/0x1ce0 [ 205.534544] ? loop_probe+0x160/0x160 [ 205.538353] blkdev_ioctl+0x96b/0x1860 [ 205.542248] ? blkpg_ioctl+0x980/0x980 [ 205.546145] ? __might_sleep+0x93/0xb0 [ 205.550028] ? __fget+0x210/0x370 [ 205.553479] block_ioctl+0xde/0x120 [ 205.557099] ? blkdev_fallocate+0x3b0/0x3b0 [ 205.561415] do_vfs_ioctl+0x7ae/0x1060 [ 205.565304] ? selinux_file_mprotect+0x5d0/0x5d0 [ 205.570063] ? lock_downgrade+0x6e0/0x6e0 [ 205.574315] ? ioctl_preallocate+0x1c0/0x1c0 [ 205.578722] ? __fget+0x237/0x370 [ 205.582177] ? security_file_ioctl+0x89/0xb0 [ 205.586605] SyS_ioctl+0x8f/0xc0 [ 205.589968] ? do_vfs_ioctl+0x1060/0x1060 [ 205.594149] do_syscall_64+0x1e8/0x640 [ 205.598031] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 205.604381] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 205.609579] RIP: 0033:0x459637 [ 205.612759] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 205.620466] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 205.627741] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 205.635100] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 205.642371] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 205.649656] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 205.670135] net_ratelimit: 21 callbacks suppressed [ 205.670141] protocol 88fb is buggy, dev hsr_slave_0 [ 205.680237] protocol 88fb is buggy, dev hsr_slave_1 12:56:28 executing program 1 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:28 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:28 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:28 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:28 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 12:56:28 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:28 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 205.910653] protocol 88fb is buggy, dev hsr_slave_0 [ 205.915772] protocol 88fb is buggy, dev hsr_slave_1 [ 205.922283] FAULT_INJECTION: forcing a failure. [ 205.922283] name failslab, interval 1, probability 0, space 0, times 0 [ 205.940537] CPU: 1 PID: 11991 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 205.947692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.957072] Call Trace: [ 205.959774] dump_stack+0x138/0x19c [ 205.963434] should_fail.cold+0x10f/0x159 [ 205.967729] should_failslab+0xdb/0x130 [ 205.971827] kmem_cache_alloc_node+0x287/0x780 [ 205.976438] __alloc_skb+0x9c/0x500 [ 205.980172] ? skb_scrub_packet+0x4b0/0x4b0 [ 205.984504] ? netlink_has_listeners+0x20a/0x330 [ 205.989543] kobject_uevent_env+0x781/0xc23 [ 205.993888] kobject_uevent+0x20/0x26 [ 205.997710] lo_ioctl+0x11e7/0x1ce0 [ 206.001350] ? loop_probe+0x160/0x160 [ 206.005175] blkdev_ioctl+0x96b/0x1860 [ 206.009075] ? blkpg_ioctl+0x980/0x980 [ 206.012981] ? __might_sleep+0x93/0xb0 [ 206.016976] ? __fget+0x210/0x370 [ 206.020530] block_ioctl+0xde/0x120 [ 206.024524] ? blkdev_fallocate+0x3b0/0x3b0 [ 206.028887] do_vfs_ioctl+0x7ae/0x1060 [ 206.032790] ? selinux_file_mprotect+0x5d0/0x5d0 [ 206.037572] ? lock_downgrade+0x6e0/0x6e0 [ 206.041733] ? ioctl_preallocate+0x1c0/0x1c0 [ 206.046157] ? __fget+0x237/0x370 [ 206.049720] ? security_file_ioctl+0x89/0xb0 [ 206.054145] SyS_ioctl+0x8f/0xc0 [ 206.057531] ? do_vfs_ioctl+0x1060/0x1060 [ 206.061700] do_syscall_64+0x1e8/0x640 [ 206.065603] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 206.070466] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 206.075752] RIP: 0033:0x459637 [ 206.078949] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 206.086761] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 206.094040] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 206.101315] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 12:56:28 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:28 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:28 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 12:56:28 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:29 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) [ 206.108601] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 206.116160] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:29 executing program 1 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:29 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:29 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 12:56:29 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:29 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:29 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:29 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) [ 206.263609] FAULT_INJECTION: forcing a failure. [ 206.263609] name failslab, interval 1, probability 0, space 0, times 0 [ 206.284283] CPU: 0 PID: 12024 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 206.292091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.301749] Call Trace: [ 206.304357] dump_stack+0x138/0x19c [ 206.307995] should_fail.cold+0x10f/0x159 [ 206.312154] should_failslab+0xdb/0x130 [ 206.316141] kmem_cache_alloc_node_trace+0x280/0x770 [ 206.322123] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 206.327579] __kmalloc_node_track_caller+0x3d/0x80 [ 206.332507] __kmalloc_reserve.isra.0+0x40/0xe0 [ 206.337189] __alloc_skb+0xcf/0x500 [ 206.340813] ? skb_scrub_packet+0x4b0/0x4b0 [ 206.345133] ? netlink_has_listeners+0x20a/0x330 [ 206.349885] kobject_uevent_env+0x781/0xc23 [ 206.354206] kobject_uevent+0x20/0x26 [ 206.358001] lo_ioctl+0x11e7/0x1ce0 [ 206.361624] ? loop_probe+0x160/0x160 [ 206.365415] blkdev_ioctl+0x96b/0x1860 [ 206.369295] ? blkpg_ioctl+0x980/0x980 [ 206.373185] ? __might_sleep+0x93/0xb0 [ 206.377060] ? __fget+0x210/0x370 [ 206.380511] block_ioctl+0xde/0x120 [ 206.384128] ? blkdev_fallocate+0x3b0/0x3b0 [ 206.388441] do_vfs_ioctl+0x7ae/0x1060 [ 206.392329] ? selinux_file_mprotect+0x5d0/0x5d0 [ 206.397078] ? lock_downgrade+0x6e0/0x6e0 [ 206.401351] ? ioctl_preallocate+0x1c0/0x1c0 [ 206.405822] ? __fget+0x237/0x370 [ 206.409680] ? security_file_ioctl+0x89/0xb0 [ 206.414135] SyS_ioctl+0x8f/0xc0 [ 206.417600] ? do_vfs_ioctl+0x1060/0x1060 [ 206.421766] do_syscall_64+0x1e8/0x640 [ 206.425674] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 206.430532] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 206.435733] RIP: 0033:0x459637 [ 206.438932] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 206.446659] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 206.453936] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 12:56:29 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:29 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 206.461214] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 206.468506] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 206.475782] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:29 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 12:56:29 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:29 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:29 executing program 1 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:29 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:29 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:29 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:29 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 12:56:29 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:29 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:29 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:29 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:29 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 12:56:29 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:29 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 206.789716] FAULT_INJECTION: forcing a failure. [ 206.789716] name failslab, interval 1, probability 0, space 0, times 0 [ 206.810143] protocol 88fb is buggy, dev hsr_slave_0 [ 206.815259] protocol 88fb is buggy, dev hsr_slave_1 [ 206.839450] CPU: 1 PID: 12062 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 206.846598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.855959] Call Trace: [ 206.858573] dump_stack+0x138/0x19c [ 206.862214] should_fail.cold+0x10f/0x159 [ 206.866379] should_failslab+0xdb/0x130 [ 206.870368] kmem_cache_alloc_node_trace+0x280/0x770 [ 206.875483] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 206.881017] __kmalloc_node_track_caller+0x3d/0x80 [ 206.885938] __kmalloc_reserve.isra.0+0x40/0xe0 [ 206.890595] __alloc_skb+0xcf/0x500 [ 206.894217] ? skb_scrub_packet+0x4b0/0x4b0 [ 206.898537] ? netlink_has_listeners+0x20a/0x330 [ 206.903296] kobject_uevent_env+0x781/0xc23 [ 206.907629] kobject_uevent+0x20/0x26 [ 206.911424] lo_ioctl+0x11e7/0x1ce0 [ 206.915034] ? loop_probe+0x160/0x160 [ 206.918847] blkdev_ioctl+0x96b/0x1860 [ 206.922719] ? blkpg_ioctl+0x980/0x980 [ 206.926617] ? __might_sleep+0x93/0xb0 [ 206.930494] ? __fget+0x210/0x370 [ 206.933930] block_ioctl+0xde/0x120 [ 206.937537] ? blkdev_fallocate+0x3b0/0x3b0 [ 206.941847] do_vfs_ioctl+0x7ae/0x1060 [ 206.945737] ? selinux_file_mprotect+0x5d0/0x5d0 [ 206.950478] ? lock_downgrade+0x6e0/0x6e0 [ 206.954627] ? ioctl_preallocate+0x1c0/0x1c0 [ 206.959022] ? __fget+0x237/0x370 [ 206.962462] ? security_file_ioctl+0x89/0xb0 [ 206.966878] SyS_ioctl+0x8f/0xc0 [ 206.970230] ? do_vfs_ioctl+0x1060/0x1060 [ 206.974429] do_syscall_64+0x1e8/0x640 [ 206.978299] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 206.983130] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 206.988325] RIP: 0033:0x459637 [ 206.991504] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 206.999201] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 207.006457] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 207.013730] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 207.020986] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 207.028249] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 207.035983] protocol 88fb is buggy, dev hsr_slave_0 [ 207.040266] protocol 88fb is buggy, dev hsr_slave_0 [ 207.041097] protocol 88fb is buggy, dev hsr_slave_1 [ 207.046059] protocol 88fb is buggy, dev hsr_slave_1 12:56:30 executing program 1 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:30 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:30 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:30 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 12:56:30 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:30 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:30 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 12:56:30 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:30 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:30 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:30 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 207.238997] FAULT_INJECTION: forcing a failure. [ 207.238997] name failslab, interval 1, probability 0, space 0, times 0 [ 207.293132] CPU: 0 PID: 12095 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 207.300285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.309660] Call Trace: [ 207.312253] dump_stack+0x138/0x19c [ 207.315880] should_fail.cold+0x10f/0x159 [ 207.320026] should_failslab+0xdb/0x130 [ 207.324010] kmem_cache_alloc_node_trace+0x280/0x770 [ 207.329119] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 207.334594] __kmalloc_node_track_caller+0x3d/0x80 [ 207.339543] __kmalloc_reserve.isra.0+0x40/0xe0 [ 207.344252] __alloc_skb+0xcf/0x500 [ 207.347891] ? skb_scrub_packet+0x4b0/0x4b0 [ 207.352219] ? netlink_has_listeners+0x20a/0x330 [ 207.356988] kobject_uevent_env+0x781/0xc23 [ 207.361325] kobject_uevent+0x20/0x26 [ 207.365124] lo_ioctl+0x11e7/0x1ce0 [ 207.368747] ? loop_probe+0x160/0x160 [ 207.372542] blkdev_ioctl+0x96b/0x1860 [ 207.376425] ? blkpg_ioctl+0x980/0x980 [ 207.380321] ? __might_sleep+0x93/0xb0 [ 207.384206] ? __fget+0x210/0x370 [ 207.387670] block_ioctl+0xde/0x120 [ 207.391299] ? blkdev_fallocate+0x3b0/0x3b0 [ 207.395659] do_vfs_ioctl+0x7ae/0x1060 [ 207.399545] ? selinux_file_mprotect+0x5d0/0x5d0 [ 207.404412] ? lock_downgrade+0x6e0/0x6e0 [ 207.408555] ? ioctl_preallocate+0x1c0/0x1c0 [ 207.412961] ? __fget+0x237/0x370 [ 207.416415] ? security_file_ioctl+0x89/0xb0 [ 207.420816] SyS_ioctl+0x8f/0xc0 [ 207.424175] ? do_vfs_ioctl+0x1060/0x1060 [ 207.428324] do_syscall_64+0x1e8/0x640 [ 207.432202] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 207.437043] entry_SYSCALL_64_after_hwframe+0x42/0xb7 12:56:30 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 207.442223] RIP: 0033:0x459637 [ 207.445402] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 207.453102] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 207.460366] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 207.467628] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 207.474892] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 207.482151] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:30 executing program 1 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:30 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:30 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 12:56:30 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:30 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:30 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:30 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 207.711765] FAULT_INJECTION: forcing a failure. [ 207.711765] name failslab, interval 1, probability 0, space 0, times 0 [ 207.728348] CPU: 1 PID: 12131 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 207.735469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.735479] Call Trace: [ 207.747461] dump_stack+0x138/0x19c [ 207.751102] should_fail.cold+0x10f/0x159 [ 207.755265] should_failslab+0xdb/0x130 [ 207.759250] kmem_cache_alloc_node+0x287/0x780 [ 207.763843] __alloc_skb+0x9c/0x500 [ 207.767500] ? skb_scrub_packet+0x4b0/0x4b0 [ 207.771821] ? netlink_has_listeners+0x20a/0x330 [ 207.776573] kobject_uevent_env+0x781/0xc23 [ 207.780898] kobject_uevent+0x20/0x26 [ 207.784697] lo_ioctl+0x11e7/0x1ce0 [ 207.788319] ? loop_probe+0x160/0x160 [ 207.792115] blkdev_ioctl+0x96b/0x1860 [ 207.795997] ? blkpg_ioctl+0x980/0x980 [ 207.799885] ? __might_sleep+0x93/0xb0 [ 207.803765] ? __fget+0x210/0x370 [ 207.807215] block_ioctl+0xde/0x120 [ 207.810835] ? blkdev_fallocate+0x3b0/0x3b0 [ 207.815166] do_vfs_ioctl+0x7ae/0x1060 [ 207.819051] ? selinux_file_mprotect+0x5d0/0x5d0 [ 207.823820] ? lock_downgrade+0x6e0/0x6e0 [ 207.827968] ? ioctl_preallocate+0x1c0/0x1c0 [ 207.832374] ? __fget+0x237/0x370 [ 207.835830] ? security_file_ioctl+0x89/0xb0 [ 207.840237] SyS_ioctl+0x8f/0xc0 [ 207.843595] ? do_vfs_ioctl+0x1060/0x1060 [ 207.847761] do_syscall_64+0x1e8/0x640 [ 207.851645] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 207.856487] entry_SYSCALL_64_after_hwframe+0x42/0xb7 12:56:30 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 12:56:30 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:30 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 207.861667] RIP: 0033:0x459637 [ 207.864845] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 207.872545] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 207.879812] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 207.887077] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 207.894339] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 207.901599] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:30 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:30 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:31 executing program 1 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:31 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 12:56:31 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:31 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:31 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:31 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:31 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:31 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:31 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) [ 208.126512] FAULT_INJECTION: forcing a failure. [ 208.126512] name failslab, interval 1, probability 0, space 0, times 0 12:56:31 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:31 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 208.177780] CPU: 1 PID: 12159 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 208.184930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.194294] Call Trace: [ 208.196926] dump_stack+0x138/0x19c [ 208.200592] should_fail.cold+0x10f/0x159 [ 208.204795] should_failslab+0xdb/0x130 [ 208.208831] kmem_cache_alloc_node_trace+0x280/0x770 [ 208.213978] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 208.219512] __kmalloc_node_track_caller+0x3d/0x80 12:56:31 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) [ 208.224487] __kmalloc_reserve.isra.0+0x40/0xe0 [ 208.229280] __alloc_skb+0xcf/0x500 [ 208.232936] ? skb_scrub_packet+0x4b0/0x4b0 [ 208.237295] ? netlink_has_listeners+0x20a/0x330 [ 208.242137] kobject_uevent_env+0x781/0xc23 [ 208.246530] kobject_uevent+0x20/0x26 [ 208.250365] lo_ioctl+0x11e7/0x1ce0 [ 208.254017] ? loop_probe+0x160/0x160 [ 208.257849] blkdev_ioctl+0x96b/0x1860 [ 208.261861] ? blkpg_ioctl+0x980/0x980 [ 208.265788] ? __might_sleep+0x93/0xb0 [ 208.269705] ? __fget+0x210/0x370 [ 208.273191] block_ioctl+0xde/0x120 [ 208.276846] ? blkdev_fallocate+0x3b0/0x3b0 [ 208.281200] do_vfs_ioctl+0x7ae/0x1060 [ 208.285130] ? selinux_file_mprotect+0x5d0/0x5d0 [ 208.290611] ? lock_downgrade+0x6e0/0x6e0 [ 208.294806] ? ioctl_preallocate+0x1c0/0x1c0 [ 208.299262] ? __fget+0x237/0x370 [ 208.302842] ? security_file_ioctl+0x89/0xb0 [ 208.307267] SyS_ioctl+0x8f/0xc0 [ 208.310638] ? do_vfs_ioctl+0x1060/0x1060 [ 208.314792] do_syscall_64+0x1e8/0x640 [ 208.318667] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 208.323499] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 208.328668] RIP: 0033:0x459637 [ 208.331836] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 208.339545] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 208.346802] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 208.354087] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 208.361347] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 208.368602] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:31 executing program 1 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:31 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:31 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 12:56:31 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:31 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:31 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:31 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:31 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:31 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:31 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 208.570658] FAULT_INJECTION: forcing a failure. [ 208.570658] name failslab, interval 1, probability 0, space 0, times 0 [ 208.606119] CPU: 1 PID: 12203 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 208.613264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.622623] Call Trace: [ 208.625254] dump_stack+0x138/0x19c [ 208.628901] should_fail.cold+0x10f/0x159 [ 208.633061] should_failslab+0xdb/0x130 [ 208.637041] kmem_cache_alloc_node+0x287/0x780 [ 208.641636] __alloc_skb+0x9c/0x500 [ 208.645263] ? skb_scrub_packet+0x4b0/0x4b0 [ 208.649589] ? netlink_has_listeners+0x20a/0x330 [ 208.654471] kobject_uevent_env+0x781/0xc23 [ 208.658821] kobject_uevent+0x20/0x26 [ 208.662639] lo_ioctl+0x11e7/0x1ce0 [ 208.666270] ? loop_probe+0x160/0x160 [ 208.670077] blkdev_ioctl+0x96b/0x1860 [ 208.673974] ? blkpg_ioctl+0x980/0x980 [ 208.677877] ? __might_sleep+0x93/0xb0 [ 208.681772] ? __fget+0x210/0x370 [ 208.685224] block_ioctl+0xde/0x120 [ 208.688841] ? blkdev_fallocate+0x3b0/0x3b0 [ 208.693161] do_vfs_ioctl+0x7ae/0x1060 [ 208.697046] ? selinux_file_mprotect+0x5d0/0x5d0 [ 208.701796] ? lock_downgrade+0x6e0/0x6e0 [ 208.705939] ? ioctl_preallocate+0x1c0/0x1c0 [ 208.710345] ? __fget+0x237/0x370 [ 208.713827] ? security_file_ioctl+0x89/0xb0 [ 208.718229] SyS_ioctl+0x8f/0xc0 [ 208.721587] ? do_vfs_ioctl+0x1060/0x1060 [ 208.725734] do_syscall_64+0x1e8/0x640 [ 208.729617] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 208.735884] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 208.741084] RIP: 0033:0x459637 [ 208.744260] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 208.751957] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 208.759223] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 12:56:31 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:31 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 208.766482] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 208.773737] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 208.780995] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:31 executing program 1 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:31 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:31 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 12:56:31 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:31 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:31 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:31 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 12:56:31 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:32 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:32 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:32 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:32 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(r0, &(0x7f00000017c0), 0x324, 0x0) [ 209.018620] FAULT_INJECTION: forcing a failure. [ 209.018620] name failslab, interval 1, probability 0, space 0, times 0 [ 209.064630] CPU: 1 PID: 12239 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 209.071770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.081157] Call Trace: [ 209.083756] dump_stack+0x138/0x19c [ 209.087389] should_fail.cold+0x10f/0x159 [ 209.091539] should_failslab+0xdb/0x130 [ 209.095510] kmem_cache_alloc_node_trace+0x280/0x770 [ 209.100623] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 209.106070] __kmalloc_node_track_caller+0x3d/0x80 [ 209.110994] __kmalloc_reserve.isra.0+0x40/0xe0 [ 209.115657] __alloc_skb+0xcf/0x500 [ 209.119276] ? skb_scrub_packet+0x4b0/0x4b0 [ 209.123593] ? netlink_has_listeners+0x20a/0x330 [ 209.128348] kobject_uevent_env+0x781/0xc23 [ 209.132671] kobject_uevent+0x20/0x26 [ 209.136468] lo_ioctl+0x11e7/0x1ce0 [ 209.140089] ? loop_probe+0x160/0x160 [ 209.143883] blkdev_ioctl+0x96b/0x1860 [ 209.147763] ? blkpg_ioctl+0x980/0x980 [ 209.151651] ? __might_sleep+0x93/0xb0 [ 209.155529] ? __fget+0x210/0x370 [ 209.158976] block_ioctl+0xde/0x120 [ 209.162598] ? blkdev_fallocate+0x3b0/0x3b0 [ 209.166915] do_vfs_ioctl+0x7ae/0x1060 [ 209.170799] ? selinux_file_mprotect+0x5d0/0x5d0 [ 209.175562] ? lock_downgrade+0x6e0/0x6e0 [ 209.179712] ? ioctl_preallocate+0x1c0/0x1c0 [ 209.184120] ? __fget+0x237/0x370 [ 209.187580] ? security_file_ioctl+0x89/0xb0 [ 209.191989] SyS_ioctl+0x8f/0xc0 [ 209.195377] ? do_vfs_ioctl+0x1060/0x1060 [ 209.199533] do_syscall_64+0x1e8/0x640 [ 209.203415] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 209.208267] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 209.213449] RIP: 0033:0x459637 [ 209.216630] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 209.224333] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 209.231599] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 209.238860] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 209.246123] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 209.253382] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:32 executing program 1 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:32 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:32 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 12:56:32 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:32 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:32 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 209.450481] FAULT_INJECTION: forcing a failure. [ 209.450481] name failslab, interval 1, probability 0, space 0, times 0 [ 209.480741] CPU: 0 PID: 12266 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 209.487880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.497241] Call Trace: [ 209.499840] dump_stack+0x138/0x19c [ 209.503473] should_fail.cold+0x10f/0x159 [ 209.507811] should_failslab+0xdb/0x130 [ 209.511791] kmem_cache_alloc_node_trace+0x280/0x770 [ 209.516893] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 209.522351] __kmalloc_node_track_caller+0x3d/0x80 [ 209.527282] __kmalloc_reserve.isra.0+0x40/0xe0 [ 209.531952] __alloc_skb+0xcf/0x500 [ 209.535573] ? skb_scrub_packet+0x4b0/0x4b0 [ 209.539886] ? netlink_has_listeners+0x20a/0x330 [ 209.544642] kobject_uevent_env+0x781/0xc23 [ 209.548966] kobject_uevent+0x20/0x26 [ 209.552783] lo_ioctl+0x11e7/0x1ce0 [ 209.556418] ? loop_probe+0x160/0x160 [ 209.560217] blkdev_ioctl+0x96b/0x1860 [ 209.564096] ? blkpg_ioctl+0x980/0x980 [ 209.567983] ? __might_sleep+0x93/0xb0 [ 209.571952] ? __fget+0x210/0x370 [ 209.575405] block_ioctl+0xde/0x120 [ 209.579022] ? blkdev_fallocate+0x3b0/0x3b0 [ 209.583342] do_vfs_ioctl+0x7ae/0x1060 [ 209.587230] ? selinux_file_mprotect+0x5d0/0x5d0 [ 209.591987] ? lock_downgrade+0x6e0/0x6e0 [ 209.596135] ? ioctl_preallocate+0x1c0/0x1c0 [ 209.600539] ? __fget+0x237/0x370 [ 209.605527] ? security_file_ioctl+0x89/0xb0 [ 209.609932] SyS_ioctl+0x8f/0xc0 [ 209.613292] ? do_vfs_ioctl+0x1060/0x1060 [ 209.617445] do_syscall_64+0x1e8/0x640 [ 209.621332] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 209.626177] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 209.631364] RIP: 0033:0x459637 [ 209.634542] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 209.642248] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 12:56:32 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:32 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:32 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 12:56:32 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 209.649520] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 209.656793] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 209.664057] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 209.671329] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:32 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:32 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:32 executing program 1 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:32 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:32 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x324, 0x0) 12:56:32 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:32 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:32 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:32 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:32 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 209.937225] FAULT_INJECTION: forcing a failure. [ 209.937225] name failslab, interval 1, probability 0, space 0, times 0 [ 209.967485] CPU: 1 PID: 12308 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 209.974618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.983981] Call Trace: 12:56:32 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:33 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 209.986585] dump_stack+0x138/0x19c [ 209.990230] should_fail.cold+0x10f/0x159 [ 209.994391] should_failslab+0xdb/0x130 [ 209.998373] kmem_cache_alloc_node_trace+0x280/0x770 [ 210.003486] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 210.008953] __kmalloc_node_track_caller+0x3d/0x80 [ 210.013901] __kmalloc_reserve.isra.0+0x40/0xe0 [ 210.018582] __alloc_skb+0xcf/0x500 [ 210.022213] ? skb_scrub_packet+0x4b0/0x4b0 [ 210.026540] ? netlink_has_listeners+0x20a/0x330 [ 210.031307] kobject_uevent_env+0x781/0xc23 12:56:33 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:33 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 210.035644] kobject_uevent+0x20/0x26 [ 210.039458] lo_ioctl+0x11e7/0x1ce0 [ 210.043100] ? loop_probe+0x160/0x160 [ 210.046911] blkdev_ioctl+0x96b/0x1860 [ 210.050799] ? blkpg_ioctl+0x980/0x980 [ 210.054708] ? __might_sleep+0x93/0xb0 [ 210.058605] ? __fget+0x210/0x370 [ 210.062068] block_ioctl+0xde/0x120 [ 210.065699] ? blkdev_fallocate+0x3b0/0x3b0 [ 210.070026] do_vfs_ioctl+0x7ae/0x1060 [ 210.073921] ? selinux_file_mprotect+0x5d0/0x5d0 [ 210.078682] ? lock_downgrade+0x6e0/0x6e0 [ 210.082846] ? ioctl_preallocate+0x1c0/0x1c0 [ 210.087258] ? __fget+0x237/0x370 [ 210.090724] ? security_file_ioctl+0x89/0xb0 [ 210.095141] SyS_ioctl+0x8f/0xc0 [ 210.098514] ? do_vfs_ioctl+0x1060/0x1060 [ 210.102664] do_syscall_64+0x1e8/0x640 [ 210.106556] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 210.111408] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 210.116586] RIP: 0033:0x459637 [ 210.119755] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 210.127459] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 210.134730] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 210.141990] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 210.149268] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 210.156548] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:33 executing program 1 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:33 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:33 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:33 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:33 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:33 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:33 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:33 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:33 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 210.378194] FAULT_INJECTION: forcing a failure. [ 210.378194] name failslab, interval 1, probability 0, space 0, times 0 [ 210.404856] CPU: 0 PID: 12346 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 210.411999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.421359] Call Trace: [ 210.421386] dump_stack+0x138/0x19c [ 210.421410] should_fail.cold+0x10f/0x159 [ 210.421431] should_failslab+0xdb/0x130 [ 210.421449] kmem_cache_alloc_node+0x287/0x780 [ 210.421470] __alloc_skb+0x9c/0x500 [ 210.421482] ? skb_scrub_packet+0x4b0/0x4b0 [ 210.427694] ? netlink_has_listeners+0x20a/0x330 [ 210.453027] kobject_uevent_env+0x781/0xc23 [ 210.457366] kobject_uevent+0x20/0x26 [ 210.461182] lo_ioctl+0x11e7/0x1ce0 [ 210.464812] ? loop_probe+0x160/0x160 [ 210.468617] blkdev_ioctl+0x96b/0x1860 [ 210.472508] ? blkpg_ioctl+0x980/0x980 [ 210.476412] ? __might_sleep+0x93/0xb0 [ 210.480314] ? __fget+0x210/0x370 [ 210.483776] block_ioctl+0xde/0x120 [ 210.487414] ? blkdev_fallocate+0x3b0/0x3b0 [ 210.491753] do_vfs_ioctl+0x7ae/0x1060 [ 210.495651] ? selinux_file_mprotect+0x5d0/0x5d0 [ 210.500412] ? lock_downgrade+0x6e0/0x6e0 [ 210.504569] ? ioctl_preallocate+0x1c0/0x1c0 [ 210.508995] ? __fget+0x237/0x370 [ 210.512461] ? security_file_ioctl+0x89/0xb0 [ 210.516881] SyS_ioctl+0x8f/0xc0 [ 210.520249] ? do_vfs_ioctl+0x1060/0x1060 [ 210.524414] do_syscall_64+0x1e8/0x640 12:56:33 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:33 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:33 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 210.528305] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 210.533172] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 210.538369] RIP: 0033:0x459637 [ 210.541556] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 210.549271] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 210.557858] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 210.565571] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 210.572844] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 210.580110] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:33 executing program 1 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:33 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:33 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:33 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:33 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:33 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:33 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 210.736735] FAULT_INJECTION: forcing a failure. [ 210.736735] name failslab, interval 1, probability 0, space 0, times 0 [ 210.755748] CPU: 0 PID: 12375 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 210.762875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.772225] Call Trace: [ 210.774819] dump_stack+0x138/0x19c [ 210.778461] should_fail.cold+0x10f/0x159 [ 210.782608] should_failslab+0xdb/0x130 [ 210.786582] kmem_cache_alloc_node+0x287/0x780 [ 210.791168] __alloc_skb+0x9c/0x500 [ 210.794787] ? skb_scrub_packet+0x4b0/0x4b0 [ 210.799105] ? netlink_has_listeners+0x20a/0x330 [ 210.803857] kobject_uevent_env+0x781/0xc23 [ 210.808182] kobject_uevent+0x20/0x26 [ 210.811978] lo_ioctl+0x11e7/0x1ce0 [ 210.815600] ? loop_probe+0x160/0x160 [ 210.819394] blkdev_ioctl+0x96b/0x1860 [ 210.823278] ? blkpg_ioctl+0x980/0x980 [ 210.827169] ? __might_sleep+0x93/0xb0 [ 210.831051] ? __fget+0x210/0x370 [ 210.834500] block_ioctl+0xde/0x120 [ 210.838122] ? blkdev_fallocate+0x3b0/0x3b0 [ 210.842438] do_vfs_ioctl+0x7ae/0x1060 [ 210.846327] ? selinux_file_mprotect+0x5d0/0x5d0 [ 210.851079] ? lock_downgrade+0x6e0/0x6e0 [ 210.855219] ? ioctl_preallocate+0x1c0/0x1c0 [ 210.859620] ? __fget+0x237/0x370 [ 210.863072] ? security_file_ioctl+0x89/0xb0 [ 210.867475] SyS_ioctl+0x8f/0xc0 [ 210.870834] ? do_vfs_ioctl+0x1060/0x1060 [ 210.875747] do_syscall_64+0x1e8/0x640 [ 210.879627] ? trace_hardirqs_off_thunk+0x1a/0x1c 12:56:33 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:33 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 210.884470] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 210.889651] RIP: 0033:0x459637 [ 210.892829] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 210.900527] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 210.907788] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 210.915047] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 210.922303] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 210.929566] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:33 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:33 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:33 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 210.950114] net_ratelimit: 18 callbacks suppressed [ 210.950119] protocol 88fb is buggy, dev hsr_slave_0 [ 210.960222] protocol 88fb is buggy, dev hsr_slave_1 12:56:34 executing program 1 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:34 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:34 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:34 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:34 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:34 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:34 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:34 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:34 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:34 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:34 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 211.230940] FAULT_INJECTION: forcing a failure. [ 211.230940] name failslab, interval 1, probability 0, space 0, times 0 [ 211.270140] protocol 88fb is buggy, dev hsr_slave_0 [ 211.275325] protocol 88fb is buggy, dev hsr_slave_1 12:56:34 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) [ 211.283171] CPU: 0 PID: 12414 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 211.290298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.299663] Call Trace: [ 211.302268] dump_stack+0x138/0x19c [ 211.305910] should_fail.cold+0x10f/0x159 [ 211.310070] should_failslab+0xdb/0x130 [ 211.314061] kmem_cache_alloc_node_trace+0x280/0x770 [ 211.319171] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 211.324635] __kmalloc_node_track_caller+0x3d/0x80 [ 211.329579] __kmalloc_reserve.isra.0+0x40/0xe0 [ 211.334258] __alloc_skb+0xcf/0x500 [ 211.337898] ? skb_scrub_packet+0x4b0/0x4b0 [ 211.342227] ? netlink_has_listeners+0x20a/0x330 [ 211.347008] kobject_uevent_env+0x781/0xc23 [ 211.351378] kobject_uevent+0x20/0x26 [ 211.355212] lo_ioctl+0x11e7/0x1ce0 [ 211.358869] ? loop_probe+0x160/0x160 [ 211.362700] blkdev_ioctl+0x96b/0x1860 [ 211.366617] ? blkpg_ioctl+0x980/0x980 [ 211.370627] ? __might_sleep+0x93/0xb0 [ 211.374547] ? __fget+0x210/0x370 [ 211.378035] block_ioctl+0xde/0x120 [ 211.381694] ? blkdev_fallocate+0x3b0/0x3b0 [ 211.386052] do_vfs_ioctl+0x7ae/0x1060 [ 211.389974] ? selinux_file_mprotect+0x5d0/0x5d0 [ 211.394765] ? lock_downgrade+0x6e0/0x6e0 [ 211.399124] ? ioctl_preallocate+0x1c0/0x1c0 [ 211.403577] ? __fget+0x237/0x370 [ 211.407152] ? security_file_ioctl+0x89/0xb0 [ 211.411673] SyS_ioctl+0x8f/0xc0 [ 211.415057] ? do_vfs_ioctl+0x1060/0x1060 [ 211.419273] do_syscall_64+0x1e8/0x640 [ 211.423190] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 211.428067] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 211.433314] RIP: 0033:0x459637 [ 211.436517] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 211.444239] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459637 [ 211.451518] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 211.458781] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 211.466039] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 211.473300] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 211.480888] protocol 88fb is buggy, dev hsr_slave_0 [ 211.485976] protocol 88fb is buggy, dev hsr_slave_1 [ 211.510150] protocol 88fb is buggy, dev hsr_slave_0 [ 211.515355] protocol 88fb is buggy, dev hsr_slave_1 12:56:34 executing program 1 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:34 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:34 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:34 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:34 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:34 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:34 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:34 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:34 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:34 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 211.709608] FAULT_INJECTION: forcing a failure. [ 211.709608] name failslab, interval 1, probability 0, space 0, times 0 [ 211.750121] CPU: 1 PID: 12451 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 211.757266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.766624] Call Trace: [ 211.769260] dump_stack+0x138/0x19c [ 211.772909] should_fail.cold+0x10f/0x159 [ 211.777076] should_failslab+0xdb/0x130 [ 211.781059] kmem_cache_alloc+0x2d7/0x780 [ 211.785215] ? __d_lookup+0x3a2/0x670 [ 211.789023] ? mark_held_locks+0xb1/0x100 [ 211.793174] ? d_lookup+0xe5/0x240 [ 211.796720] __d_alloc+0x2d/0x9f0 12:56:34 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:34 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 211.800183] d_alloc+0x4d/0x270 [ 211.803479] __lookup_hash+0x58/0x180 [ 211.807287] filename_create+0x16c/0x430 [ 211.811356] ? kern_path_mountpoint+0x40/0x40 [ 211.815864] SyS_mkdir+0x92/0x200 [ 211.819325] ? SyS_mkdirat+0x210/0x210 [ 211.823246] ? do_syscall_64+0x53/0x640 [ 211.827232] ? SyS_mkdirat+0x210/0x210 [ 211.831129] do_syscall_64+0x1e8/0x640 [ 211.835024] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 211.839879] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 211.845066] RIP: 0033:0x458be7 [ 211.848256] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 211.855972] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458be7 [ 211.863243] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 211.870509] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 211.877760] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 211.885010] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:34 executing program 1 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:34 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:34 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:34 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:34 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:34 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:35 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 212.009003] FAULT_INJECTION: forcing a failure. [ 212.009003] name failslab, interval 1, probability 0, space 0, times 0 [ 212.037320] CPU: 1 PID: 12486 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 212.044461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.053817] Call Trace: 12:56:35 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:35 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 212.053868] dump_stack+0x138/0x19c [ 212.060061] should_fail.cold+0x10f/0x159 [ 212.060079] should_failslab+0xdb/0x130 [ 212.060092] kmem_cache_alloc+0x2d7/0x780 [ 212.060104] ? __d_lookup+0x3a2/0x670 [ 212.060116] ? mark_held_locks+0xb1/0x100 [ 212.060127] ? d_lookup+0xe5/0x240 [ 212.083823] __d_alloc+0x2d/0x9f0 [ 212.087291] d_alloc+0x4d/0x270 [ 212.090584] __lookup_hash+0x58/0x180 [ 212.094653] filename_create+0x16c/0x430 [ 212.098731] ? kern_path_mountpoint+0x40/0x40 [ 212.103243] SyS_mkdir+0x92/0x200 [ 212.106704] ? SyS_mkdirat+0x210/0x210 [ 212.110594] ? do_syscall_64+0x53/0x640 [ 212.114571] ? SyS_mkdirat+0x210/0x210 [ 212.118465] do_syscall_64+0x1e8/0x640 [ 212.122353] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 212.127206] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 212.132393] RIP: 0033:0x458be7 [ 212.132400] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 212.132410] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458be7 [ 212.132416] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 12:56:35 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:35 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:35 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:35 executing program 1 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:35 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 212.132421] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 212.132426] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 212.132432] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:35 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:35 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 212.230132] protocol 88fb is buggy, dev hsr_slave_0 [ 212.230172] protocol 88fb is buggy, dev hsr_slave_1 12:56:35 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:35 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:35 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:35 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 212.328069] FAULT_INJECTION: forcing a failure. [ 212.328069] name failslab, interval 1, probability 0, space 0, times 0 12:56:35 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 212.405644] CPU: 0 PID: 12512 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 212.412793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.422161] Call Trace: [ 212.424768] dump_stack+0x138/0x19c [ 212.428420] should_fail.cold+0x10f/0x159 [ 212.432581] should_failslab+0xdb/0x130 [ 212.436580] kmem_cache_alloc+0x2d7/0x780 [ 212.440737] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 212.446226] ? ext4_sync_fs+0x800/0x800 [ 212.450225] ext4_alloc_inode+0x1d/0x610 [ 212.454291] alloc_inode+0x64/0x180 [ 212.457944] new_inode_pseudo+0x19/0xf0 [ 212.461913] new_inode+0x1f/0x40 [ 212.461923] __ext4_new_inode+0x32c/0x4860 [ 212.461944] ? avc_has_perm+0x2df/0x4b0 [ 212.461954] ? ext4_free_inode+0x1210/0x1210 [ 212.461972] ? dquot_get_next_dqblk+0x160/0x160 [ 212.461988] ext4_mkdir+0x331/0xc20 [ 212.462007] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 212.462020] ? security_inode_mkdir+0xd0/0x110 [ 212.495445] vfs_mkdir+0x3ca/0x610 [ 212.498985] SyS_mkdir+0x1b7/0x200 [ 212.502523] ? SyS_mkdirat+0x210/0x210 [ 212.506443] ? do_syscall_64+0x53/0x640 [ 212.510416] ? SyS_mkdirat+0x210/0x210 [ 212.514388] do_syscall_64+0x1e8/0x640 [ 212.518271] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 212.523120] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 212.528300] RIP: 0033:0x458be7 [ 212.531483] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 212.539200] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458be7 12:56:35 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:35 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:35 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 212.546469] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 212.560080] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 212.567347] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 212.574607] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:35 executing program 1 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:35 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:35 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:35 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:35 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:35 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:35 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:35 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 212.781388] FAULT_INJECTION: forcing a failure. [ 212.781388] name failslab, interval 1, probability 0, space 0, times 0 [ 212.817849] CPU: 0 PID: 12557 Comm: syz-executor.1 Not tainted 4.14.132 #27 12:56:35 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) [ 212.824998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.825005] Call Trace: [ 212.825034] dump_stack+0x138/0x19c [ 212.825056] should_fail.cold+0x10f/0x159 [ 212.825074] should_failslab+0xdb/0x130 [ 212.825091] kmem_cache_alloc+0x2d7/0x780 [ 212.825107] ? __debug_object_init+0x171/0x8e0 [ 212.825120] ? ext4_alloc_inode+0x1d/0x610 [ 212.825140] selinux_inode_alloc_security+0xb6/0x2a0 [ 212.825162] security_inode_alloc+0x94/0xd0 [ 212.871366] inode_init_always+0x552/0xaf0 [ 212.875617] alloc_inode+0x81/0x180 12:56:35 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 212.879290] new_inode_pseudo+0x19/0xf0 [ 212.883285] new_inode+0x1f/0x40 [ 212.886693] __ext4_new_inode+0x32c/0x4860 [ 212.886718] ? avc_has_perm+0x2df/0x4b0 [ 212.886731] ? ext4_free_inode+0x1210/0x1210 [ 212.886752] ? dquot_get_next_dqblk+0x160/0x160 [ 212.904020] ext4_mkdir+0x331/0xc20 [ 212.907671] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 212.912369] ? security_inode_mkdir+0xd0/0x110 [ 212.917011] vfs_mkdir+0x3ca/0x610 [ 212.920570] SyS_mkdir+0x1b7/0x200 [ 212.924119] ? SyS_mkdirat+0x210/0x210 [ 212.928009] ? do_syscall_64+0x53/0x640 12:56:35 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) [ 212.928022] ? SyS_mkdirat+0x210/0x210 [ 212.928035] do_syscall_64+0x1e8/0x640 [ 212.928045] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 212.928063] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 212.949793] RIP: 0033:0x458be7 [ 212.952989] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 212.960708] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458be7 [ 212.967982] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 12:56:35 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 212.967989] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 212.967994] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 212.968000] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:36 executing program 1 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:36 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:36 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:36 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:36 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:36 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 213.168097] FAULT_INJECTION: forcing a failure. [ 213.168097] name failslab, interval 1, probability 0, space 0, times 0 [ 213.179913] CPU: 1 PID: 12592 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 213.187026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.196377] Call Trace: [ 213.198966] dump_stack+0x138/0x19c [ 213.202595] should_fail.cold+0x10f/0x159 [ 213.206744] should_failslab+0xdb/0x130 [ 213.210743] __kmalloc+0x71/0x7a0 [ 213.214206] ? mls_compute_context_len+0x3f6/0x5e0 [ 213.219134] ? context_struct_to_string+0x33a/0x630 [ 213.224147] context_struct_to_string+0x33a/0x630 [ 213.229010] ? dump_masked_av_helper+0x90/0x90 [ 213.233598] security_sid_to_context_core+0x18a/0x200 [ 213.238801] security_sid_to_context_force+0x2b/0x40 [ 213.243909] selinux_inode_init_security+0x493/0x700 [ 213.249023] ? selinux_inode_create+0x30/0x30 [ 213.253517] ? kfree+0x20a/0x270 [ 213.256885] security_inode_init_security+0x18d/0x360 [ 213.262089] ? ext4_init_acl+0x1f0/0x1f0 [ 213.266160] ? security_kernel_post_read_file+0xd0/0xd0 [ 213.271525] ? posix_acl_create+0xf5/0x3a0 [ 213.275762] ? ext4_set_acl+0x400/0x400 [ 213.279728] ? lock_downgrade+0x6e0/0x6e0 [ 213.283876] ext4_init_security+0x34/0x40 [ 213.288030] __ext4_new_inode+0x3385/0x4860 [ 213.292362] ? ext4_free_inode+0x1210/0x1210 [ 213.296783] ? dquot_get_next_dqblk+0x160/0x160 [ 213.301470] ext4_mkdir+0x331/0xc20 [ 213.305108] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 213.309793] ? security_inode_mkdir+0xd0/0x110 [ 213.314385] vfs_mkdir+0x3ca/0x610 [ 213.317923] SyS_mkdir+0x1b7/0x200 [ 213.321457] ? SyS_mkdirat+0x210/0x210 [ 213.325341] ? do_syscall_64+0x53/0x640 [ 213.329328] ? SyS_mkdirat+0x210/0x210 [ 213.333211] do_syscall_64+0x1e8/0x640 [ 213.337093] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 213.341935] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 213.347125] RIP: 0033:0x458be7 [ 213.350301] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 213.358009] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458be7 12:56:36 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:36 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 213.365292] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 213.372569] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 213.379866] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 213.387149] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:36 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:36 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:36 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:36 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:36 executing program 1 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:36 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:36 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:36 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:36 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:36 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:36 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:36 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 213.716354] FAULT_INJECTION: forcing a failure. [ 213.716354] name failslab, interval 1, probability 0, space 0, times 0 [ 213.728361] CPU: 0 PID: 12630 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 213.735484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.744851] Call Trace: [ 213.747461] dump_stack+0x138/0x19c [ 213.751106] should_fail.cold+0x10f/0x159 [ 213.755259] ? __es_tree_search.isra.0+0x15f/0x1c0 [ 213.760285] should_failslab+0xdb/0x130 12:56:36 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 213.764274] kmem_cache_alloc+0x47/0x780 [ 213.768698] __es_insert_extent+0x26c/0xe60 [ 213.773047] ext4_es_insert_extent+0x1f0/0x590 [ 213.777638] ? check_preemption_disabled+0x3c/0x250 [ 213.782666] ? ext4_es_find_delayed_extent_range+0x960/0x960 [ 213.788482] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 213.793947] ? ext4_es_find_delayed_extent_range+0x31d/0x960 [ 213.799766] ext4_ext_put_gap_in_cache+0xcb/0x110 [ 213.804621] ? ext4_zeroout_es+0x170/0x170 [ 213.808864] ? ext4_find_extent+0x64c/0x960 12:56:36 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 213.813195] ext4_ext_map_blocks+0x1d4b/0x4fa0 [ 213.817779] ? save_trace+0x290/0x290 [ 213.821586] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 213.826608] ? __lock_is_held+0xb6/0x140 [ 213.830682] ? lock_acquire+0x16f/0x430 [ 213.834659] ? ext4_map_blocks+0x354/0x16e0 [ 213.838994] ext4_map_blocks+0xc8a/0x16e0 [ 213.843151] ? __lock_is_held+0xb6/0x140 [ 213.847221] ? check_preemption_disabled+0x3c/0x250 [ 213.852252] ? ext4_issue_zeroout+0x160/0x160 [ 213.856756] ? __brelse+0x50/0x60 [ 213.860228] ext4_getblk+0xac/0x450 [ 213.863862] ? ext4_iomap_begin+0x8a0/0x8a0 [ 213.868194] ? ext4_free_inode+0x1210/0x1210 [ 213.872613] ext4_bread+0x6e/0x1a0 [ 213.876150] ? ext4_getblk+0x450/0x450 [ 213.880041] ext4_append+0x14b/0x360 [ 213.883760] ext4_mkdir+0x531/0xc20 [ 213.887388] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 213.892057] ? security_inode_mkdir+0xd0/0x110 [ 213.896636] vfs_mkdir+0x3ca/0x610 [ 213.900169] SyS_mkdir+0x1b7/0x200 [ 213.903705] ? SyS_mkdirat+0x210/0x210 [ 213.907588] ? do_syscall_64+0x53/0x640 [ 213.911555] ? SyS_mkdirat+0x210/0x210 [ 213.915435] do_syscall_64+0x1e8/0x640 [ 213.919317] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 213.924162] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 213.929344] RIP: 0033:0x458be7 [ 213.932526] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 213.940225] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458be7 [ 213.947491] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 213.954756] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 12:56:36 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:36 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 213.962021] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 213.969374] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:37 executing program 1 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:37 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:37 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:37 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:37 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:37 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:37 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 214.186586] FAULT_INJECTION: forcing a failure. [ 214.186586] name failslab, interval 1, probability 0, space 0, times 0 [ 214.198074] CPU: 1 PID: 12666 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 214.205188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 214.214535] Call Trace: [ 214.217129] dump_stack+0x138/0x19c [ 214.220756] should_fail.cold+0x10f/0x159 [ 214.224898] ? __es_tree_search.isra.0+0x15f/0x1c0 [ 214.229834] should_failslab+0xdb/0x130 [ 214.233981] kmem_cache_alloc+0x47/0x780 [ 214.238044] __es_insert_extent+0x26c/0xe60 [ 214.242394] ext4_es_insert_extent+0x1f0/0x590 [ 214.246974] ? check_preemption_disabled+0x3c/0x250 [ 214.251990] ? ext4_es_find_delayed_extent_range+0x960/0x960 [ 214.257874] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 214.263323] ? ext4_es_find_delayed_extent_range+0x31d/0x960 [ 214.269119] ext4_ext_put_gap_in_cache+0xcb/0x110 [ 214.273960] ? ext4_zeroout_es+0x170/0x170 [ 214.278189] ? ext4_find_extent+0x64c/0x960 [ 214.282510] ext4_ext_map_blocks+0x1d4b/0x4fa0 [ 214.287086] ? save_trace+0x290/0x290 [ 214.290885] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 214.295889] ? __lock_is_held+0xb6/0x140 [ 214.299971] ? lock_acquire+0x16f/0x430 [ 214.303941] ? ext4_map_blocks+0x354/0x16e0 [ 214.308268] ext4_map_blocks+0xc8a/0x16e0 [ 214.312420] ? __lock_is_held+0xb6/0x140 [ 214.316478] ? check_preemption_disabled+0x3c/0x250 [ 214.321519] ? ext4_issue_zeroout+0x160/0x160 [ 214.326010] ? __brelse+0x50/0x60 [ 214.329466] ext4_getblk+0xac/0x450 [ 214.333092] ? ext4_iomap_begin+0x8a0/0x8a0 [ 214.337428] ? ext4_free_inode+0x1210/0x1210 [ 214.341836] ext4_bread+0x6e/0x1a0 [ 214.345368] ? ext4_getblk+0x450/0x450 [ 214.349254] ext4_append+0x14b/0x360 [ 214.352967] ext4_mkdir+0x531/0xc20 [ 214.356596] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 214.361263] ? security_inode_mkdir+0xd0/0x110 [ 214.365846] vfs_mkdir+0x3ca/0x610 [ 214.369386] SyS_mkdir+0x1b7/0x200 [ 214.372924] ? SyS_mkdirat+0x210/0x210 [ 214.376804] ? do_syscall_64+0x53/0x640 [ 214.380773] ? SyS_mkdirat+0x210/0x210 [ 214.384652] do_syscall_64+0x1e8/0x640 [ 214.388530] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 214.393373] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 214.398557] RIP: 0033:0x458be7 [ 214.401749] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 214.409472] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458be7 [ 214.416761] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 214.424027] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 12:56:37 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:37 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:37 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 214.431294] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 214.438559] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:37 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:37 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:37 executing program 1 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:37 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:37 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:37 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:37 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:37 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:37 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 214.669752] FAULT_INJECTION: forcing a failure. [ 214.669752] name failslab, interval 1, probability 0, space 0, times 0 12:56:37 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 214.758122] CPU: 0 PID: 12699 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 214.765339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 214.774755] Call Trace: [ 214.774893] dump_stack+0x138/0x19c [ 214.774911] should_fail.cold+0x10f/0x159 [ 214.774927] should_failslab+0xdb/0x130 [ 214.774940] kmem_cache_alloc+0x2d7/0x780 [ 214.774959] ? rcu_read_lock_sched_held+0x110/0x130 [ 214.789455] ? __mark_inode_dirty+0x2b7/0x1040 [ 214.789476] ext4_mb_new_blocks+0x509/0x3990 12:56:37 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:37 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 214.789492] ? ext4_find_extent+0x709/0x960 [ 214.789511] ext4_ext_map_blocks+0x26cd/0x4fa0 [ 214.816734] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 214.821783] ? __lock_is_held+0xb6/0x140 [ 214.825890] ? lock_acquire+0x16f/0x430 [ 214.830020] ext4_map_blocks+0x7d3/0x16e0 [ 214.834186] ? ext4_issue_zeroout+0x160/0x160 [ 214.838687] ? __brelse+0x50/0x60 [ 214.842153] ext4_getblk+0xac/0x450 [ 214.845786] ? ext4_iomap_begin+0x8a0/0x8a0 [ 214.850116] ? ext4_free_inode+0x1210/0x1210 [ 214.854541] ext4_bread+0x6e/0x1a0 [ 214.858093] ? ext4_getblk+0x450/0x450 [ 214.861993] ext4_append+0x14b/0x360 [ 214.865715] ext4_mkdir+0x531/0xc20 [ 214.869357] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 214.874041] ? security_inode_mkdir+0xd0/0x110 [ 214.878647] vfs_mkdir+0x3ca/0x610 [ 214.882197] SyS_mkdir+0x1b7/0x200 [ 214.885745] ? SyS_mkdirat+0x210/0x210 [ 214.889640] ? do_syscall_64+0x53/0x640 [ 214.893619] ? SyS_mkdirat+0x210/0x210 [ 214.897512] do_syscall_64+0x1e8/0x640 [ 214.901401] ? trace_hardirqs_off_thunk+0x1a/0x1c 12:56:37 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:37 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 214.906252] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 214.911442] RIP: 0033:0x458be7 [ 214.914632] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 214.922346] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458be7 [ 214.929707] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 214.936989] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 214.944297] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 214.951579] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:38 executing program 1 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:38 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:38 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:38 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:38 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:38 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:38 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:38 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:38 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 215.153358] FAULT_INJECTION: forcing a failure. [ 215.153358] name failslab, interval 1, probability 0, space 0, times 0 [ 215.191871] CPU: 0 PID: 12737 Comm: syz-executor.1 Not tainted 4.14.132 #27 12:56:38 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 215.199018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.208376] Call Trace: [ 215.208401] dump_stack+0x138/0x19c [ 215.208419] should_fail.cold+0x10f/0x159 [ 215.208438] should_failslab+0xdb/0x130 [ 215.222743] __kmalloc+0x2f0/0x7a0 [ 215.226300] ? check_preemption_disabled+0x3c/0x250 [ 215.231350] ? ext4_find_extent+0x709/0x960 [ 215.235680] ext4_find_extent+0x709/0x960 [ 215.239836] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 215.245301] ext4_ext_map_blocks+0x1a3/0x4fa0 [ 215.249817] ? save_trace+0x290/0x290 [ 215.253636] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 215.258652] ? __lock_is_held+0xb6/0x140 [ 215.258672] ? lock_acquire+0x16f/0x430 [ 215.258684] ? ext4_map_blocks+0x77b/0x16e0 [ 215.258703] ext4_map_blocks+0x7d3/0x16e0 [ 215.258720] ? ext4_issue_zeroout+0x160/0x160 [ 215.279676] ? __brelse+0x50/0x60 [ 215.283149] ext4_getblk+0xac/0x450 [ 215.286783] ? ext4_iomap_begin+0x8a0/0x8a0 [ 215.291129] ? ext4_free_inode+0x1210/0x1210 [ 215.291145] ext4_bread+0x6e/0x1a0 [ 215.291156] ? ext4_getblk+0x450/0x450 [ 215.291174] ext4_append+0x14b/0x360 [ 215.291186] ext4_mkdir+0x531/0xc20 [ 215.291200] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 215.291214] ? security_inode_mkdir+0xd0/0x110 [ 215.291228] vfs_mkdir+0x3ca/0x610 [ 215.291241] SyS_mkdir+0x1b7/0x200 [ 215.291252] ? SyS_mkdirat+0x210/0x210 [ 215.291263] ? do_syscall_64+0x53/0x640 [ 215.291274] ? SyS_mkdirat+0x210/0x210 [ 215.306798] do_syscall_64+0x1e8/0x640 [ 215.306809] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 215.306828] entry_SYSCALL_64_after_hwframe+0x42/0xb7 12:56:38 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 215.306838] RIP: 0033:0x458be7 [ 215.306846] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 215.363247] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458be7 [ 215.370522] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 215.377800] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 215.385076] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 215.392351] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:38 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:38 executing program 1 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:38 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:38 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:38 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:38 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:38 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:38 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:38 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:38 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:38 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 215.601107] FAULT_INJECTION: forcing a failure. [ 215.601107] name failslab, interval 1, probability 0, space 0, times 0 [ 215.688748] CPU: 0 PID: 12774 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 215.695896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.695907] Call Trace: [ 215.707963] dump_stack+0x138/0x19c [ 215.711610] should_fail.cold+0x10f/0x159 [ 215.715777] should_failslab+0xdb/0x130 [ 215.719769] kmem_cache_alloc+0x2d7/0x780 [ 215.723924] ? rcu_read_lock_sched_held+0x110/0x130 [ 215.729017] ? __mark_inode_dirty+0x2b7/0x1040 [ 215.733613] ext4_mb_new_blocks+0x509/0x3990 [ 215.738030] ? ext4_find_extent+0x709/0x960 [ 215.742399] ext4_ext_map_blocks+0x26cd/0x4fa0 [ 215.746990] ? ext4_find_delalloc_cluster+0xb0/0xb0 [ 215.747004] ? __lock_is_held+0xb6/0x140 [ 215.747021] ? lock_acquire+0x16f/0x430 [ 215.760065] ext4_map_blocks+0x7d3/0x16e0 [ 215.764227] ? ext4_issue_zeroout+0x160/0x160 [ 215.768730] ? __brelse+0x50/0x60 [ 215.772198] ext4_getblk+0xac/0x450 [ 215.775843] ? ext4_iomap_begin+0x8a0/0x8a0 [ 215.780173] ? ext4_free_inode+0x1210/0x1210 [ 215.784588] ext4_bread+0x6e/0x1a0 12:56:38 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:38 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 215.788138] ? ext4_getblk+0x450/0x450 [ 215.792036] ext4_append+0x14b/0x360 [ 215.795761] ext4_mkdir+0x531/0xc20 [ 215.799401] ? ext4_init_dot_dotdot+0x4c0/0x4c0 [ 215.804089] ? security_inode_mkdir+0xd0/0x110 [ 215.808688] vfs_mkdir+0x3ca/0x610 [ 215.812237] SyS_mkdir+0x1b7/0x200 [ 215.815782] ? SyS_mkdirat+0x210/0x210 [ 215.819677] ? do_syscall_64+0x53/0x640 [ 215.823663] ? SyS_mkdirat+0x210/0x210 [ 215.827568] do_syscall_64+0x1e8/0x640 [ 215.831458] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 215.836317] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 215.841507] RIP: 0033:0x458be7 [ 215.844694] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 215.852412] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458be7 [ 215.859722] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 215.867009] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 215.874287] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 215.881582] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:38 executing program 1 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:38 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:38 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:38 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:38 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:38 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 216.049240] FAULT_INJECTION: forcing a failure. [ 216.049240] name failslab, interval 1, probability 0, space 0, times 0 [ 216.060920] CPU: 0 PID: 12812 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 216.068029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.077386] Call Trace: [ 216.079980] dump_stack+0x138/0x19c [ 216.083607] should_fail.cold+0x10f/0x159 [ 216.087752] should_failslab+0xdb/0x130 [ 216.091721] kmem_cache_alloc+0x47/0x780 [ 216.095777] ? lock_downgrade+0x6e0/0x6e0 [ 216.099923] __sigqueue_alloc+0x1da/0x400 [ 216.104070] __send_signal+0x1a2/0x1280 [ 216.108035] ? lock_acquire+0x16f/0x430 [ 216.112005] send_signal+0x49/0xc0 [ 216.115537] force_sig_info+0x243/0x350 [ 216.119530] force_sig_info_fault.constprop.0+0x1c6/0x2b0 [ 216.125071] ? is_prefetch.isra.0+0x350/0x350 [ 216.129564] ? trace_raw_output_x86_exceptions+0x140/0x140 [ 216.135192] __bad_area_nosemaphore+0x1dc/0x2a0 [ 216.139862] bad_area+0x69/0x80 [ 216.143140] __do_page_fault+0x86f/0xb80 [ 216.147198] ? vmalloc_fault+0xe30/0xe30 [ 216.151256] ? page_fault+0x2f/0x50 [ 216.154884] do_page_fault+0x71/0x511 [ 216.158678] ? page_fault+0x2f/0x50 [ 216.162331] page_fault+0x45/0x50 [ 216.165773] RIP: 0033:0x4533cf [ 216.168952] RSP: 002b:00007f5ff973ea88 EFLAGS: 00010283 [ 216.174325] RAX: 00007f5ff973eb40 RBX: 0000000020000228 RCX: 0000000000000000 [ 216.181589] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f5ff973eb40 [ 216.188851] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a 12:56:39 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:39 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:39 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:39 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 216.196115] R10: 0000000000000075 R11: 00000000004e4ca0 R12: 0000000000000004 [ 216.203376] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:39 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:39 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:39 executing program 1 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:39 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:39 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:39 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:39 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:39 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) [ 216.470178] net_ratelimit: 21 callbacks suppressed [ 216.470186] protocol 88fb is buggy, dev hsr_slave_0 [ 216.480195] protocol 88fb is buggy, dev hsr_slave_0 [ 216.480373] protocol 88fb is buggy, dev hsr_slave_1 [ 216.485448] protocol 88fb is buggy, dev hsr_slave_1 12:56:39 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:39 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:39 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:39 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:39 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 216.592763] FAULT_INJECTION: forcing a failure. [ 216.592763] name failslab, interval 1, probability 0, space 0, times 0 12:56:39 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 216.686957] CPU: 0 PID: 12854 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 216.694107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.703473] Call Trace: [ 216.706083] dump_stack+0x138/0x19c [ 216.709714] should_fail.cold+0x10f/0x159 [ 216.713896] should_failslab+0xdb/0x130 [ 216.717866] __kmalloc_track_caller+0x2ec/0x790 [ 216.722560] ? kasan_check_write+0x14/0x20 [ 216.726791] ? strndup_user+0x62/0xf0 [ 216.730593] memdup_user+0x26/0xa0 [ 216.734129] strndup_user+0x62/0xf0 [ 216.738471] SyS_mount+0x6b/0x120 [ 216.741921] ? copy_mnt_ns+0x8c0/0x8c0 [ 216.745820] do_syscall_64+0x1e8/0x640 [ 216.749698] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 216.754561] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 216.759746] RIP: 0033:0x45c21a [ 216.762926] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 216.770629] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 216.777901] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 216.785170] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 216.792433] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 216.799696] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:39 executing program 1 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:39 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:39 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:39 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:39 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:39 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:39 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:39 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 216.982358] FAULT_INJECTION: forcing a failure. [ 216.982358] name failslab, interval 1, probability 0, space 0, times 0 [ 216.999543] CPU: 0 PID: 12890 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 217.006764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.016124] Call Trace: [ 217.018725] dump_stack+0x138/0x19c [ 217.022368] should_fail.cold+0x10f/0x159 [ 217.026564] should_failslab+0xdb/0x130 12:56:40 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:40 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 217.030547] kmem_cache_alloc_trace+0x2e9/0x790 [ 217.035215] ? kasan_check_write+0x14/0x20 [ 217.039452] ? _copy_from_user+0x99/0x110 [ 217.043621] copy_mount_options+0x5c/0x2f0 [ 217.047869] SyS_mount+0x87/0x120 [ 217.051332] ? copy_mnt_ns+0x8c0/0x8c0 [ 217.055254] do_syscall_64+0x1e8/0x640 [ 217.059142] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 217.063996] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 217.069191] RIP: 0033:0x45c21a [ 217.072383] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 12:56:40 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:40 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) [ 217.080097] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 217.087382] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 217.094657] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 217.102015] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 217.109294] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:40 executing program 1 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:40 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:40 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:40 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:40 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:40 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 217.200130] protocol 88fb is buggy, dev hsr_slave_0 [ 217.205289] protocol 88fb is buggy, dev hsr_slave_1 12:56:40 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:40 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:40 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) [ 217.287660] FAULT_INJECTION: forcing a failure. [ 217.287660] name failslab, interval 1, probability 0, space 0, times 0 12:56:40 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 217.377984] CPU: 1 PID: 12920 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 217.385126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.385134] Call Trace: [ 217.397083] dump_stack+0x138/0x19c [ 217.400728] should_fail.cold+0x10f/0x159 [ 217.404895] should_failslab+0xdb/0x130 [ 217.408891] kmem_cache_alloc_trace+0x2e9/0x790 [ 217.413568] ? kasan_check_write+0x14/0x20 [ 217.417824] ? _copy_from_user+0x99/0x110 [ 217.421985] copy_mount_options+0x5c/0x2f0 12:56:40 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 217.426233] SyS_mount+0x87/0x120 [ 217.429693] ? copy_mnt_ns+0x8c0/0x8c0 [ 217.433588] do_syscall_64+0x1e8/0x640 [ 217.433600] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 217.433618] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 217.433629] RIP: 0033:0x45c21a [ 217.450702] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 217.458424] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 217.465703] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 12:56:40 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 217.472977] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 217.480244] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 217.480252] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 217.510127] protocol 88fb is buggy, dev hsr_slave_0 [ 217.515283] protocol 88fb is buggy, dev hsr_slave_1 12:56:40 executing program 1 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:40 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:40 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:40 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:40 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:40 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:40 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:40 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:40 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:40 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 217.670141] protocol 88fb is buggy, dev hsr_slave_0 [ 217.675254] protocol 88fb is buggy, dev hsr_slave_1 [ 217.688743] FAULT_INJECTION: forcing a failure. [ 217.688743] name failslab, interval 1, probability 0, space 0, times 0 12:56:40 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 217.787849] CPU: 1 PID: 12958 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 217.794997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.804352] Call Trace: [ 217.806964] dump_stack+0x138/0x19c [ 217.810604] should_fail.cold+0x10f/0x159 [ 217.814756] should_failslab+0xdb/0x130 [ 217.818767] kmem_cache_alloc+0x2d7/0x780 [ 217.822926] ? __schedule+0x7c0/0x1cd0 [ 217.826822] ? find_held_lock+0x35/0x130 [ 217.830890] getname_flags+0xcb/0x580 [ 217.834687] ? trace_hardirqs_on_caller+0x400/0x590 [ 217.839689] user_path_at_empty+0x2f/0x50 [ 217.843822] do_mount+0x12b/0x27d0 [ 217.847344] ? retint_kernel+0x2d/0x2d [ 217.851212] ? copy_mount_string+0x40/0x40 [ 217.855423] ? copy_mount_options+0x18f/0x2f0 [ 217.859913] ? copy_mount_options+0x199/0x2f0 [ 217.864391] ? copy_mount_options+0x1fe/0x2f0 [ 217.868867] SyS_mount+0xab/0x120 [ 217.872299] ? copy_mnt_ns+0x8c0/0x8c0 [ 217.876172] do_syscall_64+0x1e8/0x640 [ 217.880043] ? trace_hardirqs_off_thunk+0x1a/0x1c 12:56:40 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 217.884881] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 217.890054] RIP: 0033:0x45c21a [ 217.893229] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 217.900946] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 217.908209] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 217.915467] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 217.922742] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 217.930020] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:41 executing program 1 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:41 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:41 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:41 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:41 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:41 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:41 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:41 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:41 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) [ 218.128408] FAULT_INJECTION: forcing a failure. [ 218.128408] name failslab, interval 1, probability 0, space 0, times 0 [ 218.152501] CPU: 0 PID: 12996 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 218.159638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 218.168998] Call Trace: [ 218.169023] dump_stack+0x138/0x19c [ 218.169044] should_fail.cold+0x10f/0x159 [ 218.179386] should_failslab+0xdb/0x130 [ 218.183367] __kmalloc_track_caller+0x2ec/0x790 [ 218.188051] ? kstrdup_const+0x48/0x60 [ 218.191942] kstrdup+0x3a/0x70 [ 218.191956] kstrdup_const+0x48/0x60 [ 218.191969] alloc_vfsmnt+0xe5/0x7d0 [ 218.191981] vfs_kern_mount.part.0+0x2a/0x3d0 [ 218.191995] do_mount+0x417/0x27d0 [ 218.192011] ? copy_mount_string+0x40/0x40 [ 218.192019] ? copy_mount_options+0x151/0x2f0 [ 218.192048] ? __sanitizer_cov_trace_pc+0x31/0x60 [ 218.192064] ? copy_mount_options+0x1fe/0x2f0 [ 218.228853] SyS_mount+0xab/0x120 [ 218.232349] ? copy_mnt_ns+0x8c0/0x8c0 [ 218.236276] do_syscall_64+0x1e8/0x640 [ 218.240200] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 218.245085] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 218.250298] RIP: 0033:0x45c21a [ 218.253598] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 218.261346] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 218.268683] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 12:56:41 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:41 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:41 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 218.275975] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 218.283268] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 218.290556] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:41 executing program 1 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:41 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:41 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:41 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:41 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:41 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 218.548851] FAULT_INJECTION: forcing a failure. [ 218.548851] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 218.560690] CPU: 0 PID: 13033 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 218.567793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 218.577260] Call Trace: [ 218.577286] dump_stack+0x138/0x19c [ 218.577306] should_fail.cold+0x10f/0x159 [ 218.577333] __alloc_pages_nodemask+0x1d6/0x7a0 [ 218.577349] ? fs_reclaim_acquire+0x20/0x20 [ 218.596667] ? __alloc_pages_slowpath+0x2930/0x2930 [ 218.601705] cache_grow_begin+0x80/0x400 [ 218.605776] kmem_cache_alloc+0x6a6/0x780 [ 218.605789] ? kmem_cache_alloc_trace+0x57a/0x790 [ 218.605805] getname_flags+0xcb/0x580 [ 218.605819] user_path_at_empty+0x2f/0x50 [ 218.605834] do_mount+0x12b/0x27d0 [ 218.626273] ? copy_mount_options+0x5c/0x2f0 [ 218.626290] ? rcu_read_lock_sched_held+0x110/0x130 [ 218.626304] ? copy_mount_string+0x40/0x40 [ 218.626324] ? copy_mount_options+0x1fe/0x2f0 [ 218.644450] SyS_mount+0xab/0x120 [ 218.647909] ? copy_mnt_ns+0x8c0/0x8c0 [ 218.651802] do_syscall_64+0x1e8/0x640 [ 218.655692] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 218.660551] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 218.665736] RIP: 0033:0x45c21a [ 218.665746] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 218.676640] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 218.684533] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 218.692250] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 12:56:41 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:41 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:41 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:41 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:41 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:41 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 218.699534] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 218.706815] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:41 executing program 1 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:41 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:41 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:41 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:41 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:41 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:41 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:41 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:41 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:41 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:42 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 219.000912] FAULT_INJECTION: forcing a failure. [ 219.000912] name failslab, interval 1, probability 0, space 0, times 0 12:56:42 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 219.077035] CPU: 0 PID: 13068 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 219.084787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.094144] Call Trace: [ 219.096748] dump_stack+0x138/0x19c [ 219.100393] should_fail.cold+0x10f/0x159 [ 219.104577] should_failslab+0xdb/0x130 [ 219.108553] __kmalloc+0x2f0/0x7a0 [ 219.112097] ? find_held_lock+0x35/0x130 [ 219.116167] ? pcpu_alloc+0xcf0/0x1050 [ 219.120082] ? btrfs_mount+0x19a/0x2b14 [ 219.124073] btrfs_mount+0x19a/0x2b14 [ 219.127881] ? lock_downgrade+0x6e0/0x6e0 [ 219.132036] ? find_held_lock+0x35/0x130 [ 219.136187] ? pcpu_alloc+0x3af/0x1050 [ 219.140088] ? btrfs_remount+0x11f0/0x11f0 [ 219.144342] ? rcu_read_lock_sched_held+0x110/0x130 [ 219.149363] ? __lockdep_init_map+0x10c/0x570 [ 219.153854] ? __lockdep_init_map+0x10c/0x570 [ 219.158351] mount_fs+0x97/0x2a1 [ 219.161719] vfs_kern_mount.part.0+0x5e/0x3d0 [ 219.166213] do_mount+0x417/0x27d0 [ 219.169749] ? copy_mount_options+0x5c/0x2f0 [ 219.174155] ? rcu_read_lock_sched_held+0x110/0x130 [ 219.179169] ? copy_mount_string+0x40/0x40 [ 219.183400] ? copy_mount_options+0x1fe/0x2f0 [ 219.187896] SyS_mount+0xab/0x120 [ 219.191364] ? copy_mnt_ns+0x8c0/0x8c0 [ 219.195252] do_syscall_64+0x1e8/0x640 [ 219.199150] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 219.204003] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 219.209187] RIP: 0033:0x45c21a [ 219.212364] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 219.220076] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 219.227430] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 219.234694] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 219.241957] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 219.249256] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:42 executing program 1 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:42 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:42 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:42 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:42 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:42 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 219.421156] FAULT_INJECTION: forcing a failure. [ 219.421156] name failslab, interval 1, probability 0, space 0, times 0 [ 219.437906] CPU: 0 PID: 13105 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 219.445024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.454382] Call Trace: [ 219.456984] dump_stack+0x138/0x19c [ 219.460629] should_fail.cold+0x10f/0x159 [ 219.464795] should_failslab+0xdb/0x130 12:56:42 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:42 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 219.468779] __kmalloc_track_caller+0x2ec/0x790 [ 219.473457] ? unwind_get_return_address+0x61/0xa0 [ 219.478391] ? __save_stack_trace+0x7b/0xd0 [ 219.482724] ? btrfs_parse_early_options+0xa3/0x310 [ 219.487756] kstrdup+0x3a/0x70 [ 219.490976] btrfs_parse_early_options+0xa3/0x310 [ 219.495848] ? btrfs_freeze+0xc0/0xc0 [ 219.499661] ? pcpu_alloc+0xcf0/0x1050 [ 219.503559] ? find_held_lock+0x35/0x130 [ 219.507631] ? pcpu_alloc+0xcf0/0x1050 [ 219.511531] btrfs_mount+0x11d/0x2b14 [ 219.511546] ? lock_downgrade+0x6e0/0x6e0 12:56:42 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 219.511553] ? find_held_lock+0x35/0x130 [ 219.511563] ? pcpu_alloc+0x3af/0x1050 [ 219.511575] ? _find_next_bit+0xee/0x120 [ 219.511587] ? check_preemption_disabled+0x3c/0x250 [ 219.511598] ? btrfs_remount+0x11f0/0x11f0 [ 219.511615] ? rcu_read_lock_sched_held+0x110/0x130 [ 219.511634] ? __lockdep_init_map+0x10c/0x570 [ 219.511646] ? __lockdep_init_map+0x10c/0x570 [ 219.519592] mount_fs+0x97/0x2a1 [ 219.519611] vfs_kern_mount.part.0+0x5e/0x3d0 [ 219.519625] do_mount+0x417/0x27d0 [ 219.519634] ? copy_mount_options+0x5c/0x2f0 12:56:42 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 219.519647] ? rcu_read_lock_sched_held+0x110/0x130 [ 219.519659] ? copy_mount_string+0x40/0x40 [ 219.519672] ? copy_mount_options+0x1fe/0x2f0 [ 219.519685] SyS_mount+0xab/0x120 [ 219.519694] ? copy_mnt_ns+0x8c0/0x8c0 [ 219.519708] do_syscall_64+0x1e8/0x640 [ 219.519716] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 219.519732] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 219.519741] RIP: 0033:0x45c21a [ 219.519746] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 12:56:42 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:42 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 219.519756] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 219.519762] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 219.519767] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 219.519776] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 219.595811] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:42 executing program 1 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:42 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:42 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:42 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:42 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:42 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:42 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:42 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:42 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:42 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 219.803910] FAULT_INJECTION: forcing a failure. [ 219.803910] name failslab, interval 1, probability 0, space 0, times 0 12:56:42 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 219.862744] CPU: 0 PID: 13137 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 219.869891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.879247] Call Trace: [ 219.881855] dump_stack+0x138/0x19c [ 219.885498] should_fail.cold+0x10f/0x159 [ 219.889667] should_failslab+0xdb/0x130 [ 219.893654] __kmalloc+0x2f0/0x7a0 [ 219.897201] ? find_held_lock+0x35/0x130 [ 219.901266] ? pcpu_alloc+0xcf0/0x1050 [ 219.905158] ? btrfs_mount+0x19a/0x2b14 [ 219.909136] btrfs_mount+0x19a/0x2b14 12:56:42 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 219.912940] ? lock_downgrade+0x6e0/0x6e0 [ 219.917089] ? find_held_lock+0x35/0x130 [ 219.921159] ? pcpu_alloc+0x3af/0x1050 [ 219.925061] ? btrfs_remount+0x11f0/0x11f0 [ 219.929312] ? rcu_read_lock_sched_held+0x110/0x130 [ 219.934355] ? __lockdep_init_map+0x10c/0x570 [ 219.938859] ? __lockdep_init_map+0x10c/0x570 [ 219.943364] mount_fs+0x97/0x2a1 [ 219.946740] vfs_kern_mount.part.0+0x5e/0x3d0 [ 219.951241] do_mount+0x417/0x27d0 [ 219.954782] ? copy_mount_options+0x5c/0x2f0 [ 219.959190] ? rcu_read_lock_sched_held+0x110/0x130 [ 219.964210] ? copy_mount_string+0x40/0x40 [ 219.968453] ? copy_mount_options+0x1fe/0x2f0 [ 219.972954] SyS_mount+0xab/0x120 [ 219.976406] ? copy_mnt_ns+0x8c0/0x8c0 [ 219.980313] do_syscall_64+0x1e8/0x640 [ 219.984227] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 219.989125] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 219.994894] RIP: 0033:0x45c21a [ 219.998447] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 219.998462] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 219.998469] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 219.998475] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 219.998481] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 219.998486] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:43 executing program 1 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:43 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:43 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:43 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:43 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:43 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:43 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 220.207180] FAULT_INJECTION: forcing a failure. [ 220.207180] name failslab, interval 1, probability 0, space 0, times 0 [ 220.302950] CPU: 0 PID: 13165 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 220.310117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 220.319520] Call Trace: [ 220.322124] dump_stack+0x138/0x19c [ 220.325764] should_fail.cold+0x10f/0x159 [ 220.329925] should_failslab+0xdb/0x130 [ 220.333911] __kmalloc_track_caller+0x2ec/0x790 [ 220.338580] ? preempt_schedule+0x4b/0x60 [ 220.338593] ? preempt_schedule_common+0x4f/0xe0 [ 220.347497] ? kstrdup_const+0x48/0x60 [ 220.351390] kstrdup+0x3a/0x70 [ 220.354584] kstrdup_const+0x48/0x60 [ 220.358307] alloc_vfsmnt+0xe5/0x7d0 [ 220.362049] vfs_kern_mount.part.0+0x2a/0x3d0 [ 220.366551] ? find_held_lock+0x35/0x130 [ 220.370627] vfs_kern_mount+0x40/0x60 [ 220.374438] btrfs_mount+0x3ce/0x2b14 [ 220.378250] ? lock_downgrade+0x6e0/0x6e0 [ 220.382402] ? find_held_lock+0x35/0x130 [ 220.386466] ? pcpu_alloc+0x3af/0x1050 [ 220.390372] ? btrfs_remount+0x11f0/0x11f0 [ 220.394710] ? rcu_read_lock_sched_held+0x110/0x130 12:56:43 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:43 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:43 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:43 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:43 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 220.399746] ? __lockdep_init_map+0x10c/0x570 [ 220.404243] ? __lockdep_init_map+0x10c/0x570 [ 220.408746] mount_fs+0x97/0x2a1 [ 220.412122] vfs_kern_mount.part.0+0x5e/0x3d0 [ 220.416623] do_mount+0x417/0x27d0 [ 220.420161] ? copy_mount_options+0x5c/0x2f0 [ 220.420176] ? rcu_read_lock_sched_held+0x110/0x130 [ 220.420189] ? copy_mount_string+0x40/0x40 [ 220.420201] ? copy_mount_options+0x1fe/0x2f0 [ 220.420214] SyS_mount+0xab/0x120 [ 220.420223] ? copy_mnt_ns+0x8c0/0x8c0 [ 220.420237] do_syscall_64+0x1e8/0x640 [ 220.420246] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 220.420261] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 220.420269] RIP: 0033:0x45c21a [ 220.420275] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 220.420286] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 220.420293] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 220.420299] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 220.420304] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 220.420317] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:43 executing program 1 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:43 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:43 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:43 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:43 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:43 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:43 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:43 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:43 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:43 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 220.672559] FAULT_INJECTION: forcing a failure. [ 220.672559] name failslab, interval 1, probability 0, space 0, times 0 [ 220.744941] CPU: 0 PID: 13209 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 220.752095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 220.761458] Call Trace: [ 220.764060] dump_stack+0x138/0x19c [ 220.767705] should_fail.cold+0x10f/0x159 [ 220.771869] should_failslab+0xdb/0x130 [ 220.775853] __kmalloc_track_caller+0x2ec/0x790 [ 220.780529] ? kstrdup_const+0x48/0x60 [ 220.784414] kstrdup+0x3a/0x70 [ 220.787607] kstrdup_const+0x48/0x60 [ 220.791372] alloc_vfsmnt+0xe5/0x7d0 [ 220.795099] vfs_kern_mount.part.0+0x2a/0x3d0 [ 220.799716] ? find_held_lock+0x35/0x130 [ 220.803785] vfs_kern_mount+0x40/0x60 [ 220.807597] btrfs_mount+0x3ce/0x2b14 [ 220.811407] ? lock_downgrade+0x6e0/0x6e0 [ 220.815551] ? find_held_lock+0x35/0x130 [ 220.819610] ? pcpu_alloc+0x3af/0x1050 [ 220.823488] ? btrfs_remount+0x11f0/0x11f0 [ 220.827716] ? rcu_read_lock_sched_held+0x110/0x130 [ 220.832737] ? __lockdep_init_map+0x10c/0x570 [ 220.837218] ? __lockdep_init_map+0x10c/0x570 [ 220.841715] mount_fs+0x97/0x2a1 [ 220.845078] vfs_kern_mount.part.0+0x5e/0x3d0 [ 220.849580] do_mount+0x417/0x27d0 [ 220.853105] ? copy_mount_options+0x5c/0x2f0 [ 220.857500] ? rcu_read_lock_sched_held+0x110/0x130 [ 220.862502] ? copy_mount_string+0x40/0x40 [ 220.866724] ? copy_mount_options+0x1fe/0x2f0 [ 220.871212] SyS_mount+0xab/0x120 [ 220.874656] ? copy_mnt_ns+0x8c0/0x8c0 [ 220.878545] do_syscall_64+0x1e8/0x640 [ 220.882414] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 220.887244] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 220.892425] RIP: 0033:0x45c21a 12:56:43 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:43 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 220.895602] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 220.903293] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 220.910554] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 220.917816] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 220.925069] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 220.932327] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:44 executing program 1 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:44 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:44 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:44 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:44 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:44 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:44 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:44 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:44 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:44 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:44 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 221.149007] FAULT_INJECTION: forcing a failure. [ 221.149007] name fail_page_alloc, interval 1, probability 0, space 0, times 0 12:56:44 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 221.226442] CPU: 1 PID: 13245 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 221.233592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 221.242961] Call Trace: [ 221.245573] dump_stack+0x138/0x19c [ 221.249219] should_fail.cold+0x10f/0x159 [ 221.253372] ? __might_sleep+0x93/0xb0 [ 221.257264] __alloc_pages_nodemask+0x1d6/0x7a0 [ 221.261932] ? check_preemption_disabled+0x3c/0x250 [ 221.261946] ? __alloc_pages_slowpath+0x2930/0x2930 [ 221.261956] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 221.261968] ? __alloc_pages_nodemask+0x639/0x7a0 [ 221.261984] alloc_pages_current+0xec/0x1e0 [ 221.261997] ? btrfs_parse_early_options+0x1a2/0x310 [ 221.291814] __get_free_pages+0xf/0x40 [ 221.295714] get_zeroed_page+0x11/0x20 [ 221.299618] selinux_sb_copy_data+0x2a/0x390 [ 221.304075] security_sb_copy_data+0x75/0xb0 [ 221.308511] parse_security_options+0x37/0xa0 [ 221.313014] btrfs_mount+0x2bb/0x2b14 [ 221.316837] ? lock_downgrade+0x6e0/0x6e0 [ 221.320989] ? find_held_lock+0x35/0x130 [ 221.325052] ? pcpu_alloc+0x3af/0x1050 [ 221.328942] ? btrfs_remount+0x11f0/0x11f0 [ 221.333182] ? rcu_read_lock_sched_held+0x110/0x130 [ 221.338209] ? __lockdep_init_map+0x10c/0x570 [ 221.342708] mount_fs+0x97/0x2a1 [ 221.346078] vfs_kern_mount.part.0+0x5e/0x3d0 [ 221.350575] ? find_held_lock+0x35/0x130 [ 221.354637] vfs_kern_mount+0x40/0x60 [ 221.358437] btrfs_mount+0x3ce/0x2b14 [ 221.362240] ? lock_downgrade+0x6e0/0x6e0 [ 221.366382] ? find_held_lock+0x35/0x130 [ 221.370444] ? pcpu_alloc+0x3af/0x1050 [ 221.374348] ? btrfs_remount+0x11f0/0x11f0 [ 221.378595] ? rcu_read_lock_sched_held+0x110/0x130 [ 221.383626] ? __lockdep_init_map+0x10c/0x570 [ 221.388128] ? __lockdep_init_map+0x10c/0x570 [ 221.392626] mount_fs+0x97/0x2a1 [ 221.395994] vfs_kern_mount.part.0+0x5e/0x3d0 [ 221.400496] do_mount+0x417/0x27d0 [ 221.404032] ? copy_mount_options+0x5c/0x2f0 [ 221.408444] ? rcu_read_lock_sched_held+0x110/0x130 [ 221.413470] ? copy_mount_string+0x40/0x40 [ 221.417707] ? copy_mount_options+0x1fe/0x2f0 [ 221.422206] SyS_mount+0xab/0x120 [ 221.425654] ? copy_mnt_ns+0x8c0/0x8c0 [ 221.429545] do_syscall_64+0x1e8/0x640 [ 221.433429] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 221.438292] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 221.443480] RIP: 0033:0x45c21a [ 221.446665] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 221.454370] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 221.461632] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 221.468895] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 221.476161] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 221.483428] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 221.500235] net_ratelimit: 18 callbacks suppressed [ 221.500241] protocol 88fb is buggy, dev hsr_slave_0 [ 221.510347] protocol 88fb is buggy, dev hsr_slave_1 12:56:44 executing program 1 (fault-call:0 fault-nth:61): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:44 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:44 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:44 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:44 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:44 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:44 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:44 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:44 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 221.647430] FAULT_INJECTION: forcing a failure. [ 221.647430] name failslab, interval 1, probability 0, space 0, times 0 [ 221.670139] protocol 88fb is buggy, dev hsr_slave_0 [ 221.675314] protocol 88fb is buggy, dev hsr_slave_1 [ 221.696328] CPU: 1 PID: 13286 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 221.703586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 221.712962] Call Trace: [ 221.712994] dump_stack+0x138/0x19c [ 221.713015] should_fail.cold+0x10f/0x159 [ 221.713030] should_failslab+0xdb/0x130 [ 221.713044] __kmalloc+0x2f0/0x7a0 [ 221.713062] ? match_token+0x22b/0x480 [ 221.734913] ? match_strdup+0x5f/0xa0 [ 221.738730] match_strdup+0x5f/0xa0 [ 221.742464] btrfs_parse_early_options+0x241/0x310 [ 221.747417] ? btrfs_freeze+0xc0/0xc0 [ 221.747428] ? find_next_bit+0x28/0x30 [ 221.747440] ? pcpu_alloc+0xcf0/0x1050 [ 221.747451] ? pcpu_alloc+0xcf0/0x1050 [ 221.747466] btrfs_mount+0x11d/0x2b14 [ 221.766827] ? lock_downgrade+0x6e0/0x6e0 [ 221.770982] ? find_held_lock+0x35/0x130 [ 221.770994] ? pcpu_alloc+0x3af/0x1050 [ 221.771008] ? _find_next_bit+0xee/0x120 [ 221.771022] ? check_preemption_disabled+0x3c/0x250 [ 221.771036] ? btrfs_remount+0x11f0/0x11f0 [ 221.771055] ? rcu_read_lock_sched_held+0x110/0x130 [ 221.771074] ? __lockdep_init_map+0x10c/0x570 [ 221.788057] ? __lockdep_init_map+0x10c/0x570 [ 221.788077] mount_fs+0x97/0x2a1 [ 221.788094] vfs_kern_mount.part.0+0x5e/0x3d0 [ 221.788106] ? find_held_lock+0x35/0x130 [ 221.818282] vfs_kern_mount+0x40/0x60 [ 221.822190] btrfs_mount+0x3ce/0x2b14 [ 221.825997] ? lock_downgrade+0x6e0/0x6e0 [ 221.830141] ? find_held_lock+0x35/0x130 [ 221.834194] ? pcpu_alloc+0x3af/0x1050 [ 221.838081] ? btrfs_remount+0x11f0/0x11f0 [ 221.842317] ? rcu_read_lock_sched_held+0x110/0x130 [ 221.847346] ? __lockdep_init_map+0x10c/0x570 [ 221.851845] ? __lockdep_init_map+0x10c/0x570 [ 221.856349] mount_fs+0x97/0x2a1 [ 221.859724] vfs_kern_mount.part.0+0x5e/0x3d0 [ 221.864239] do_mount+0x417/0x27d0 [ 221.867784] ? copy_mount_options+0x5c/0x2f0 [ 221.872227] ? rcu_read_lock_sched_held+0x110/0x130 [ 221.877250] ? copy_mount_string+0x40/0x40 [ 221.881484] ? copy_mount_options+0x1fe/0x2f0 [ 221.885976] SyS_mount+0xab/0x120 [ 221.889424] ? copy_mnt_ns+0x8c0/0x8c0 [ 221.893313] do_syscall_64+0x1e8/0x640 [ 221.897206] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 221.902055] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 221.907233] RIP: 0033:0x45c21a [ 221.910409] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 221.918112] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 221.925370] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 221.932628] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 221.939892] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 12:56:44 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:44 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:44 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 221.947157] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 221.954745] protocol 88fb is buggy, dev hsr_slave_0 [ 221.959853] protocol 88fb is buggy, dev hsr_slave_1 [ 221.960219] protocol 88fb is buggy, dev hsr_slave_0 [ 221.970091] protocol 88fb is buggy, dev hsr_slave_1 12:56:45 executing program 1 (fault-call:0 fault-nth:62): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:45 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:45 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:45 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:45 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:45 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:45 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:45 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:45 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:45 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 222.195258] FAULT_INJECTION: forcing a failure. [ 222.195258] name fail_page_alloc, interval 1, probability 0, space 0, times 0 12:56:45 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:45 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) [ 222.284479] CPU: 0 PID: 13323 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 222.291628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 222.300986] Call Trace: [ 222.303596] dump_stack+0x138/0x19c [ 222.307245] should_fail.cold+0x10f/0x159 [ 222.311414] ? __might_sleep+0x93/0xb0 [ 222.315316] __alloc_pages_nodemask+0x1d6/0x7a0 [ 222.319994] ? trace_hardirqs_on+0xd/0x10 [ 222.324147] ? __alloc_pages_slowpath+0x2930/0x2930 [ 222.329201] ? btrfs_parse_early_options+0x1a2/0x310 [ 222.334405] alloc_pages_current+0xec/0x1e0 [ 222.338740] __get_free_pages+0xf/0x40 [ 222.342632] get_zeroed_page+0x11/0x20 [ 222.346516] parse_security_options+0x1f/0xa0 [ 222.351010] btrfs_mount+0x2bb/0x2b14 [ 222.354806] ? lock_downgrade+0x6e0/0x6e0 [ 222.358942] ? find_held_lock+0x35/0x130 [ 222.362992] ? pcpu_alloc+0x3af/0x1050 [ 222.366882] ? btrfs_remount+0x11f0/0x11f0 [ 222.371118] ? rcu_read_lock_sched_held+0x110/0x130 [ 222.376134] ? __lockdep_init_map+0x10c/0x570 [ 222.380631] mount_fs+0x97/0x2a1 [ 222.383993] vfs_kern_mount.part.0+0x5e/0x3d0 [ 222.388480] ? find_held_lock+0x35/0x130 [ 222.392540] vfs_kern_mount+0x40/0x60 [ 222.396340] btrfs_mount+0x3ce/0x2b14 [ 222.400131] ? lock_downgrade+0x6e0/0x6e0 [ 222.404270] ? find_held_lock+0x35/0x130 [ 222.408325] ? pcpu_alloc+0x3af/0x1050 [ 222.412215] ? btrfs_remount+0x11f0/0x11f0 [ 222.416452] ? rcu_read_lock_sched_held+0x110/0x130 [ 222.421470] ? __lockdep_init_map+0x10c/0x570 [ 222.425959] ? __lockdep_init_map+0x10c/0x570 [ 222.430453] mount_fs+0x97/0x2a1 [ 222.433819] vfs_kern_mount.part.0+0x5e/0x3d0 [ 222.438316] do_mount+0x417/0x27d0 [ 222.441850] ? copy_mount_options+0x5c/0x2f0 [ 222.446256] ? rcu_read_lock_sched_held+0x110/0x130 [ 222.451265] ? copy_mount_string+0x40/0x40 [ 222.455498] ? copy_mount_options+0x1fe/0x2f0 [ 222.459984] SyS_mount+0xab/0x120 [ 222.463437] ? copy_mnt_ns+0x8c0/0x8c0 [ 222.467326] do_syscall_64+0x1e8/0x640 [ 222.471206] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 222.476049] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 222.481232] RIP: 0033:0x45c21a [ 222.484409] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 222.492128] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 222.499408] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 222.506677] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 222.513946] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 222.521234] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:45 executing program 1 (fault-call:0 fault-nth:63): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:45 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:45 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:45 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:45 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:45 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:45 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:45 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:45 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 222.710132] protocol 88fb is buggy, dev hsr_slave_0 [ 222.715234] protocol 88fb is buggy, dev hsr_slave_1 12:56:45 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:45 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:45 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 222.762271] FAULT_INJECTION: forcing a failure. [ 222.762271] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 222.848786] CPU: 0 PID: 13363 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 222.855938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 222.865294] Call Trace: [ 222.867889] dump_stack+0x138/0x19c [ 222.871522] should_fail.cold+0x10f/0x159 [ 222.875665] ? __might_sleep+0x93/0xb0 [ 222.879546] __alloc_pages_nodemask+0x1d6/0x7a0 [ 222.884208] ? trace_hardirqs_on+0xd/0x10 [ 222.888347] ? __alloc_pages_slowpath+0x2930/0x2930 [ 222.893360] ? btrfs_parse_early_options+0x1a2/0x310 [ 222.898474] alloc_pages_current+0xec/0x1e0 [ 222.902792] __get_free_pages+0xf/0x40 [ 222.906674] get_zeroed_page+0x11/0x20 [ 222.910553] parse_security_options+0x1f/0xa0 [ 222.915042] btrfs_mount+0x2bb/0x2b14 [ 222.918838] ? lock_downgrade+0x6e0/0x6e0 [ 222.922975] ? find_held_lock+0x35/0x130 [ 222.927040] ? pcpu_alloc+0x3af/0x1050 [ 222.930929] ? btrfs_remount+0x11f0/0x11f0 [ 222.935164] ? rcu_read_lock_sched_held+0x110/0x130 [ 222.940184] ? __lockdep_init_map+0x10c/0x570 [ 222.944683] mount_fs+0x97/0x2a1 [ 222.948050] vfs_kern_mount.part.0+0x5e/0x3d0 [ 222.952533] ? find_held_lock+0x35/0x130 [ 222.956585] vfs_kern_mount+0x40/0x60 [ 222.960379] btrfs_mount+0x3ce/0x2b14 [ 222.964171] ? lock_downgrade+0x6e0/0x6e0 [ 222.968321] ? btrfs_remount+0x11f0/0x11f0 [ 222.972557] ? rcu_read_lock_sched_held+0x110/0x130 [ 222.977573] ? __lockdep_init_map+0x10c/0x570 [ 222.982118] ? __lockdep_init_map+0x10c/0x570 [ 222.986609] mount_fs+0x97/0x2a1 [ 222.989971] vfs_kern_mount.part.0+0x5e/0x3d0 [ 222.994465] do_mount+0x417/0x27d0 [ 222.997996] ? copy_mount_options+0x5c/0x2f0 [ 223.002404] ? rcu_read_lock_sched_held+0x110/0x130 [ 223.007412] ? copy_mount_string+0x40/0x40 [ 223.011729] ? copy_mount_options+0x1fe/0x2f0 [ 223.016228] SyS_mount+0xab/0x120 [ 223.019683] ? copy_mnt_ns+0x8c0/0x8c0 [ 223.023571] do_syscall_64+0x1e8/0x640 [ 223.027449] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 223.032294] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 223.037481] RIP: 0033:0x45c21a [ 223.040657] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 223.048356] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 223.055624] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 223.062881] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 223.070141] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 223.077398] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:46 executing program 1 (fault-call:0 fault-nth:64): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:46 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:46 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:46 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:46 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:46 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:46 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) [ 223.200571] FAULT_INJECTION: forcing a failure. [ 223.200571] name failslab, interval 1, probability 0, space 0, times 0 12:56:46 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:46 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:46 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 223.255260] CPU: 0 PID: 13391 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 223.262406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 223.262413] Call Trace: [ 223.262438] dump_stack+0x138/0x19c [ 223.262464] should_fail.cold+0x10f/0x159 [ 223.282137] should_failslab+0xdb/0x130 [ 223.286121] kmem_cache_alloc_trace+0x2e9/0x790 [ 223.290805] selinux_parse_opts_str+0x42c/0xa30 [ 223.295514] ? selinux_socket_sock_rcv_skb+0x570/0x570 [ 223.300813] ? free_pages+0x46/0x50 [ 223.304592] ? selinux_sb_copy_data+0x21e/0x390 [ 223.309388] security_sb_parse_opts_str+0x75/0xb0 [ 223.314275] parse_security_options+0x4e/0xa0 [ 223.314290] btrfs_mount+0x2bb/0x2b14 [ 223.314322] ? lock_downgrade+0x6e0/0x6e0 [ 223.314332] ? find_held_lock+0x35/0x130 [ 223.314344] ? pcpu_alloc+0x3af/0x1050 [ 223.314359] ? btrfs_remount+0x11f0/0x11f0 [ 223.339111] ? rcu_read_lock_sched_held+0x110/0x130 [ 223.344166] ? __lockdep_init_map+0x10c/0x570 [ 223.344189] mount_fs+0x97/0x2a1 [ 223.344206] vfs_kern_mount.part.0+0x5e/0x3d0 [ 223.356708] ? find_held_lock+0x35/0x130 [ 223.360797] vfs_kern_mount+0x40/0x60 [ 223.364619] btrfs_mount+0x3ce/0x2b14 [ 223.364635] ? lock_downgrade+0x6e0/0x6e0 [ 223.364644] ? find_held_lock+0x35/0x130 [ 223.364655] ? pcpu_alloc+0x3af/0x1050 [ 223.364672] ? btrfs_remount+0x11f0/0x11f0 [ 223.364689] ? rcu_read_lock_sched_held+0x110/0x130 [ 223.389979] ? __lockdep_init_map+0x10c/0x570 [ 223.394511] ? __lockdep_init_map+0x10c/0x570 [ 223.399136] mount_fs+0x97/0x2a1 12:56:46 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:46 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 223.402533] vfs_kern_mount.part.0+0x5e/0x3d0 [ 223.407092] do_mount+0x417/0x27d0 [ 223.410645] ? copy_mount_options+0x5c/0x2f0 [ 223.415063] ? rcu_read_lock_sched_held+0x110/0x130 [ 223.420087] ? copy_mount_string+0x40/0x40 [ 223.424330] ? copy_mount_options+0x1fe/0x2f0 [ 223.424347] SyS_mount+0xab/0x120 [ 223.424356] ? copy_mnt_ns+0x8c0/0x8c0 [ 223.424371] do_syscall_64+0x1e8/0x640 [ 223.440069] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 223.444927] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 223.450123] RIP: 0033:0x45c21a [ 223.453320] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 223.461035] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 223.461043] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 223.461049] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 223.461055] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 223.461061] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:46 executing program 1 (fault-call:0 fault-nth:65): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:46 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:46 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:46 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:46 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:46 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:46 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:46 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:46 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 223.633875] FAULT_INJECTION: forcing a failure. [ 223.633875] name failslab, interval 1, probability 0, space 0, times 0 12:56:46 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:46 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 223.704438] CPU: 0 PID: 13431 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 223.711586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 223.720955] Call Trace: [ 223.723562] dump_stack+0x138/0x19c [ 223.727205] should_fail.cold+0x10f/0x159 [ 223.731367] should_failslab+0xdb/0x130 [ 223.735349] kmem_cache_alloc_trace+0x2e9/0x790 [ 223.740050] selinux_parse_opts_str+0x42c/0xa30 [ 223.744734] ? selinux_socket_sock_rcv_skb+0x570/0x570 [ 223.750056] ? free_pages+0x46/0x50 [ 223.753722] ? selinux_sb_copy_data+0x21e/0x390 [ 223.758404] security_sb_parse_opts_str+0x75/0xb0 [ 223.763260] parse_security_options+0x4e/0xa0 [ 223.767759] btrfs_mount+0x2bb/0x2b14 [ 223.771578] ? lock_downgrade+0x6e0/0x6e0 [ 223.775725] ? find_held_lock+0x35/0x130 [ 223.779779] ? pcpu_alloc+0x3af/0x1050 [ 223.783676] ? btrfs_remount+0x11f0/0x11f0 [ 223.787910] ? rcu_read_lock_sched_held+0x110/0x130 [ 223.792929] ? __lockdep_init_map+0x10c/0x570 [ 223.797434] mount_fs+0x97/0x2a1 [ 223.800798] vfs_kern_mount.part.0+0x5e/0x3d0 [ 223.805289] ? find_held_lock+0x35/0x130 [ 223.809353] vfs_kern_mount+0x40/0x60 [ 223.813149] btrfs_mount+0x3ce/0x2b14 [ 223.816956] ? lock_downgrade+0x6e0/0x6e0 [ 223.821097] ? find_held_lock+0x35/0x130 [ 223.825148] ? pcpu_alloc+0x3af/0x1050 [ 223.829041] ? btrfs_remount+0x11f0/0x11f0 [ 223.833281] ? rcu_read_lock_sched_held+0x110/0x130 [ 223.838305] ? __lockdep_init_map+0x10c/0x570 [ 223.842802] ? __lockdep_init_map+0x10c/0x570 [ 223.847297] mount_fs+0x97/0x2a1 [ 223.850664] vfs_kern_mount.part.0+0x5e/0x3d0 [ 223.855157] do_mount+0x417/0x27d0 [ 223.858690] ? copy_mount_options+0x5c/0x2f0 [ 223.863089] ? rcu_read_lock_sched_held+0x110/0x130 [ 223.868101] ? copy_mount_string+0x40/0x40 [ 223.872332] ? copy_mount_options+0x1fe/0x2f0 [ 223.876822] SyS_mount+0xab/0x120 [ 223.880269] ? copy_mnt_ns+0x8c0/0x8c0 [ 223.884151] do_syscall_64+0x1e8/0x640 [ 223.888028] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 223.892870] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 223.898048] RIP: 0033:0x45c21a [ 223.901227] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 223.908928] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 223.916186] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 223.923447] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 223.930706] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 223.937963] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:46 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:47 executing program 1 (fault-call:0 fault-nth:66): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:47 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:47 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:47 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:47 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:47 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:47 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:47 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 224.137982] FAULT_INJECTION: forcing a failure. [ 224.137982] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 224.149824] CPU: 0 PID: 13468 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 224.156929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 224.166286] Call Trace: [ 224.168900] dump_stack+0x138/0x19c [ 224.172554] should_fail.cold+0x10f/0x159 [ 224.176740] __alloc_pages_nodemask+0x1d6/0x7a0 [ 224.181419] ? __alloc_pages_slowpath+0x2930/0x2930 [ 224.186455] cache_grow_begin+0x80/0x400 [ 224.190514] kmem_cache_alloc+0x6a6/0x780 [ 224.194658] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 224.199762] getname_kernel+0x53/0x350 [ 224.203645] kern_path+0x20/0x40 [ 224.207002] lookup_bdev.part.0+0x63/0x160 [ 224.211228] ? blkdev_open+0x260/0x260 [ 224.215115] ? free_hot_cold_page+0x763/0xca0 [ 224.219604] blkdev_get_by_path+0x76/0xf0 [ 224.223771] btrfs_scan_one_device+0x97/0x400 [ 224.228267] ? device_list_add+0x8d0/0x8d0 [ 224.232495] ? __free_pages+0x54/0x90 [ 224.236290] ? free_pages+0x46/0x50 [ 224.239919] btrfs_mount+0x2e3/0x2b14 [ 224.243713] ? lock_downgrade+0x6e0/0x6e0 [ 224.247854] ? find_held_lock+0x35/0x130 [ 224.251906] ? pcpu_alloc+0x3af/0x1050 [ 224.255792] ? btrfs_remount+0x11f0/0x11f0 [ 224.260031] ? rcu_read_lock_sched_held+0x110/0x130 [ 224.265055] ? __lockdep_init_map+0x10c/0x570 [ 224.269553] mount_fs+0x97/0x2a1 [ 224.272918] vfs_kern_mount.part.0+0x5e/0x3d0 [ 224.277401] ? find_held_lock+0x35/0x130 [ 224.281456] vfs_kern_mount+0x40/0x60 [ 224.285253] btrfs_mount+0x3ce/0x2b14 [ 224.289041] ? lock_downgrade+0x6e0/0x6e0 [ 224.293180] ? find_held_lock+0x35/0x130 [ 224.297235] ? pcpu_alloc+0x3af/0x1050 [ 224.301129] ? btrfs_remount+0x11f0/0x11f0 [ 224.305364] ? rcu_read_lock_sched_held+0x110/0x130 [ 224.310385] ? __lockdep_init_map+0x10c/0x570 [ 224.314873] ? __lockdep_init_map+0x10c/0x570 [ 224.319364] mount_fs+0x97/0x2a1 [ 224.322732] vfs_kern_mount.part.0+0x5e/0x3d0 [ 224.327244] do_mount+0x417/0x27d0 [ 224.330777] ? copy_mount_options+0x5c/0x2f0 [ 224.335182] ? rcu_read_lock_sched_held+0x110/0x130 [ 224.340195] ? copy_mount_string+0x40/0x40 [ 224.344437] ? copy_mount_options+0x1fe/0x2f0 [ 224.348925] SyS_mount+0xab/0x120 [ 224.352377] ? copy_mnt_ns+0x8c0/0x8c0 [ 224.356262] do_syscall_64+0x1e8/0x640 [ 224.360141] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 224.364980] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 224.370164] RIP: 0033:0x45c21a [ 224.373341] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 224.381045] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a 12:56:47 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:47 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) [ 224.388318] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 224.395583] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 224.402846] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 224.410105] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:47 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:47 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:47 executing program 1 (fault-call:0 fault-nth:67): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:47 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:47 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:47 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:47 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:47 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 224.646103] FAULT_INJECTION: forcing a failure. [ 224.646103] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 224.657959] CPU: 0 PID: 13505 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 224.665073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 224.674434] Call Trace: [ 224.677045] dump_stack+0x138/0x19c [ 224.680676] should_fail.cold+0x10f/0x159 [ 224.684827] __alloc_pages_nodemask+0x1d6/0x7a0 [ 224.689504] ? __alloc_pages_slowpath+0x2930/0x2930 [ 224.694535] cache_grow_begin+0x80/0x400 [ 224.698598] kmem_cache_alloc+0x6a6/0x780 [ 224.702746] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 224.707849] getname_kernel+0x53/0x350 [ 224.711738] kern_path+0x20/0x40 [ 224.715104] lookup_bdev.part.0+0x63/0x160 [ 224.719367] ? blkdev_open+0x260/0x260 [ 224.723264] ? free_hot_cold_page+0x763/0xca0 [ 224.727774] blkdev_get_by_path+0x76/0xf0 [ 224.731935] btrfs_scan_one_device+0x97/0x400 [ 224.737086] ? device_list_add+0x8d0/0x8d0 [ 224.741322] ? __free_pages+0x54/0x90 [ 224.745116] ? free_pages+0x46/0x50 [ 224.748744] btrfs_mount+0x2e3/0x2b14 [ 224.752549] ? lock_downgrade+0x6e0/0x6e0 [ 224.756706] ? find_held_lock+0x35/0x130 [ 224.760775] ? pcpu_alloc+0x3af/0x1050 [ 224.764680] ? btrfs_remount+0x11f0/0x11f0 [ 224.768945] ? rcu_read_lock_sched_held+0x110/0x130 [ 224.773992] ? __lockdep_init_map+0x10c/0x570 [ 224.778500] mount_fs+0x97/0x2a1 [ 224.781870] vfs_kern_mount.part.0+0x5e/0x3d0 [ 224.786366] ? find_held_lock+0x35/0x130 [ 224.790433] vfs_kern_mount+0x40/0x60 [ 224.794233] btrfs_mount+0x3ce/0x2b14 [ 224.798029] ? lock_downgrade+0x6e0/0x6e0 [ 224.802172] ? find_held_lock+0x35/0x130 [ 224.806233] ? pcpu_alloc+0x3af/0x1050 [ 224.810130] ? btrfs_remount+0x11f0/0x11f0 [ 224.814373] ? rcu_read_lock_sched_held+0x110/0x130 [ 224.819397] ? __lockdep_init_map+0x10c/0x570 [ 224.823894] ? __lockdep_init_map+0x10c/0x570 [ 224.828391] mount_fs+0x97/0x2a1 [ 224.831760] vfs_kern_mount.part.0+0x5e/0x3d0 [ 224.836255] do_mount+0x417/0x27d0 [ 224.839788] ? copy_mount_options+0x5c/0x2f0 [ 224.844200] ? rcu_read_lock_sched_held+0x110/0x130 [ 224.849217] ? copy_mount_string+0x40/0x40 [ 224.853453] ? copy_mount_options+0x1fe/0x2f0 [ 224.857953] SyS_mount+0xab/0x120 [ 224.861400] ? copy_mnt_ns+0x8c0/0x8c0 [ 224.865287] do_syscall_64+0x1e8/0x640 [ 224.869171] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 224.874020] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 224.879202] RIP: 0033:0x45c21a [ 224.882384] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 224.890090] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a 12:56:47 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:47 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:47 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 224.897357] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 224.904623] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 224.911885] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 224.919151] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:47 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:47 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:48 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:48 executing program 1 (fault-call:0 fault-nth:68): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:48 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:48 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:48 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:48 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:48 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:48 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:48 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 225.197877] FAULT_INJECTION: forcing a failure. [ 225.197877] name failslab, interval 1, probability 0, space 0, times 0 12:56:48 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:48 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:48 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 225.294134] CPU: 0 PID: 13541 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 225.301283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 225.310659] Call Trace: [ 225.313265] dump_stack+0x138/0x19c [ 225.316906] should_fail.cold+0x10f/0x159 [ 225.321068] should_failslab+0xdb/0x130 [ 225.325051] kmem_cache_alloc+0x2d7/0x780 [ 225.329209] ? delete_node+0x1fb/0x690 [ 225.333099] ? save_trace+0x290/0x290 [ 225.336914] alloc_buffer_head+0x24/0xe0 12:56:48 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 225.340983] alloc_page_buffers+0xb7/0x200 [ 225.345229] create_empty_buffers+0x39/0x480 [ 225.349646] ? __lock_is_held+0xb6/0x140 [ 225.353712] ? check_preemption_disabled+0x3c/0x250 [ 225.358738] create_page_buffers+0x153/0x1c0 [ 225.363152] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 225.368617] block_read_full_page+0xcd/0x960 [ 225.373033] ? set_init_blocksize+0x220/0x220 [ 225.377535] ? __lru_cache_add+0x18a/0x250 [ 225.381780] ? __bread_gfp+0x290/0x290 [ 225.385677] ? add_to_page_cache_lru+0x159/0x310 [ 225.390443] ? add_to_page_cache_locked+0x40/0x40 [ 225.395292] blkdev_readpage+0x1d/0x30 [ 225.399200] do_read_cache_page+0x671/0xfc0 [ 225.403533] ? blkdev_writepages+0xd0/0xd0 [ 225.407786] ? find_get_pages_contig+0xaa0/0xaa0 [ 225.412547] ? blkdev_get+0xb0/0x8e0 [ 225.416267] ? dput.part.0+0x170/0x750 [ 225.420159] ? bd_may_claim+0xd0/0xd0 [ 225.423963] ? path_put+0x50/0x70 [ 225.427420] ? lookup_bdev.part.0+0xe1/0x160 [ 225.431842] read_cache_page_gfp+0x6e/0x90 [ 225.436086] btrfs_read_disk_super+0xdd/0x440 [ 225.440607] btrfs_scan_one_device+0xc6/0x400 [ 225.445117] ? device_list_add+0x8d0/0x8d0 [ 225.449360] ? __free_pages+0x54/0x90 [ 225.453161] ? free_pages+0x46/0x50 [ 225.456808] btrfs_mount+0x2e3/0x2b14 [ 225.460606] ? lock_downgrade+0x6e0/0x6e0 [ 225.464751] ? find_held_lock+0x35/0x130 [ 225.468805] ? pcpu_alloc+0x3af/0x1050 [ 225.472694] ? btrfs_remount+0x11f0/0x11f0 [ 225.476932] ? rcu_read_lock_sched_held+0x110/0x130 [ 225.481963] ? __lockdep_init_map+0x10c/0x570 [ 225.486477] mount_fs+0x97/0x2a1 [ 225.489845] vfs_kern_mount.part.0+0x5e/0x3d0 [ 225.494338] ? find_held_lock+0x35/0x130 [ 225.498402] vfs_kern_mount+0x40/0x60 [ 225.502197] btrfs_mount+0x3ce/0x2b14 [ 225.506019] ? lock_downgrade+0x6e0/0x6e0 [ 225.510157] ? find_held_lock+0x35/0x130 [ 225.514237] ? pcpu_alloc+0x3af/0x1050 [ 225.518254] ? btrfs_remount+0x11f0/0x11f0 [ 225.522508] ? rcu_read_lock_sched_held+0x110/0x130 [ 225.527556] ? __lockdep_init_map+0x10c/0x570 [ 225.532055] ? __lockdep_init_map+0x10c/0x570 [ 225.536549] mount_fs+0x97/0x2a1 [ 225.539917] vfs_kern_mount.part.0+0x5e/0x3d0 [ 225.544452] do_mount+0x417/0x27d0 [ 225.548016] ? copy_mount_options+0x5c/0x2f0 [ 225.552424] ? rcu_read_lock_sched_held+0x110/0x130 [ 225.557460] ? copy_mount_string+0x40/0x40 [ 225.561694] ? copy_mount_options+0x1fe/0x2f0 [ 225.566210] SyS_mount+0xab/0x120 [ 225.569654] ? copy_mnt_ns+0x8c0/0x8c0 [ 225.573595] do_syscall_64+0x1e8/0x640 [ 225.577508] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 225.582378] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 225.587581] RIP: 0033:0x45c21a [ 225.590790] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 225.598521] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 225.607259] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 225.614528] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 225.621791] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 225.629077] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:48 executing program 1 (fault-call:0 fault-nth:69): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:48 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:48 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:48 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:48 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:48 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 225.944577] FAULT_INJECTION: forcing a failure. [ 225.944577] name failslab, interval 1, probability 0, space 0, times 0 [ 225.956164] CPU: 1 PID: 13574 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 225.963270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 225.972650] Call Trace: [ 225.975248] dump_stack+0x138/0x19c [ 225.978888] should_fail.cold+0x10f/0x159 [ 225.983046] should_failslab+0xdb/0x130 [ 225.987028] kmem_cache_alloc+0x47/0x780 [ 225.991111] radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 225.996746] __radix_tree_create+0x337/0x4d0 [ 226.001175] page_cache_tree_insert+0xa7/0x2d0 [ 226.005757] ? file_check_and_advance_wb_err+0x380/0x380 [ 226.011204] ? debug_smp_processor_id+0x1c/0x20 [ 226.015876] __add_to_page_cache_locked+0x2ab/0x7e0 [ 226.020892] ? find_lock_entry+0x3f0/0x3f0 [ 226.025122] add_to_page_cache_lru+0xf4/0x310 [ 226.029611] ? add_to_page_cache_locked+0x40/0x40 [ 226.034445] ? __page_cache_alloc+0xdd/0x3e0 [ 226.038847] do_read_cache_page+0x64e/0xfc0 [ 226.043166] ? blkdev_writepages+0xd0/0xd0 [ 226.047407] ? find_get_pages_contig+0xaa0/0xaa0 [ 226.052153] ? blkdev_get+0xb0/0x8e0 [ 226.055864] ? dput.part.0+0x170/0x750 [ 226.059745] ? bd_may_claim+0xd0/0xd0 [ 226.063534] ? path_put+0x50/0x70 [ 226.066976] ? lookup_bdev.part.0+0xe1/0x160 [ 226.071379] read_cache_page_gfp+0x6e/0x90 [ 226.075615] btrfs_read_disk_super+0xdd/0x440 [ 226.080108] btrfs_scan_one_device+0xc6/0x400 [ 226.084596] ? device_list_add+0x8d0/0x8d0 [ 226.088830] ? __free_pages+0x54/0x90 [ 226.092626] ? free_pages+0x46/0x50 [ 226.096255] btrfs_mount+0x2e3/0x2b14 [ 226.100050] ? lock_downgrade+0x6e0/0x6e0 [ 226.104186] ? find_held_lock+0x35/0x130 [ 226.108254] ? pcpu_alloc+0x3af/0x1050 [ 226.112145] ? btrfs_remount+0x11f0/0x11f0 [ 226.116380] ? rcu_read_lock_sched_held+0x110/0x130 [ 226.121400] ? __lockdep_init_map+0x10c/0x570 [ 226.125896] mount_fs+0x97/0x2a1 [ 226.129269] vfs_kern_mount.part.0+0x5e/0x3d0 [ 226.133758] ? find_held_lock+0x35/0x130 [ 226.137820] vfs_kern_mount+0x40/0x60 [ 226.141616] btrfs_mount+0x3ce/0x2b14 [ 226.145409] ? lock_downgrade+0x6e0/0x6e0 [ 226.149548] ? find_held_lock+0x35/0x130 [ 226.153604] ? pcpu_alloc+0x3af/0x1050 [ 226.157494] ? btrfs_remount+0x11f0/0x11f0 [ 226.161731] ? rcu_read_lock_sched_held+0x110/0x130 [ 226.166756] ? __lockdep_init_map+0x10c/0x570 [ 226.171277] ? __lockdep_init_map+0x10c/0x570 [ 226.175774] mount_fs+0x97/0x2a1 [ 226.179142] vfs_kern_mount.part.0+0x5e/0x3d0 [ 226.183632] do_mount+0x417/0x27d0 [ 226.187163] ? copy_mount_options+0x5c/0x2f0 [ 226.191565] ? rcu_read_lock_sched_held+0x110/0x130 [ 226.196581] ? copy_mount_string+0x40/0x40 [ 226.200826] ? copy_mount_options+0x1fe/0x2f0 [ 226.205318] SyS_mount+0xab/0x120 [ 226.208761] ? copy_mnt_ns+0x8c0/0x8c0 [ 226.212644] do_syscall_64+0x1e8/0x640 [ 226.216524] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 226.221365] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 226.226547] RIP: 0033:0x45c21a [ 226.229724] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 226.237428] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a 12:56:48 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:48 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:49 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:49 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:49 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 226.244694] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 226.251953] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 226.259215] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 226.266476] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:49 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:49 executing program 1 (fault-call:0 fault-nth:70): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:49 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:49 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:49 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:49 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:49 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:49 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:49 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:49 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:49 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:49 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) [ 226.528075] FAULT_INJECTION: forcing a failure. [ 226.528075] name failslab, interval 1, probability 0, space 0, times 0 [ 226.616711] CPU: 1 PID: 13612 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 226.623900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 226.633262] Call Trace: [ 226.635863] dump_stack+0x138/0x19c [ 226.639495] should_fail.cold+0x10f/0x159 [ 226.643642] should_failslab+0xdb/0x130 [ 226.647612] kmem_cache_alloc_node+0x56/0x780 [ 226.652096] ? mount_fs+0x97/0x2a1 [ 226.655635] create_task_io_context+0x31/0x3d0 [ 226.660210] generic_make_request_checks+0x1505/0x1ac0 [ 226.665481] ? rcu_read_lock_sched_held+0x110/0x130 [ 226.670492] ? blk_cleanup_queue+0x610/0x610 [ 226.674916] ? trace_hardirqs_on+0x10/0x10 [ 226.679255] generic_make_request+0x7d/0xa40 [ 226.683661] ? save_trace+0x290/0x290 [ 226.687459] ? blk_queue_enter+0x520/0x520 [ 226.691685] ? find_held_lock+0x35/0x130 [ 226.695740] ? guard_bio_eod+0x161/0x530 [ 226.699796] submit_bio+0x1a5/0x3f0 [ 226.703418] ? submit_bio+0x1a5/0x3f0 [ 226.707211] ? generic_make_request+0xa40/0xa40 [ 226.711879] ? guard_bio_eod+0x1fd/0x530 [ 226.715935] submit_bh_wbc+0x550/0x720 [ 226.719823] block_read_full_page+0x7a2/0x960 [ 226.724317] ? set_init_blocksize+0x220/0x220 [ 226.728815] ? __bread_gfp+0x290/0x290 [ 226.732700] ? add_to_page_cache_lru+0x159/0x310 [ 226.737915] ? add_to_page_cache_locked+0x40/0x40 [ 226.742751] blkdev_readpage+0x1d/0x30 [ 226.746630] do_read_cache_page+0x671/0xfc0 [ 226.750953] ? blkdev_writepages+0xd0/0xd0 [ 226.755188] ? find_get_pages_contig+0xaa0/0xaa0 [ 226.759939] ? blkdev_get+0xb0/0x8e0 [ 226.763650] ? dput.part.0+0x170/0x750 [ 226.767533] ? bd_may_claim+0xd0/0xd0 [ 226.771327] ? path_put+0x50/0x70 [ 226.774773] ? lookup_bdev.part.0+0xe1/0x160 [ 226.779176] read_cache_page_gfp+0x6e/0x90 [ 226.783413] btrfs_read_disk_super+0xdd/0x440 [ 226.787905] btrfs_scan_one_device+0xc6/0x400 [ 226.792394] ? device_list_add+0x8d0/0x8d0 [ 226.796641] ? __free_pages+0x54/0x90 [ 226.800461] ? free_pages+0x46/0x50 [ 226.804205] btrfs_mount+0x2e3/0x2b14 [ 226.808026] ? lock_downgrade+0x6e0/0x6e0 [ 226.812209] ? find_held_lock+0x35/0x130 [ 226.816310] ? pcpu_alloc+0x3af/0x1050 [ 226.820229] ? btrfs_remount+0x11f0/0x11f0 [ 226.824544] ? rcu_read_lock_sched_held+0x110/0x130 [ 226.829625] ? __lockdep_init_map+0x10c/0x570 [ 226.834256] mount_fs+0x97/0x2a1 [ 226.837647] vfs_kern_mount.part.0+0x5e/0x3d0 [ 226.842163] ? find_held_lock+0x35/0x130 [ 226.846693] vfs_kern_mount+0x40/0x60 [ 226.850877] btrfs_mount+0x3ce/0x2b14 [ 226.854713] ? lock_downgrade+0x6e0/0x6e0 [ 226.858890] ? find_held_lock+0x35/0x130 [ 226.862986] ? pcpu_alloc+0x3af/0x1050 [ 226.866914] ? btrfs_remount+0x11f0/0x11f0 [ 226.871185] ? rcu_read_lock_sched_held+0x110/0x130 [ 226.876344] ? __lockdep_init_map+0x10c/0x570 [ 226.880868] ? __lockdep_init_map+0x10c/0x570 [ 226.885401] mount_fs+0x97/0x2a1 [ 226.888815] vfs_kern_mount.part.0+0x5e/0x3d0 [ 226.893345] do_mount+0x417/0x27d0 [ 226.896912] ? copy_mount_string+0x40/0x40 [ 226.901287] ? __sanitizer_cov_trace_pc+0x2a/0x60 [ 226.906168] ? copy_mount_options+0x1fe/0x2f0 [ 226.910680] SyS_mount+0xab/0x120 [ 226.914129] ? copy_mnt_ns+0x8c0/0x8c0 [ 226.918015] do_syscall_64+0x1e8/0x640 [ 226.921895] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 226.926741] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 226.931922] RIP: 0033:0x45c21a [ 226.935104] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 226.942805] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 226.950071] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 226.957334] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 12:56:49 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 226.964613] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 226.971873] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 226.979533] net_ratelimit: 20 callbacks suppressed [ 226.979539] protocol 88fb is buggy, dev hsr_slave_0 [ 226.989585] protocol 88fb is buggy, dev hsr_slave_1 12:56:50 executing program 1 (fault-call:0 fault-nth:71): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:50 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:50 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:50 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:50 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:50 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:50 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:50 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:50 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:50 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 227.179088] FAULT_INJECTION: forcing a failure. [ 227.179088] name failslab, interval 1, probability 0, space 0, times 0 [ 227.190527] protocol 88fb is buggy, dev hsr_slave_0 [ 227.190593] protocol 88fb is buggy, dev hsr_slave_1 12:56:50 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:50 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 227.345853] CPU: 0 PID: 13645 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 227.353006] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 227.362371] Call Trace: [ 227.364969] dump_stack+0x138/0x19c [ 227.368609] should_fail.cold+0x10f/0x159 [ 227.372765] ? __lock_is_held+0xb6/0x140 [ 227.376846] ? mempool_free+0x1d0/0x1d0 [ 227.380827] should_failslab+0xdb/0x130 [ 227.384806] kmem_cache_alloc+0x47/0x780 [ 227.388888] ? mempool_free+0x1d0/0x1d0 [ 227.392870] mempool_alloc_slab+0x47/0x60 [ 227.397016] mempool_alloc+0x138/0x300 [ 227.400903] ? remove_element.isra.0+0x1b0/0x1b0 [ 227.405654] ? find_held_lock+0x35/0x130 [ 227.409712] ? create_empty_buffers+0x2d3/0x480 [ 227.414390] ? save_trace+0x290/0x290 [ 227.418191] bio_alloc_bioset+0x368/0x680 [ 227.422345] ? bvec_alloc+0x2e0/0x2e0 [ 227.426147] submit_bh_wbc+0xf6/0x720 [ 227.429977] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 227.435517] block_read_full_page+0x7a2/0x960 [ 227.440016] ? set_init_blocksize+0x220/0x220 [ 227.444518] ? __bread_gfp+0x290/0x290 [ 227.448401] ? add_to_page_cache_lru+0x159/0x310 [ 227.453198] ? add_to_page_cache_locked+0x40/0x40 [ 227.458038] blkdev_readpage+0x1d/0x30 [ 227.461930] do_read_cache_page+0x671/0xfc0 [ 227.466244] ? blkdev_writepages+0xd0/0xd0 [ 227.470480] ? find_get_pages_contig+0xaa0/0xaa0 [ 227.475227] ? blkdev_get+0xb0/0x8e0 [ 227.478936] ? dput.part.0+0x170/0x750 [ 227.482822] ? bd_may_claim+0xd0/0xd0 [ 227.486618] ? path_put+0x50/0x70 [ 227.490065] ? lookup_bdev.part.0+0xe1/0x160 [ 227.494470] read_cache_page_gfp+0x6e/0x90 [ 227.498708] btrfs_read_disk_super+0xdd/0x440 [ 227.503218] btrfs_scan_one_device+0xc6/0x400 [ 227.507711] ? device_list_add+0x8d0/0x8d0 [ 227.511942] ? __free_pages+0x54/0x90 [ 227.515733] ? free_pages+0x46/0x50 [ 227.519359] btrfs_mount+0x2e3/0x2b14 [ 227.523158] ? lock_downgrade+0x6e0/0x6e0 [ 227.527301] ? find_held_lock+0x35/0x130 [ 227.531362] ? pcpu_alloc+0x3af/0x1050 [ 227.535255] ? btrfs_remount+0x11f0/0x11f0 [ 227.539512] ? rcu_read_lock_sched_held+0x110/0x130 [ 227.544548] ? __lockdep_init_map+0x10c/0x570 [ 227.549054] mount_fs+0x97/0x2a1 [ 227.552425] vfs_kern_mount.part.0+0x5e/0x3d0 [ 227.556934] ? find_held_lock+0x35/0x130 [ 227.560997] vfs_kern_mount+0x40/0x60 [ 227.564797] btrfs_mount+0x3ce/0x2b14 [ 227.568599] ? lock_downgrade+0x6e0/0x6e0 [ 227.572740] ? find_held_lock+0x35/0x130 [ 227.576801] ? pcpu_alloc+0x3af/0x1050 [ 227.580693] ? btrfs_remount+0x11f0/0x11f0 [ 227.584933] ? rcu_read_lock_sched_held+0x110/0x130 [ 227.589964] ? __lockdep_init_map+0x10c/0x570 [ 227.594465] ? __lockdep_init_map+0x10c/0x570 [ 227.598959] mount_fs+0x97/0x2a1 [ 227.602333] vfs_kern_mount.part.0+0x5e/0x3d0 [ 227.608312] do_mount+0x417/0x27d0 [ 227.611850] ? copy_mount_options+0x5c/0x2f0 [ 227.616264] ? rcu_read_lock_sched_held+0x110/0x130 [ 227.621300] ? copy_mount_string+0x40/0x40 [ 227.625552] ? copy_mount_options+0x1fe/0x2f0 [ 227.630071] SyS_mount+0xab/0x120 [ 227.633532] ? copy_mnt_ns+0x8c0/0x8c0 [ 227.637615] do_syscall_64+0x1e8/0x640 [ 227.641501] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 227.646374] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 227.651575] RIP: 0033:0x45c21a [ 227.654761] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 227.662473] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 227.669750] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 227.677027] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 227.684317] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 227.691611] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 227.750151] protocol 88fb is buggy, dev hsr_slave_0 [ 227.755334] protocol 88fb is buggy, dev hsr_slave_1 12:56:50 executing program 1 (fault-call:0 fault-nth:72): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:50 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:50 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:50 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:50 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:50 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:50 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:50 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:50 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:50 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:50 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) [ 227.910209] protocol 88fb is buggy, dev hsr_slave_0 [ 227.915318] protocol 88fb is buggy, dev hsr_slave_1 [ 227.947230] FAULT_INJECTION: forcing a failure. [ 227.947230] name failslab, interval 1, probability 0, space 0, times 0 [ 227.958469] CPU: 1 PID: 13684 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 227.965582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 227.974947] Call Trace: [ 227.977559] dump_stack+0x138/0x19c [ 227.981206] should_fail.cold+0x10f/0x159 [ 227.985360] should_failslab+0xdb/0x130 [ 227.989338] kmem_cache_alloc+0x47/0x780 [ 227.993409] radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 227.999043] __radix_tree_create+0x337/0x4d0 [ 228.003461] page_cache_tree_insert+0xa7/0x2d0 [ 228.008047] ? file_check_and_advance_wb_err+0x380/0x380 [ 228.013511] ? debug_smp_processor_id+0x1c/0x20 [ 228.018194] __add_to_page_cache_locked+0x2ab/0x7e0 [ 228.023215] ? find_lock_entry+0x3f0/0x3f0 [ 228.027451] add_to_page_cache_lru+0xf4/0x310 [ 228.031945] ? add_to_page_cache_locked+0x40/0x40 [ 228.036787] ? __page_cache_alloc+0xdd/0x3e0 [ 228.041201] do_read_cache_page+0x64e/0xfc0 [ 228.045522] ? blkdev_writepages+0xd0/0xd0 [ 228.049764] ? find_get_pages_contig+0xaa0/0xaa0 [ 228.054514] ? blkdev_get+0xb0/0x8e0 [ 228.058226] ? dput.part.0+0x170/0x750 [ 228.062109] ? bd_may_claim+0xd0/0xd0 [ 228.065920] ? path_put+0x50/0x70 [ 228.069385] ? lookup_bdev.part.0+0xe1/0x160 [ 228.073790] read_cache_page_gfp+0x6e/0x90 [ 228.078037] btrfs_read_disk_super+0xdd/0x440 [ 228.082537] btrfs_scan_one_device+0xc6/0x400 [ 228.087033] ? device_list_add+0x8d0/0x8d0 [ 228.091269] ? __free_pages+0x54/0x90 [ 228.095073] ? free_pages+0x46/0x50 [ 228.098702] btrfs_mount+0x2e3/0x2b14 [ 228.102596] ? lock_downgrade+0x6e0/0x6e0 [ 228.106739] ? find_held_lock+0x35/0x130 [ 228.110795] ? pcpu_alloc+0x3af/0x1050 [ 228.114692] ? btrfs_remount+0x11f0/0x11f0 [ 228.118934] ? rcu_read_lock_sched_held+0x110/0x130 [ 228.123969] ? __lockdep_init_map+0x10c/0x570 [ 228.128471] mount_fs+0x97/0x2a1 [ 228.131848] vfs_kern_mount.part.0+0x5e/0x3d0 [ 228.136432] ? find_held_lock+0x35/0x130 [ 228.140494] vfs_kern_mount+0x40/0x60 [ 228.144311] btrfs_mount+0x3ce/0x2b14 [ 228.148113] ? lock_downgrade+0x6e0/0x6e0 [ 228.152253] ? find_held_lock+0x35/0x130 [ 228.156311] ? pcpu_alloc+0x3af/0x1050 [ 228.160206] ? btrfs_remount+0x11f0/0x11f0 [ 228.164453] ? rcu_read_lock_sched_held+0x110/0x130 [ 228.169524] ? __lockdep_init_map+0x10c/0x570 [ 228.174027] ? __lockdep_init_map+0x10c/0x570 [ 228.178524] mount_fs+0x97/0x2a1 [ 228.181891] vfs_kern_mount.part.0+0x5e/0x3d0 [ 228.186387] do_mount+0x417/0x27d0 [ 228.189926] ? copy_mount_options+0x5c/0x2f0 [ 228.194444] ? rcu_read_lock_sched_held+0x110/0x130 [ 228.199468] ? copy_mount_string+0x40/0x40 [ 228.203710] ? copy_mount_options+0x1fe/0x2f0 [ 228.208205] SyS_mount+0xab/0x120 [ 228.211655] ? copy_mnt_ns+0x8c0/0x8c0 [ 228.215546] do_syscall_64+0x1e8/0x640 [ 228.219428] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 228.224275] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 228.229459] RIP: 0033:0x45c21a [ 228.232640] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 228.240349] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 228.247618] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 228.254882] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 228.262147] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 228.269414] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:51 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 228.310144] protocol 88fb is buggy, dev hsr_slave_0 [ 228.310185] protocol 88fb is buggy, dev hsr_slave_1 12:56:51 executing program 1 (fault-call:0 fault-nth:73): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:51 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:51 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:51 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:51 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:51 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:51 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:51 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:51 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 228.504237] FAULT_INJECTION: forcing a failure. [ 228.504237] name failslab, interval 1, probability 0, space 0, times 0 12:56:51 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 228.565163] CPU: 0 PID: 13721 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 228.572862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.582229] Call Trace: [ 228.584842] dump_stack+0x138/0x19c [ 228.588497] should_fail.cold+0x10f/0x159 [ 228.592673] should_failslab+0xdb/0x130 [ 228.596663] kmem_cache_alloc+0x2d7/0x780 [ 228.600835] ? save_stack_trace+0x16/0x20 [ 228.605099] ? save_stack+0x45/0xd0 [ 228.608746] ? kasan_kmalloc+0xce/0xf0 12:56:51 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) [ 228.612644] ? kmem_cache_alloc_trace+0x152/0x790 [ 228.617508] ? btrfs_mount+0x1069/0x2b14 [ 228.621576] ? mount_fs+0x97/0x2a1 [ 228.625125] getname_kernel+0x53/0x350 [ 228.629060] kern_path+0x20/0x40 [ 228.632434] lookup_bdev.part.0+0x63/0x160 [ 228.636676] ? blkdev_open+0x260/0x260 [ 228.640569] ? btrfs_open_devices+0x27/0xb0 [ 228.644932] blkdev_get_by_path+0x76/0xf0 [ 228.649081] btrfs_get_bdev_and_sb+0x38/0x2e0 [ 228.653579] __btrfs_open_devices+0x194/0xab0 [ 228.658075] ? check_preemption_disabled+0x3c/0x250 [ 228.663177] ? find_device+0x100/0x100 [ 228.667060] ? btrfs_mount+0x1069/0x2b14 [ 228.671147] ? rcu_read_lock_sched_held+0x110/0x130 [ 228.676171] btrfs_open_devices+0xa4/0xb0 [ 228.680525] btrfs_mount+0x11b4/0x2b14 [ 228.684513] ? lock_downgrade+0x6e0/0x6e0 [ 228.688677] ? find_held_lock+0x35/0x130 [ 228.692909] ? pcpu_alloc+0x3af/0x1050 [ 228.696801] ? btrfs_remount+0x11f0/0x11f0 [ 228.701045] ? rcu_read_lock_sched_held+0x110/0x130 [ 228.706073] ? __lockdep_init_map+0x10c/0x570 [ 228.710594] mount_fs+0x97/0x2a1 [ 228.713978] vfs_kern_mount.part.0+0x5e/0x3d0 [ 228.718468] ? find_held_lock+0x35/0x130 [ 228.722554] vfs_kern_mount+0x40/0x60 [ 228.726368] btrfs_mount+0x3ce/0x2b14 [ 228.730177] ? lock_downgrade+0x6e0/0x6e0 [ 228.735141] ? find_held_lock+0x35/0x130 [ 228.739196] ? pcpu_alloc+0x3af/0x1050 [ 228.743092] ? btrfs_remount+0x11f0/0x11f0 [ 228.747340] ? rcu_read_lock_sched_held+0x110/0x130 [ 228.752361] ? __lockdep_init_map+0x10c/0x570 [ 228.756848] ? __lockdep_init_map+0x10c/0x570 [ 228.761347] mount_fs+0x97/0x2a1 [ 228.764712] vfs_kern_mount.part.0+0x5e/0x3d0 [ 228.769208] do_mount+0x417/0x27d0 [ 228.772743] ? copy_mount_options+0x5c/0x2f0 [ 228.777151] ? rcu_read_lock_sched_held+0x110/0x130 [ 228.782168] ? copy_mount_string+0x40/0x40 [ 228.786406] ? copy_mount_options+0x1fe/0x2f0 [ 228.790901] SyS_mount+0xab/0x120 [ 228.794356] ? copy_mnt_ns+0x8c0/0x8c0 [ 228.798266] do_syscall_64+0x1e8/0x640 [ 228.802156] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 228.807012] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 228.812208] RIP: 0033:0x45c21a 12:56:51 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 228.815479] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 228.823190] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 228.830456] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 228.837737] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 228.845017] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 228.852294] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:51 executing program 1 (fault-call:0 fault-nth:74): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:51 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:51 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:51 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:51 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:51 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:52 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:52 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:52 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:52 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 229.102638] FAULT_INJECTION: forcing a failure. [ 229.102638] name failslab, interval 1, probability 0, space 0, times 0 [ 229.136320] CPU: 1 PID: 13761 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 229.143462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 229.152845] Call Trace: [ 229.152893] dump_stack+0x138/0x19c [ 229.152913] should_fail.cold+0x10f/0x159 [ 229.152933] should_failslab+0xdb/0x130 [ 229.152949] kmem_cache_alloc_node+0x56/0x780 [ 229.171717] ? mount_fs+0x97/0x2a1 [ 229.171740] create_task_io_context+0x31/0x3d0 [ 229.171756] generic_make_request_checks+0x1505/0x1ac0 [ 229.171771] ? rcu_read_lock_sched_held+0x110/0x130 [ 229.171783] ? blk_cleanup_queue+0x610/0x610 [ 229.171797] ? trace_hardirqs_on+0x10/0x10 [ 229.171815] generic_make_request+0x7d/0xa40 [ 229.185224] ? save_trace+0x290/0x290 [ 229.203260] ? blk_queue_enter+0x520/0x520 [ 229.203276] ? find_held_lock+0x35/0x130 [ 229.203290] ? guard_bio_eod+0x161/0x530 [ 229.203304] submit_bio+0x1a5/0x3f0 [ 229.203314] ? submit_bio+0x1a5/0x3f0 [ 229.203327] ? generic_make_request+0xa40/0xa40 [ 229.211367] ? guard_bio_eod+0x1fd/0x530 [ 229.211383] submit_bh_wbc+0x550/0x720 [ 229.211400] block_read_full_page+0x7a2/0x960 [ 229.211413] ? set_init_blocksize+0x220/0x220 [ 229.211427] ? __bread_gfp+0x290/0x290 [ 229.252391] ? add_to_page_cache_lru+0x159/0x310 [ 229.257147] ? add_to_page_cache_locked+0x40/0x40 [ 229.261988] blkdev_readpage+0x1d/0x30 [ 229.265871] do_read_cache_page+0x671/0xfc0 [ 229.270176] ? blkdev_writepages+0xd0/0xd0 [ 229.274401] ? find_get_pages_contig+0xaa0/0xaa0 [ 229.279144] ? blkdev_get+0xb0/0x8e0 [ 229.282868] ? dput.part.0+0x170/0x750 [ 229.286956] ? bd_may_claim+0xd0/0xd0 [ 229.290847] ? path_put+0x50/0x70 [ 229.294305] ? lookup_bdev.part.0+0xe1/0x160 [ 229.298745] read_cache_page_gfp+0x6e/0x90 [ 229.302983] btrfs_read_disk_super+0xdd/0x440 [ 229.307472] btrfs_scan_one_device+0xc6/0x400 [ 229.311976] ? device_list_add+0x8d0/0x8d0 [ 229.316227] ? __free_pages+0x54/0x90 [ 229.320026] ? free_pages+0x46/0x50 [ 229.323649] btrfs_mount+0x2e3/0x2b14 [ 229.327438] ? lock_downgrade+0x6e0/0x6e0 [ 229.331569] ? find_held_lock+0x35/0x130 [ 229.335632] ? pcpu_alloc+0x3af/0x1050 [ 229.339536] ? btrfs_remount+0x11f0/0x11f0 [ 229.343763] ? rcu_read_lock_sched_held+0x110/0x130 [ 229.348775] ? __lockdep_init_map+0x10c/0x570 [ 229.353262] mount_fs+0x97/0x2a1 [ 229.356639] vfs_kern_mount.part.0+0x5e/0x3d0 [ 229.361140] ? find_held_lock+0x35/0x130 [ 229.365207] vfs_kern_mount+0x40/0x60 [ 229.369018] btrfs_mount+0x3ce/0x2b14 [ 229.372839] ? lock_downgrade+0x6e0/0x6e0 [ 229.376986] ? find_held_lock+0x35/0x130 [ 229.381039] ? pcpu_alloc+0x3af/0x1050 [ 229.384925] ? btrfs_remount+0x11f0/0x11f0 [ 229.389175] ? rcu_read_lock_sched_held+0x110/0x130 [ 229.394280] ? __lockdep_init_map+0x10c/0x570 [ 229.398772] ? __lockdep_init_map+0x10c/0x570 [ 229.403272] mount_fs+0x97/0x2a1 [ 229.406637] vfs_kern_mount.part.0+0x5e/0x3d0 [ 229.411133] do_mount+0x417/0x27d0 [ 229.414688] ? copy_mount_options+0x5c/0x2f0 [ 229.419121] ? rcu_read_lock_sched_held+0x110/0x130 [ 229.424138] ? copy_mount_string+0x40/0x40 [ 229.428359] ? copy_mount_options+0x1fe/0x2f0 [ 229.432847] SyS_mount+0xab/0x120 [ 229.436323] ? copy_mnt_ns+0x8c0/0x8c0 [ 229.440205] do_syscall_64+0x1e8/0x640 [ 229.444079] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 229.448911] entry_SYSCALL_64_after_hwframe+0x42/0xb7 12:56:52 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:52 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 229.454082] RIP: 0033:0x45c21a [ 229.457258] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 229.464976] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 229.472247] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 229.479510] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 229.486770] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 229.494028] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:52 executing program 1 (fault-call:0 fault-nth:75): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:52 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:52 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:52 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:52 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:52 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:52 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:52 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:52 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:52 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:52 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 229.745819] FAULT_INJECTION: forcing a failure. [ 229.745819] name failslab, interval 1, probability 0, space 0, times 0 12:56:52 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) [ 229.794659] CPU: 1 PID: 13797 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 229.801818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 229.811184] Call Trace: [ 229.813794] dump_stack+0x138/0x19c [ 229.817451] should_fail.cold+0x10f/0x159 [ 229.821628] should_failslab+0xdb/0x130 [ 229.821643] kmem_cache_alloc_trace+0x2e9/0x790 [ 229.821654] ? __kmalloc_node+0x51/0x80 [ 229.821673] btrfs_mount+0x1001/0x2b14 [ 229.821684] ? lock_downgrade+0x6e0/0x6e0 [ 229.821693] ? find_held_lock+0x35/0x130 [ 229.821702] ? pcpu_alloc+0x3af/0x1050 [ 229.821717] ? btrfs_remount+0x11f0/0x11f0 [ 229.821735] ? rcu_read_lock_sched_held+0x110/0x130 [ 229.859527] ? __lockdep_init_map+0x10c/0x570 [ 229.864049] mount_fs+0x97/0x2a1 [ 229.867425] vfs_kern_mount.part.0+0x5e/0x3d0 [ 229.871940] ? find_held_lock+0x35/0x130 [ 229.876096] vfs_kern_mount+0x40/0x60 [ 229.879898] btrfs_mount+0x3ce/0x2b14 [ 229.883784] ? lock_downgrade+0x6e0/0x6e0 [ 229.887938] ? find_held_lock+0x35/0x130 [ 229.892002] ? pcpu_alloc+0x3af/0x1050 [ 229.895919] ? btrfs_remount+0x11f0/0x11f0 [ 229.900161] ? rcu_read_lock_sched_held+0x110/0x130 [ 229.905185] ? __lockdep_init_map+0x10c/0x570 [ 229.909677] ? __lockdep_init_map+0x10c/0x570 [ 229.914174] mount_fs+0x97/0x2a1 [ 229.917541] vfs_kern_mount.part.0+0x5e/0x3d0 [ 229.922040] do_mount+0x417/0x27d0 [ 229.925576] ? copy_mount_options+0x5c/0x2f0 [ 229.929986] ? rcu_read_lock_sched_held+0x110/0x130 [ 229.935010] ? copy_mount_string+0x40/0x40 [ 229.939269] ? copy_mount_options+0x1fe/0x2f0 [ 229.943766] SyS_mount+0xab/0x120 [ 229.947216] ? copy_mnt_ns+0x8c0/0x8c0 [ 229.951120] do_syscall_64+0x1e8/0x640 [ 229.955002] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 229.959856] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 229.965040] RIP: 0033:0x45c21a [ 229.968224] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 229.975933] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 229.983202] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 229.990473] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 229.997744] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 230.005011] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:53 executing program 1 (fault-call:0 fault-nth:76): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:53 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:53 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:53 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:53 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:53 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:53 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:53 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:53 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:53 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:53 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:53 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 230.295603] FAULT_INJECTION: forcing a failure. [ 230.295603] name failslab, interval 1, probability 0, space 0, times 0 [ 230.381588] CPU: 0 PID: 13835 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 230.388953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.398646] Call Trace: [ 230.401373] dump_stack+0x138/0x19c [ 230.405078] should_fail.cold+0x10f/0x159 [ 230.409453] should_failslab+0xdb/0x130 [ 230.413724] kmem_cache_alloc_trace+0x2e9/0x790 [ 230.413736] ? __kmalloc_node+0x51/0x80 [ 230.413753] btrfs_mount+0x1001/0x2b14 [ 230.413765] ? lock_downgrade+0x6e0/0x6e0 [ 230.413772] ? find_held_lock+0x35/0x130 [ 230.413780] ? pcpu_alloc+0x3af/0x1050 [ 230.413795] ? btrfs_remount+0x11f0/0x11f0 [ 230.413812] ? rcu_read_lock_sched_held+0x110/0x130 [ 230.413829] ? __lockdep_init_map+0x10c/0x570 [ 230.413845] mount_fs+0x97/0x2a1 [ 230.413861] vfs_kern_mount.part.0+0x5e/0x3d0 [ 230.413874] ? find_held_lock+0x35/0x130 [ 230.443502] vfs_kern_mount+0x40/0x60 [ 230.443521] btrfs_mount+0x3ce/0x2b14 [ 230.443532] ? lock_downgrade+0x6e0/0x6e0 [ 230.443540] ? find_held_lock+0x35/0x130 [ 230.443549] ? pcpu_alloc+0x3af/0x1050 [ 230.443565] ? btrfs_remount+0x11f0/0x11f0 [ 230.443585] ? rcu_read_lock_sched_held+0x110/0x130 [ 230.493852] ? __lockdep_init_map+0x10c/0x570 [ 230.498341] ? __lockdep_init_map+0x10c/0x570 [ 230.502836] mount_fs+0x97/0x2a1 [ 230.506209] vfs_kern_mount.part.0+0x5e/0x3d0 [ 230.510794] do_mount+0x417/0x27d0 [ 230.514338] ? copy_mount_options+0x5c/0x2f0 [ 230.518737] ? rcu_read_lock_sched_held+0x110/0x130 [ 230.523759] ? copy_mount_string+0x40/0x40 [ 230.527995] ? copy_mount_options+0x1fe/0x2f0 [ 230.532514] SyS_mount+0xab/0x120 [ 230.535969] ? copy_mnt_ns+0x8c0/0x8c0 [ 230.539853] do_syscall_64+0x1e8/0x640 [ 230.543754] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 230.548604] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 230.562109] RIP: 0033:0x45c21a [ 230.565286] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 230.572990] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 230.580268] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 230.587550] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 230.594818] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 230.602081] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:53 executing program 1 (fault-call:0 fault-nth:77): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:53 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:53 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:53 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:53 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:53 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:53 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:53 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) [ 230.731476] FAULT_INJECTION: forcing a failure. [ 230.731476] name failslab, interval 1, probability 0, space 0, times 0 [ 230.744629] CPU: 1 PID: 13870 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 230.751755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.761109] Call Trace: [ 230.761135] dump_stack+0x138/0x19c [ 230.761158] should_fail.cold+0x10f/0x159 [ 230.767359] should_failslab+0xdb/0x130 [ 230.775461] kmem_cache_alloc_trace+0x2e9/0x790 12:56:53 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) [ 230.780197] btrfs_mount+0x1069/0x2b14 [ 230.784108] ? lock_downgrade+0x6e0/0x6e0 [ 230.788265] ? find_held_lock+0x35/0x130 [ 230.792340] ? pcpu_alloc+0x3af/0x1050 [ 230.796270] ? btrfs_remount+0x11f0/0x11f0 [ 230.800535] ? rcu_read_lock_sched_held+0x110/0x130 [ 230.805580] ? __lockdep_init_map+0x10c/0x570 [ 230.810093] mount_fs+0x97/0x2a1 [ 230.813474] vfs_kern_mount.part.0+0x5e/0x3d0 [ 230.817972] ? find_held_lock+0x35/0x130 [ 230.817988] vfs_kern_mount+0x40/0x60 [ 230.825844] btrfs_mount+0x3ce/0x2b14 12:56:53 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) [ 230.825859] ? lock_downgrade+0x6e0/0x6e0 [ 230.825870] ? find_held_lock+0x35/0x130 [ 230.837867] ? pcpu_alloc+0x3af/0x1050 [ 230.841776] ? btrfs_remount+0x11f0/0x11f0 [ 230.846032] ? rcu_read_lock_sched_held+0x110/0x130 [ 230.851075] ? __lockdep_init_map+0x10c/0x570 [ 230.855588] ? __lockdep_init_map+0x10c/0x570 [ 230.860101] mount_fs+0x97/0x2a1 [ 230.863476] vfs_kern_mount.part.0+0x5e/0x3d0 [ 230.867987] do_mount+0x417/0x27d0 [ 230.871539] ? copy_mount_string+0x40/0x40 [ 230.875773] ? copy_mount_options+0x151/0x2f0 [ 230.875787] ? __sanitizer_cov_trace_pc+0x4e/0x60 [ 230.885113] ? copy_mount_options+0x1fe/0x2f0 [ 230.889619] SyS_mount+0xab/0x120 [ 230.893080] ? copy_mnt_ns+0x8c0/0x8c0 [ 230.896980] do_syscall_64+0x1e8/0x640 [ 230.900870] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 230.906167] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 230.911365] RIP: 0033:0x45c21a [ 230.914558] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 230.922269] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a 12:56:53 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:53 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 230.929538] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 230.929549] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 230.944084] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 230.944092] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:54 executing program 1 (fault-call:0 fault-nth:78): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:54 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:54 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:54 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:54 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:54 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:54 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:54 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:54 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) [ 231.142442] FAULT_INJECTION: forcing a failure. [ 231.142442] name failslab, interval 1, probability 0, space 0, times 0 [ 231.153686] CPU: 1 PID: 13906 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 231.160795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 231.170160] Call Trace: [ 231.172761] dump_stack+0x138/0x19c [ 231.176403] should_fail.cold+0x10f/0x159 [ 231.180562] should_failslab+0xdb/0x130 [ 231.184547] kmem_cache_alloc+0x47/0x780 12:56:54 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 231.188631] radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 231.194273] __radix_tree_create+0x337/0x4d0 [ 231.198715] page_cache_tree_insert+0xa7/0x2d0 [ 231.203313] ? file_check_and_advance_wb_err+0x380/0x380 [ 231.208777] ? debug_smp_processor_id+0x1c/0x20 [ 231.213476] __add_to_page_cache_locked+0x2ab/0x7e0 [ 231.218517] ? find_lock_entry+0x3f0/0x3f0 [ 231.222767] ? lock_downgrade+0x6e0/0x6e0 [ 231.226925] add_to_page_cache_lru+0xf4/0x310 [ 231.231432] ? add_to_page_cache_locked+0x40/0x40 [ 231.236285] ? __page_cache_alloc+0xdd/0x3e0 12:56:54 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:54 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 231.240712] pagecache_get_page+0x1f5/0x750 [ 231.245064] __getblk_gfp+0x24b/0x710 [ 231.248882] ? lru_add_drain_all+0x18/0x20 [ 231.253126] __bread_gfp+0x2e/0x290 [ 231.253141] btrfs_read_dev_one_super+0x9f/0x270 [ 231.253151] btrfs_read_dev_super+0x5d/0xb0 [ 231.253161] ? btrfs_read_dev_one_super+0x270/0x270 [ 231.253176] btrfs_get_bdev_and_sb+0xdc/0x2e0 [ 231.253188] __btrfs_open_devices+0x194/0xab0 [ 231.253204] ? check_preemption_disabled+0x3c/0x250 [ 231.284899] ? find_device+0x100/0x100 [ 231.288804] ? btrfs_mount+0x1069/0x2b14 [ 231.292925] ? rcu_read_lock_sched_held+0x110/0x130 [ 231.297968] btrfs_open_devices+0xa4/0xb0 [ 231.302141] btrfs_mount+0x11b4/0x2b14 [ 231.306043] ? lock_downgrade+0x6e0/0x6e0 [ 231.310198] ? find_held_lock+0x35/0x130 [ 231.314263] ? pcpu_alloc+0x3af/0x1050 [ 231.318164] ? btrfs_remount+0x11f0/0x11f0 [ 231.322410] ? rcu_read_lock_sched_held+0x110/0x130 [ 231.327447] ? __lockdep_init_map+0x10c/0x570 [ 231.331956] mount_fs+0x97/0x2a1 [ 231.331975] vfs_kern_mount.part.0+0x5e/0x3d0 [ 231.331983] ? find_held_lock+0x35/0x130 [ 231.331994] vfs_kern_mount+0x40/0x60 [ 231.332009] btrfs_mount+0x3ce/0x2b14 [ 231.332021] ? lock_downgrade+0x6e0/0x6e0 [ 231.339874] ? find_held_lock+0x35/0x130 [ 231.339887] ? pcpu_alloc+0x3af/0x1050 [ 231.339908] ? btrfs_remount+0x11f0/0x11f0 [ 231.339926] ? rcu_read_lock_sched_held+0x110/0x130 [ 231.373030] ? __lockdep_init_map+0x10c/0x570 [ 231.377533] ? __lockdep_init_map+0x10c/0x570 [ 231.382045] mount_fs+0x97/0x2a1 [ 231.385412] vfs_kern_mount.part.0+0x5e/0x3d0 [ 231.389906] do_mount+0x417/0x27d0 [ 231.393458] ? copy_mount_options+0x5c/0x2f0 [ 231.397866] ? rcu_read_lock_sched_held+0x110/0x130 [ 231.402886] ? copy_mount_string+0x40/0x40 [ 231.407122] ? copy_mount_options+0x1fe/0x2f0 [ 231.411621] SyS_mount+0xab/0x120 [ 231.415072] ? copy_mnt_ns+0x8c0/0x8c0 [ 231.418962] do_syscall_64+0x1e8/0x640 [ 231.422843] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 231.427688] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 231.432871] RIP: 0033:0x45c21a [ 231.436052] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 231.443776] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 231.451299] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 231.458562] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 231.465821] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 231.473082] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:54 executing program 1 (fault-call:0 fault-nth:79): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:54 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:54 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:54 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:54 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:54 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:54 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:54 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:54 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:54 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:54 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 231.672363] FAULT_INJECTION: forcing a failure. [ 231.672363] name failslab, interval 1, probability 0, space 0, times 0 [ 231.730492] CPU: 1 PID: 13940 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 231.737735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 231.747094] Call Trace: [ 231.749701] dump_stack+0x138/0x19c [ 231.753344] should_fail.cold+0x10f/0x159 [ 231.757514] should_failslab+0xdb/0x130 [ 231.761498] kmem_cache_alloc+0x2d7/0x780 [ 231.765652] ? add_to_page_cache_lru+0x159/0x310 [ 231.770425] ? add_to_page_cache_locked+0x40/0x40 [ 231.775264] alloc_buffer_head+0x24/0xe0 [ 231.779321] alloc_page_buffers+0xb7/0x200 [ 231.783555] __getblk_gfp+0x342/0x710 [ 231.787365] ? lru_add_drain_all+0x18/0x20 [ 231.791600] __bread_gfp+0x2e/0x290 [ 231.795227] btrfs_read_dev_one_super+0x9f/0x270 [ 231.799975] btrfs_read_dev_super+0x5d/0xb0 [ 231.804297] ? btrfs_read_dev_one_super+0x270/0x270 [ 231.809317] btrfs_get_bdev_and_sb+0xdc/0x2e0 [ 231.813805] __btrfs_open_devices+0x194/0xab0 [ 231.818303] ? check_preemption_disabled+0x3c/0x250 [ 231.823320] ? find_device+0x100/0x100 [ 231.827198] ? btrfs_mount+0x1069/0x2b14 [ 231.831253] ? rcu_read_lock_sched_held+0x110/0x130 [ 231.836272] btrfs_open_devices+0xa4/0xb0 [ 231.840420] btrfs_mount+0x11b4/0x2b14 [ 231.844305] ? lock_downgrade+0x6e0/0x6e0 [ 231.848446] ? find_held_lock+0x35/0x130 [ 231.852500] ? pcpu_alloc+0x3af/0x1050 [ 231.856405] ? btrfs_remount+0x11f0/0x11f0 [ 231.860643] ? rcu_read_lock_sched_held+0x110/0x130 [ 231.865659] ? __lockdep_init_map+0x10c/0x570 [ 231.870156] mount_fs+0x97/0x2a1 [ 231.873519] vfs_kern_mount.part.0+0x5e/0x3d0 [ 231.878003] ? find_held_lock+0x35/0x130 [ 231.882065] vfs_kern_mount+0x40/0x60 [ 231.885860] btrfs_mount+0x3ce/0x2b14 [ 231.889653] ? lock_downgrade+0x6e0/0x6e0 [ 231.893812] ? find_held_lock+0x35/0x130 [ 231.897866] ? pcpu_alloc+0x3af/0x1050 [ 231.901756] ? btrfs_remount+0x11f0/0x11f0 [ 231.905988] ? rcu_read_lock_sched_held+0x110/0x130 [ 231.911008] ? __lockdep_init_map+0x10c/0x570 [ 231.915498] ? __lockdep_init_map+0x10c/0x570 [ 231.919990] mount_fs+0x97/0x2a1 [ 231.923355] vfs_kern_mount.part.0+0x5e/0x3d0 [ 231.927844] do_mount+0x417/0x27d0 [ 231.931394] ? copy_mount_options+0x5c/0x2f0 [ 231.935798] ? rcu_read_lock_sched_held+0x110/0x130 [ 231.940817] ? copy_mount_string+0x40/0x40 [ 231.945067] ? copy_mount_options+0x1fe/0x2f0 [ 231.949569] SyS_mount+0xab/0x120 [ 231.953017] ? copy_mnt_ns+0x8c0/0x8c0 [ 231.956901] do_syscall_64+0x1e8/0x640 [ 231.960779] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 231.965623] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 231.970802] RIP: 0033:0x45c21a [ 231.973983] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 12:56:55 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 231.981699] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 231.988960] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 231.996222] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 232.003508] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 232.010782] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 232.070166] net_ratelimit: 17 callbacks suppressed [ 232.070172] protocol 88fb is buggy, dev hsr_slave_0 [ 232.080146] protocol 88fb is buggy, dev hsr_slave_0 [ 232.080272] protocol 88fb is buggy, dev hsr_slave_1 [ 232.085297] protocol 88fb is buggy, dev hsr_slave_1 12:56:55 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:55 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:55 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:55 executing program 1 (fault-call:0 fault-nth:80): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:55 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:55 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:55 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:55 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:55 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 232.342857] FAULT_INJECTION: forcing a failure. [ 232.342857] name failslab, interval 1, probability 0, space 0, times 0 [ 232.354101] CPU: 0 PID: 13978 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 232.361207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.370569] Call Trace: [ 232.373172] dump_stack+0x138/0x19c [ 232.376822] should_fail.cold+0x10f/0x159 [ 232.380990] should_failslab+0xdb/0x130 [ 232.384968] kmem_cache_alloc+0x47/0x780 [ 232.389039] radix_tree_node_alloc.constprop.0+0x1c7/0x310 [ 232.394666] __radix_tree_create+0x337/0x4d0 [ 232.399077] page_cache_tree_insert+0xa7/0x2d0 [ 232.403657] ? file_check_and_advance_wb_err+0x380/0x380 [ 232.409107] ? debug_smp_processor_id+0x1c/0x20 [ 232.413781] __add_to_page_cache_locked+0x2ab/0x7e0 [ 232.418804] ? find_lock_entry+0x3f0/0x3f0 [ 232.423043] ? lock_downgrade+0x6e0/0x6e0 [ 232.427197] add_to_page_cache_lru+0xf4/0x310 [ 232.431693] ? add_to_page_cache_locked+0x40/0x40 [ 232.436536] ? __page_cache_alloc+0xdd/0x3e0 [ 232.440980] pagecache_get_page+0x1f5/0x750 [ 232.445305] __getblk_gfp+0x24b/0x710 [ 232.449112] ? lru_add_drain_all+0x18/0x20 [ 232.453361] __bread_gfp+0x2e/0x290 [ 232.457010] btrfs_read_dev_one_super+0x9f/0x270 [ 232.461765] btrfs_read_dev_super+0x5d/0xb0 [ 232.466084] ? btrfs_read_dev_one_super+0x270/0x270 [ 232.471107] btrfs_get_bdev_and_sb+0xdc/0x2e0 [ 232.475602] __btrfs_open_devices+0x194/0xab0 [ 232.480099] ? check_preemption_disabled+0x3c/0x250 [ 232.485119] ? find_device+0x100/0x100 [ 232.489003] ? btrfs_mount+0x1069/0x2b14 [ 232.493061] ? rcu_read_lock_sched_held+0x110/0x130 [ 232.498082] btrfs_open_devices+0xa4/0xb0 [ 232.502229] btrfs_mount+0x11b4/0x2b14 [ 232.506129] ? lock_downgrade+0x6e0/0x6e0 [ 232.510274] ? find_held_lock+0x35/0x130 [ 232.514369] ? pcpu_alloc+0x3af/0x1050 [ 232.518263] ? btrfs_remount+0x11f0/0x11f0 [ 232.522503] ? rcu_read_lock_sched_held+0x110/0x130 [ 232.527528] ? __lockdep_init_map+0x10c/0x570 [ 232.532032] mount_fs+0x97/0x2a1 [ 232.535416] vfs_kern_mount.part.0+0x5e/0x3d0 [ 232.539909] ? find_held_lock+0x35/0x130 [ 232.543974] vfs_kern_mount+0x40/0x60 [ 232.555758] btrfs_mount+0x3ce/0x2b14 [ 232.560279] ? lock_downgrade+0x6e0/0x6e0 [ 232.564441] ? find_held_lock+0x35/0x130 [ 232.568511] ? pcpu_alloc+0x3af/0x1050 [ 232.572408] ? btrfs_remount+0x11f0/0x11f0 [ 232.576655] ? rcu_read_lock_sched_held+0x110/0x130 [ 232.581686] ? __lockdep_init_map+0x10c/0x570 [ 232.586202] ? __lockdep_init_map+0x10c/0x570 [ 232.590712] mount_fs+0x97/0x2a1 [ 232.594099] vfs_kern_mount.part.0+0x5e/0x3d0 [ 232.598601] do_mount+0x417/0x27d0 [ 232.602140] ? copy_mount_options+0x5c/0x2f0 [ 232.606550] ? rcu_read_lock_sched_held+0x110/0x130 [ 232.611574] ? copy_mount_string+0x40/0x40 [ 232.615811] ? copy_mount_options+0x1fe/0x2f0 [ 232.620315] SyS_mount+0xab/0x120 [ 232.623776] ? copy_mnt_ns+0x8c0/0x8c0 [ 232.627676] do_syscall_64+0x1e8/0x640 [ 232.631561] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 232.636416] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 232.641600] RIP: 0033:0x45c21a [ 232.644782] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 232.652489] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 232.659757] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 232.667026] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 232.674295] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 232.681580] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 232.689162] protocol 88fb is buggy, dev hsr_slave_0 12:56:55 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:55 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:55 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 232.689178] protocol 88fb is buggy, dev hsr_slave_0 [ 232.694279] protocol 88fb is buggy, dev hsr_slave_1 [ 232.699275] protocol 88fb is buggy, dev hsr_slave_1 12:56:55 executing program 1 (fault-call:0 fault-nth:81): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:55 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:55 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:55 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:55 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:55 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:55 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:55 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:55 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:55 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:56 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) [ 233.028972] FAULT_INJECTION: forcing a failure. [ 233.028972] name failslab, interval 1, probability 0, space 0, times 0 [ 233.087415] CPU: 0 PID: 14015 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 233.094564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 233.103924] Call Trace: [ 233.106532] dump_stack+0x138/0x19c [ 233.110179] should_fail.cold+0x10f/0x159 [ 233.114344] ? __lock_is_held+0xb6/0x140 [ 233.118409] ? mempool_free+0x1d0/0x1d0 [ 233.122416] should_failslab+0xdb/0x130 [ 233.126386] kmem_cache_alloc+0x47/0x780 [ 233.130883] ? mempool_free+0x1d0/0x1d0 [ 233.134865] mempool_alloc_slab+0x47/0x60 [ 233.139010] mempool_alloc+0x138/0x300 [ 233.142894] ? __find_get_block+0x5c4/0xb10 [ 233.147216] ? remove_element.isra.0+0x1b0/0x1b0 [ 233.151971] ? mark_held_locks+0xb1/0x100 [ 233.156115] ? save_trace+0x290/0x290 [ 233.159908] ? trace_hardirqs_on_caller+0x400/0x590 [ 233.164924] bio_alloc_bioset+0x368/0x680 [ 233.169079] ? bvec_alloc+0x2e0/0x2e0 [ 233.172878] ? __getblk_gfp+0x5c/0x710 [ 233.176760] submit_bh_wbc+0xf6/0x720 [ 233.180556] __bread_gfp+0x106/0x290 [ 233.184266] btrfs_read_dev_one_super+0x9f/0x270 [ 233.189021] btrfs_read_dev_super+0x5d/0xb0 [ 233.190188] protocol 88fb is buggy, dev hsr_slave_0 [ 233.193344] ? btrfs_read_dev_one_super+0x270/0x270 [ 233.198462] protocol 88fb is buggy, dev hsr_slave_1 [ 233.203405] btrfs_get_bdev_and_sb+0xdc/0x2e0 [ 233.203417] __btrfs_open_devices+0x194/0xab0 [ 233.203430] ? check_preemption_disabled+0x3c/0x250 [ 233.203442] ? find_device+0x100/0x100 [ 233.203452] ? btrfs_mount+0x1069/0x2b14 [ 233.203466] ? rcu_read_lock_sched_held+0x110/0x130 [ 233.203480] btrfs_open_devices+0xa4/0xb0 [ 233.203492] btrfs_mount+0x11b4/0x2b14 [ 233.243372] ? lock_downgrade+0x6e0/0x6e0 [ 233.247511] ? find_held_lock+0x35/0x130 [ 233.251652] ? pcpu_alloc+0x3af/0x1050 [ 233.255543] ? btrfs_remount+0x11f0/0x11f0 [ 233.259780] ? rcu_read_lock_sched_held+0x110/0x130 [ 233.264803] ? __lockdep_init_map+0x10c/0x570 [ 233.269301] mount_fs+0x97/0x2a1 [ 233.272671] vfs_kern_mount.part.0+0x5e/0x3d0 [ 233.277162] ? find_held_lock+0x35/0x130 [ 233.281241] vfs_kern_mount+0x40/0x60 [ 233.285043] btrfs_mount+0x3ce/0x2b14 [ 233.288839] ? lock_downgrade+0x6e0/0x6e0 [ 233.292983] ? find_held_lock+0x35/0x130 [ 233.297036] ? pcpu_alloc+0x3af/0x1050 [ 233.300923] ? btrfs_remount+0x11f0/0x11f0 [ 233.305158] ? rcu_read_lock_sched_held+0x110/0x130 [ 233.310179] ? __lockdep_init_map+0x10c/0x570 [ 233.314667] ? __lockdep_init_map+0x10c/0x570 [ 233.319158] mount_fs+0x97/0x2a1 [ 233.322524] vfs_kern_mount.part.0+0x5e/0x3d0 [ 233.327018] do_mount+0x417/0x27d0 [ 233.330550] ? retint_kernel+0x2d/0x2d [ 233.334438] ? copy_mount_string+0x40/0x40 [ 233.338665] ? __sanitizer_cov_trace_pc+0x23/0x60 [ 233.343504] ? copy_mount_options+0x1fe/0x2f0 [ 233.347994] SyS_mount+0xab/0x120 [ 233.351441] ? copy_mnt_ns+0x8c0/0x8c0 [ 233.355330] do_syscall_64+0x1e8/0x640 [ 233.359211] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 233.364051] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 233.369229] RIP: 0033:0x45c21a [ 233.372412] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 233.380117] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a 12:56:56 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) [ 233.387381] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 233.394642] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 233.401900] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 233.409162] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:56 executing program 1 (fault-call:0 fault-nth:82): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:56 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:56 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:56 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:56 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:56 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:56 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:56 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:56 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:56 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:56 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:56 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 233.658163] FAULT_INJECTION: forcing a failure. [ 233.658163] name failslab, interval 1, probability 0, space 0, times 0 [ 233.730209] CPU: 0 PID: 14051 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 233.737358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 233.746720] Call Trace: [ 233.749338] dump_stack+0x138/0x19c [ 233.752981] should_fail.cold+0x10f/0x159 [ 233.757137] should_failslab+0xdb/0x130 [ 233.761200] kmem_cache_alloc+0x2d7/0x780 [ 233.765353] ? add_to_page_cache_lru+0x159/0x310 [ 233.770118] ? add_to_page_cache_locked+0x40/0x40 [ 233.775062] alloc_buffer_head+0x24/0xe0 [ 233.775075] alloc_page_buffers+0xb7/0x200 [ 233.775089] __getblk_gfp+0x342/0x710 [ 233.783370] ? lru_add_drain_all+0x18/0x20 [ 233.783389] __bread_gfp+0x2e/0x290 [ 233.783405] btrfs_read_dev_one_super+0x9f/0x270 [ 233.799795] btrfs_read_dev_super+0x5d/0xb0 [ 233.804164] ? btrfs_read_dev_one_super+0x270/0x270 [ 233.809208] btrfs_get_bdev_and_sb+0xdc/0x2e0 [ 233.813731] __btrfs_open_devices+0x194/0xab0 [ 233.818232] ? check_preemption_disabled+0x3c/0x250 [ 233.823258] ? find_device+0x100/0x100 [ 233.827146] ? btrfs_mount+0x1069/0x2b14 [ 233.831205] ? rcu_read_lock_sched_held+0x110/0x130 [ 233.836222] btrfs_open_devices+0xa4/0xb0 [ 233.840372] btrfs_mount+0x11b4/0x2b14 [ 233.844257] ? lock_downgrade+0x6e0/0x6e0 [ 233.848547] ? find_held_lock+0x35/0x130 [ 233.852620] ? pcpu_alloc+0x3af/0x1050 [ 233.856530] ? btrfs_remount+0x11f0/0x11f0 [ 233.860777] ? rcu_read_lock_sched_held+0x110/0x130 [ 233.865799] ? __lockdep_init_map+0x10c/0x570 [ 233.870297] mount_fs+0x97/0x2a1 [ 233.873665] vfs_kern_mount.part.0+0x5e/0x3d0 [ 233.878152] ? find_held_lock+0x35/0x130 [ 233.882209] vfs_kern_mount+0x40/0x60 [ 233.886007] btrfs_mount+0x3ce/0x2b14 [ 233.889821] ? lock_downgrade+0x6e0/0x6e0 [ 233.893964] ? find_held_lock+0x35/0x130 [ 233.898018] ? pcpu_alloc+0x3af/0x1050 [ 233.901912] ? btrfs_remount+0x11f0/0x11f0 [ 233.906155] ? rcu_read_lock_sched_held+0x110/0x130 [ 233.911190] ? __lockdep_init_map+0x10c/0x570 [ 233.915705] ? __lockdep_init_map+0x10c/0x570 [ 233.920210] mount_fs+0x97/0x2a1 [ 233.923582] vfs_kern_mount.part.0+0x5e/0x3d0 [ 233.928077] do_mount+0x417/0x27d0 [ 233.931612] ? copy_mount_options+0x5c/0x2f0 [ 233.936015] ? rcu_read_lock_sched_held+0x110/0x130 [ 233.941126] ? copy_mount_string+0x40/0x40 [ 233.945378] ? copy_mount_options+0x1fe/0x2f0 [ 233.949896] SyS_mount+0xab/0x120 [ 233.953362] ? copy_mnt_ns+0x8c0/0x8c0 [ 233.957265] do_syscall_64+0x1e8/0x640 [ 233.961163] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 233.966014] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 233.971199] RIP: 0033:0x45c21a [ 233.974380] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 233.982106] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 233.989374] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 233.996637] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 234.003898] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 234.011178] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 12:56:57 executing program 1 (fault-call:0 fault-nth:83): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 12:56:57 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:57 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:57 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 12:56:57 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:57 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 12:56:57 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f00000041c0)=[{{0x0, 0x0, &(0x7f0000000000)=[{0x0, 0xffffffce}], 0x1, 0x0, 0x1b5}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='oom_score_adj\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x324, 0x0) 12:56:57 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 12:56:57 executing program 0: getpid() waitid(0x1, 0x0, 0x0, 0x40000008, &(0x7f00000004c0)) 12:56:57 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x100000890e, &(0x7f00000007c0)="e0") openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40001, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") creat(&(0x7f0000000440)='./file0\x00', 0x80) lsetxattr$trusted_overlay_origin(&(0x7f0000000580)='./file0\x00', &(0x7f0000000400)='trusted.overlay.origin\x00', &(0x7f0000000600)='y\x00', 0x2ff, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x10008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x276, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x800000000000004) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x9, @ipv4={[], [], @rand_addr=0x2}, 0x8000}, 0x1c) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) [ 234.327065] FAULT_INJECTION: forcing a failure. [ 234.327065] name failslab, interval 1, probability 0, space 0, times 0 12:56:57 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 234.441504] CPU: 1 PID: 14087 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 234.448665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.458034] Call Trace: [ 234.460647] dump_stack+0x138/0x19c [ 234.464297] should_fail.cold+0x10f/0x159 [ 234.468468] should_failslab+0xdb/0x130 [ 234.472460] kmem_cache_alloc_trace+0x2e9/0x790 [ 234.477161] ? mutex_trylock+0x1c0/0x1c0 [ 234.481236] ? btrfs_close_devices+0x21/0x140 [ 234.485742] btrfs_alloc_device+0xa4/0x6a0 [ 234.485765] ? btrfs_find_device_by_devspec+0xf0/0xf0 [ 234.485780] __btrfs_close_devices+0x2c6/0xa90 [ 234.495217] ? __mutex_unlock_slowpath+0x71/0x800 [ 234.495238] ? btrfs_alloc_device+0x6a0/0x6a0 [ 234.495252] btrfs_close_devices+0x29/0x140 [ 234.513516] btrfs_mount+0x1fc5/0x2b14 [ 234.513531] ? lock_downgrade+0x6e0/0x6e0 [ 234.513543] ? find_held_lock+0x35/0x130 [ 234.521756] ? pcpu_alloc+0x3af/0x1050 [ 234.521778] ? btrfs_remount+0x11f0/0x11f0 [ 234.521795] ? rcu_read_lock_sched_held+0x110/0x130 [ 234.521822] ? __lockdep_init_map+0x10c/0x570 [ 234.521839] mount_fs+0x97/0x2a1 [ 234.547007] vfs_kern_mount.part.0+0x5e/0x3d0 [ 234.551516] ? find_held_lock+0x35/0x130 [ 234.555594] vfs_kern_mount+0x40/0x60 [ 234.559409] btrfs_mount+0x3ce/0x2b14 [ 234.563222] ? lock_downgrade+0x6e0/0x6e0 [ 234.567380] ? find_held_lock+0x35/0x130 [ 234.571451] ? pcpu_alloc+0x3af/0x1050 [ 234.575353] ? btrfs_remount+0x11f0/0x11f0 [ 234.575372] ? rcu_read_lock_sched_held+0x110/0x130 [ 234.584617] ? __lockdep_init_map+0x10c/0x570 12:56:57 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 234.584628] ? __lockdep_init_map+0x10c/0x570 [ 234.584643] mount_fs+0x97/0x2a1 [ 234.584659] vfs_kern_mount.part.0+0x5e/0x3d0 [ 234.584673] do_mount+0x417/0x27d0 [ 234.605012] ? copy_mount_options+0x5c/0x2f0 [ 234.609434] ? rcu_read_lock_sched_held+0x110/0x130 [ 234.614454] ? copy_mount_string+0x40/0x40 [ 234.618697] ? copy_mount_options+0x1fe/0x2f0 [ 234.623193] SyS_mount+0xab/0x120 [ 234.626988] ? copy_mnt_ns+0x8c0/0x8c0 [ 234.630874] do_syscall_64+0x1e8/0x640 [ 234.634760] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 234.639638] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 234.644827] RIP: 0033:0x45c21a [ 234.648007] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 234.655708] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 234.662968] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 234.670227] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 234.677489] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 234.688424] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 234.708818] ------------[ cut here ]------------ [ 234.713605] kernel BUG at fs/btrfs/volumes.c:890! [ 234.719208] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 234.724573] Modules linked in: [ 234.727767] CPU: 1 PID: 14087 Comm: syz-executor.1 Not tainted 4.14.132 #27 [ 234.736308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 234.745671] task: ffff8880952ec740 task.stack: ffff888064508000 [ 234.751754] RIP: 0010:__btrfs_close_devices+0x7d8/0xa90 [ 234.757112] RSP: 0018:ffff88806450f700 EFLAGS: 00010246 [ 234.762470] RAX: 0000000000040000 RBX: ffff8880a72a7680 RCX: ffffc90005e2d000 [ 234.769831] RDX: 0000000000040000 RSI: ffffffff82656018 RDI: 0000000000000286 [ 234.777096] RBP: ffff88806450f7c8 R08: ffff8880952ec740 R09: ffff8880952ed008 [ 234.784360] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880807c5540 [ 234.792143] R13: ffff8880a72a7748 R14: fffffffffffffff4 R15: dffffc0000000000 [ 234.799413] FS: 00007f5ff973f700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 234.807647] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 234.813520] CR2: 00007fffef5b8e9c CR3: 00000000a038d000 CR4: 00000000001406e0 [ 234.820784] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 234.828067] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 234.835329] Call Trace: [ 234.837921] ? __mutex_unlock_slowpath+0x71/0x800 [ 234.843025] ? btrfs_alloc_device+0x6a0/0x6a0 [ 234.847523] btrfs_close_devices+0x29/0x140 [ 234.851847] btrfs_mount+0x1fc5/0x2b14 [ 234.855730] ? lock_downgrade+0x6e0/0x6e0 [ 234.859869] ? find_held_lock+0x35/0x130 [ 234.863937] ? pcpu_alloc+0x3af/0x1050 [ 234.867867] ? btrfs_remount+0x11f0/0x11f0 [ 234.872097] ? rcu_read_lock_sched_held+0x110/0x130 [ 234.877111] ? __lockdep_init_map+0x10c/0x570 [ 234.881631] mount_fs+0x97/0x2a1 [ 234.885000] vfs_kern_mount.part.0+0x5e/0x3d0 [ 234.889671] ? find_held_lock+0x35/0x130 [ 234.893738] vfs_kern_mount+0x40/0x60 [ 234.897536] btrfs_mount+0x3ce/0x2b14 [ 234.901333] ? lock_downgrade+0x6e0/0x6e0 [ 234.905482] ? find_held_lock+0x35/0x130 [ 234.909531] ? pcpu_alloc+0x3af/0x1050 [ 234.913429] ? btrfs_remount+0x11f0/0x11f0 [ 234.917660] ? rcu_read_lock_sched_held+0x110/0x130 [ 234.922678] ? __lockdep_init_map+0x10c/0x570 [ 234.927168] ? __lockdep_init_map+0x10c/0x570 [ 234.931665] mount_fs+0x97/0x2a1 [ 234.935029] vfs_kern_mount.part.0+0x5e/0x3d0 [ 234.939521] do_mount+0x417/0x27d0 [ 234.943055] ? copy_mount_options+0x5c/0x2f0 [ 234.947481] ? rcu_read_lock_sched_held+0x110/0x130 [ 234.952510] ? copy_mount_string+0x40/0x40 [ 234.956740] ? copy_mount_options+0x1fe/0x2f0 [ 234.961228] SyS_mount+0xab/0x120 [ 234.964676] ? copy_mnt_ns+0x8c0/0x8c0 [ 234.968564] do_syscall_64+0x1e8/0x640 [ 234.972447] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 234.977292] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 234.982478] RIP: 0033:0x45c21a [ 234.985654] RSP: 002b:00007f5ff973ea88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 234.993363] RAX: ffffffffffffffda RBX: 00007f5ff973eb40 RCX: 000000000045c21a [ 235.000627] RDX: 00007f5ff973eae0 RSI: 0000000020000100 RDI: 00007f5ff973eb00 [ 235.007891] RBP: 0000000000000001 R08: 00007f5ff973eb40 R09: 00007f5ff973eae0 [ 235.015160] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 235.022427] R13: 00000000004c86f2 R14: 00000000004df2d8 R15: 0000000000000003 [ 235.029789] Code: c1 ea 03 0f b6 04 02 84 c0 74 08 3c 03 0f 8e 59 02 00 00 48 8b 45 80 c7 80 10 01 00 00 00 00 00 00 e9 e2 f8 ff ff e8 68 47 f7 fe <0f> 0b e8 61 47 f7 fe 0f 0b 48 89 f7 e8 17 e9 20 ff e9 ad f8 ff [ 235.049024] RIP: __btrfs_close_devices+0x7d8/0xa90 RSP: ffff88806450f700 [ 235.057362] ---[ end trace 64228ca3cf9f57e7 ]--- [ 235.062617] Kernel panic - not syncing: Fatal exception [ 235.069048] Kernel Offset: disabled [ 235.072667] Rebooting in 86400 seconds..